skip to main content
10.1145/3205977.3205991acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
short-paper

Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models

Authors Info & Claims
Published:07 June 2018Publication History

ABSTRACT

Traditional role-based access control fails to meet the privacy requirements for patient data in medical systems, as it is infeasible for policy makers to foresee what information doctors may need for diagnosis and treatment in various situations. The universal practice in hospitals is to grant doctors unlimited access, which in turn increases the risk of breaching patient privacy. In this paper, we propose a dynamic risk-adaptive access control model for health IT systems by taking into consideration the relationships between data and access behaviors. By training topic models to portray individual and group-level access behaviors, we quantify the risk for each user over a certain period of time. Malicious users are supposed to get higher risk scores than honest users due to improper requests. Thus their further access would be denied under our access control scheme. The topic model and risk scores are periodically updated to advance the self-adaptability of the system. Experimental results have shown that our solution could effectively distinguish malicious doctors even if they deliberately conceal the misconducts.

References

  1. Kim Binsted, Alison Cawsey, and Ray B. Jones. 1995. Generating Personalised Patient Information Using the Medical Record AIME '95 Proceedings of the 5th Conference on Artificial Intelligence in Medicine in Europe: Artificial Intelligence Medicine. 29--41. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. David M. Blei. 2012. Probabilistic topic models. Communications of The ACM Vol. 55, 4 (2012), 77--84. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. David M. Blei, Andrew Y. Ng, and Michael I. Jordan. 2003. Latent dirichlet allocation. Journal of Machine Learning Research Vol. 3 (2003), 993--1022. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Sofiene Boulares, Kamel Adi, and Luigi Logrippo. 2016. Insider Threat Likelihood Assessment for Access Control Systems: Quantitative Approach. In International Symposium on Foundations and Practice of Security. 135--142.Google ScholarGoogle Scholar
  5. Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M. Wagner, and Angela Schuett Reninger. 2007. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control 2007 IEEE Symposium on Security and Privacy (SP '07). 222--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mayur Datar, Aristides Gionis, Piotr Indyk, and Rajeev Motwani. 2002. Maintaining Stream Statistics over Sliding Windows. SIAM J. Comput. Vol. 31, 6 (2002), 1794--1813. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Bent Fuglede and Flemming Topsøe. 2004. Jensen-Shannon divergence and Hilbert space embedding International Symposium on Information Theory, 2004. ISIT 2004. Proceedings. 31.Google ScholarGoogle Scholar
  8. I. Grosse, P. Bernaola-Galvan, P. Carpena, R. Roman-Roldan, J. Oliver, and H. E. Stanley. 2002. Analysis of symbolic sequences using the Jensen-Shannon divergence. Physical Review E Vol. 65, 4 (2002), 41905.Google ScholarGoogle ScholarCross RefCross Ref
  9. Weili Han, Qun Ni, and Hong Chen. 2009. Apply Measurable Risk to Strengthen Security of a Role-Based Delegation Supporting Workflow System. In 2009 IEEE International Symposium on Policies for Distributed Systems and Networks. 45--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. John R. Hershey and Peder A. Olsen. 2007. Approximating the Kullback Leibler Divergence Between Gaussian Mixture Models 2007 IEEE International Conference on Acoustics, Speech and Signal Processing - ICASSP '07, Vol. Vol. 4. 317--320.Google ScholarGoogle Scholar
  11. Thomas Hofmann. 1999. Probabilistic latent semantic indexing. In Proceedings of the 22nd annual international ACM SIGIR conference on Research and development in information retrieval, Vol. Vol. 51. 50--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Robert A. Israel. 2005. International Classification of Diseases (ICD). Encyclopedia of Biostatistics (2005).Google ScholarGoogle Scholar
  13. Pankaj Jalote, Aveejeet Palit, Priya Kurien, and V. T. Peethamber. 2004. Timeboxing: a process model for iterative software development. Journal of Systems and Software Vol. 70 (2004), 117--127. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kyoungyoung Jee and Gang Hoon Kim. 2013. Potentiality of big data in the medical sector: focus on how to reshape the healthcare system. Healthcare Informatics Research Vol. 19, 2 (2013), 79--85.Google ScholarGoogle ScholarCross RefCross Ref
  15. Solomon Kullback. 1962. Information theory and statistics. Population Vol. 17, 2 (1962), 377.Google ScholarGoogle ScholarCross RefCross Ref
  16. S Kullback and R A Leibler. 1951. ON INFORMATION AND SUFFICIENCY. Annals of Mathematical Statistics Vol. 22, 1 (1951), 0--0.Google ScholarGoogle ScholarCross RefCross Ref
  17. Office Program M.C.Jason. {n. d.}. HORIZONTAL INTEGRATION: Broader Access Models for Realizing Information Dominance. (. {n. d.}).Google ScholarGoogle Scholar
  18. Sartorius N, Ustün Tb, Korten A, Cooper Je, and van Drimmelen J. 1995. Progress toward achieving a common language in psychiatry. II: Results from the international field trials of the ICD-10 Diagnostic Criteria for Research for mental and behavioral disorders. American Journal of Psychiatry Vol. 152, 10 (1995), 1427--1437.Google ScholarGoogle ScholarCross RefCross Ref
  19. Qun Ni, Elisa Bertino, and Jorge Lobo. 2010. Risk-based access control systems built on fuzzy inferences Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security. 250--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Geoffrey M. Reed. 2010. Toward ICD-11: Improving the Clinical Utility of WHO's International Classification of Mental Disorders. Professional Psychology: Research and Practice Vol. 41, 6 (2010), 457--464.Google ScholarGoogle ScholarCross RefCross Ref
  21. Qihua Wang and Hongxia Jin. 2011. Quantified risk-adaptive access control for patient privacy protection in health information systems. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. 406--410. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Liu Zhi-yong. 2007. Research and application of TimeBox development. Technological Development of Enterprise (2007).Google ScholarGoogle Scholar

Index Terms

  1. Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models

                Recommendations

                Comments

                Login options

                Check if you have access through your login credentials or your institution to get full access on this article.

                Sign in
                • Published in

                  cover image ACM Conferences
                  SACMAT '18: Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies
                  June 2018
                  271 pages
                  ISBN:9781450356664
                  DOI:10.1145/3205977
                  • General Chair:
                  • Elisa Bertino,
                  • Program Chairs:
                  • Dan Lin,
                  • Jorge Lobo

                  Copyright © 2018 ACM

                  Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                  Publisher

                  Association for Computing Machinery

                  New York, NY, United States

                  Publication History

                  • Published: 7 June 2018

                  Permissions

                  Request permissions about this article.

                  Request Permissions

                  Check for updates

                  Qualifiers

                  • short-paper

                  Acceptance Rates

                  SACMAT '18 Paper Acceptance Rate14of50submissions,28%Overall Acceptance Rate177of597submissions,30%

                  Upcoming Conference

                  SACMAT 2024

                PDF Format

                View or Download as a PDF file.

                PDF

                eReader

                View online with eReader.

                eReader