仓库源文站点原文


layout: post title: "064-100 《Contemporary-Health-Informatics》第四章" date: "2015-09-02 09:02:02" categories: 阅读 excerpt: "个人健康信息,也必须受到保护。这些信息首先是个人隐私。其次,这些信息可以拿来牟利,骗取保险公司和政府的保险金,造成纳税人的损失。本章讲述HIE系统需要的两个重要功能:获取病人授权和如何对信息加密解密。需要注意的是,保证信息的隐私、安全和信任,技术只占20%, 80%的是工作是制定各种policy..." auth: conge

tags: 读书笔记

Contemporary Health Informatics

图书信息:豆瓣

就在上一周,著名的偷情网站用户信息被黑客公开,不知道有多少人上去搜索自己配偶的电子邮件,这又加速了多少家庭的破裂。近些年来,经常听到信息被盗的新闻,银行账户被盗,个人身份信息被盗,各种事件层出不穷。IT行业面临最大的问题,恐怕就是信息安全了。

个人健康信息,也必须受到保护。这些信息首先是个人隐私。其次,这些信息可以拿来牟利,骗取保险公司和政府的保险金,造成纳税人的损失。

本章讲述HIE系统需要的两个重要功能:获取病人授权和如何对信息加密解密。需要注意的是,保证信息的隐私、安全和信任,技术只占20%, 80%的是工作是制定各种policy。

以下为书主要内容。


Part II: Key technologies Chapter 4: Privacy, Security and Trust

Overview

PHR has a low use rate (1 out of 14) and one of the concerns that users have is the security of their health information (another major concern is the reliability of the system). Internet criminals are interested in health data because they can use them to file false claims to get money. Public health officials, health professionals and others were sometimes reported to breach the HIPPA law to get access to protected health information.

PHR, EMR and HIE must address the privacy, security and trust concerns.

Privacy: only people authorized by patient can see health data. Security: data is protected from unauthorized access. Trust: senders and recipients of health information knows that the people they are interacting with are who they say they are.

To ensure privacy, prior authorization of the data owner is required before doing anything. To address security, a public key infrastructure (PKI) is commonly used. To ensure trust, a third-party trusted organization is usually provide the identification service to certify users of the system.

Challenges:

Privacy and Data Segmentation

Privacy models

Data Segmentation: is the process of sequestering certain data elements that are perceived as undesirable to share.

Three models of Segmentation:

Security and Trust (in the context of Direct)

3 Concepts of Public Key Infrastructure (PKI)

Public and Private Keys

Public and Private key pair are related sequence of numbers. Private key can not be public otherwise it can not assure security.

Both public key and private key can be used to encrypt message. Using receiver's public key to encrypt message will make sure only the one with the receiver's private key can see the message. Using sender's private key to encrypt message can ensure the message is indeed sent by the sender. The private key now functions as part of a digital signature because it can only be decrypted by the sender's public key. it will not reveal the private key.

Trust and Digital Signatures

Digital signature is usually based on the outgoing data so it is virtually unique. The signature must be encrypted with sender's private key before sending out. The receiver can then decrypt the signature with sender's public key to reveal the signature. These steps can ensure the message is indeed from the sender and the message is valid.

RA is important because it is responsible to generate private key and public key for a provider after verifying their identity.

Policy Issues

Since patients are accessing HIE or HISP via PHRs, it's hard work to verify every patient by RA. Policies is more important in the scenario.

PKI on the Web

It is very similar to what the public/private keys usage. I will simplify the knowledge with two questions below:

Q: For example, I want to sent a secure email via gmail. How do I (my browser) do that?

Q: How do I know the key are from Google?

Other PKI questions

PKI is not foolproof, private keys can be stolen, attacked, one can swap another people's public key with his to get access to messages which were intended to send to that person. Data security is a sophisticated field.

Conclusion

Internet is not designed for security. Digitizing data and sharing them via internet securely needs a lot of policy work and technology support.

扩展阅读

Intro to Health Informatics 第四周笔记

2015-09-02 初稿
2015-09-08 添加扩展阅读链接