Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
110 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) Sharing (2407.02766v1)

Published 3 Jul 2024 in cs.CR

Abstract: Protected Health Information (PHI) sharing significantly enhances patient care quality and coordination, contributing to more accurate diagnoses, efficient treatment plans, and a comprehensive understanding of patient history. Compliance with strict privacy and security policies, such as those required by laws like HIPAA, is critical to protect PHI. Blockchain technology, which offers a decentralized and tamper-evident ledger system, hold promise in policy compliance. This system ensures the authenticity and integrity of PHI while facilitating patient consent management. In this work, we propose a blockchain technology that integrates smart contracts to partially automate consent-related processes and ensuring that PHI access and sharing follow patient preferences and legal requirements.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (26)
  1. C. S. Kruse, M. Mileski, A. G. Vijaykumar, S. V. Viswanathan, U. Suskandla, and Y. Chidambaram, “Impact of electronic health records on long-term care facilities: systematic review,” JMIR medical informatics, vol. 5, no. 3, p. e7958, 2017.
  2. S. Kalkman, J. van Delden, A. Banerjee, B. Tyl, M. Mostert, and G. van Thiel, “Patients’ and public views and attitudes towards the sharing of health data for research: a narrative review of the empirical evidence,” Journal of medical ethics, vol. 48, no. 1, pp. 3–13, 2022.
  3. G. Haddow, A. Bruce, S. Sathanandam, and J. C. Wyatt, “‘nothing is really safe’: a focus group study on the processes of anonymizing and sharing of health data for research purposes,” Journal of evaluation in clinical practice, vol. 17, no. 6, pp. 1140–1146, 2011.
  4. E. Li, J. Clarke, A. L. Neves, H. Ashrafian, and A. Darzi, “Protocol: Electronic health records, interoperability and patient safety in health systems of high-income countries: A systematic review protocol,” BMJ Open, vol. 11, no. 7, 2021.
  5. S. D. Lustgarten, Y. L. Garrison, M. T. Sinnard, and A. W. Flynn, “Digital privacy in mental healthcare: current issues and recommendations for technology use,” Current opinion in psychology, vol. 36, pp. 25–31, 2020.
  6. E. Hutchings, M. Loomes, P. Butow, and F. M. Boyle, “A systematic literature review of attitudes towards secondary use and sharing of health administrative and clinical trial data: a focus on consent,” Systematic Reviews, vol. 10, pp. 1–44, 2021.
  7. O. f. C. Rights (OCR), “HIPAA Enforcement,” May 2008, last Modified: 2021-06-28T08:59:34-0400. [Online]. Available: https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/index.html
  8. S. Timmermans, “The engaged patient: The relevance of patient–physician communication for twenty-first-century health,” Journal of Health and Social Behavior, vol. 61, no. 3, pp. 259–273, 2020.
  9. A. Lopez Martinez, M. Gil Pérez, and A. Ruiz-Martínez, “A comprehensive review of the state-of-the-art on security and privacy issues in healthcare,” ACM Computing Surveys, vol. 55, no. 12, pp. 1–38, 2023.
  10. M. Aljabri, M. Aldossary, N. Al-Homeed, B. Alhetelah, M. Althubiany, O. Alotaibi, and S. Alsaqer, “Testing and exploiting tools to improve owasp top ten security vulnerabilities detection,” in 2022 14th International Conference on Computational Intelligence and Communication Networks (CICN).   IEEE, 2022, pp. 797–803.
  11. K. Chung, D. Chung, and Y. Joo, “Overview of administrative simplification provisions of hipaa,” Journal of medical systems, vol. 30, pp. 51–55, 2006.
  12. M. L. Alarcon, M. Nguyen, S. Debroy, N. R. Bhamidipati, P. Calyam, and A. Mosa, “Trust model for efficient honest broker based healthcare data access and processing,” in 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops).   IEEE, 2021, pp. 201–206.
  13. V. Buterin et al., “A next-generation smart contract and decentralized application platform,” white paper, vol. 3, no. 37, pp. 2–1, 2014.
  14. T.-V. Le and C.-L. Hsu, “A systematic literature review of blockchain technology: Security properties, applications and challenges,” Journal of Internet Technology, vol. 22, no. 4, pp. 789–802, 2021.
  15. K. Fan, S. Wang, Y. Ren, H. Li, and Y. Yang, “Medblock: Efficient and secure medical data sharing via blockchain,” Journal of medical systems, vol. 42, no. 8, p. 136, 2018.
  16. M. Shah, C. Li, M. Sheng, Y. Zhang, and C. Xing, “Crowdmed: A blockchain-based approach to consent management for health data sharing,” in Smart Health: International Conference, ICSH 2019, Shenzhen, China, July 1–2, 2019, Proceedings 7.   Springer, 2019, pp. 345–356.
  17. Y. Zhuang, L. R. Sheets, Y.-W. Chen, Z.-Y. Shae, J. J. Tsai, and C.-R. Shyu, “A patient-centric health information exchange framework using blockchain technology,” IEEE journal of biomedical and health informatics, vol. 24, no. 8, pp. 2169–2176, 2020.
  18. M. Alhajri, A. Salehi Shahraki, and C. Rudolph, “Privacy of fitness applications and consent management in blockchain,” Proceedings of the 2022 Australasian Computer Science Week, pp. 65–73, 2022.
  19. S. Amofa, E. B. Sifah, O.-B. Kwame, S. Abla, Q. Xia, J. C. Gee, and J. Gao, “A blockchain-based architecture framework for secure sharing of personal health data,” in 2018 IEEE 20th international conference on e-Health networking, applications and services (Healthcom).   IEEE, 2018, pp. 1–6.
  20. E. Balistri, F. Casellato, C. Giannelli, and C. Stefanelli, “Blockhealth: Blockchain-based secure and peer-to-peer health information sharing with data protection and right to be forgotten,” ICT Express, vol. 7, no. 3, pp. 308–315, 2021.
  21. B. Shen, J. Guo, and Y. Yang, “Medchain: Efficient healthcare data sharing via blockchain,” Applied sciences, vol. 9, no. 6, p. 1207, 2019.
  22. M. Al Amin, A. Altarawneh, and I. Ray, “Informed consent as patient driven policy for clinical diagnosis and treatment: A smart contract based approach,” in Proceedings of the 20th International Conference on Security and Cryptography-SECRYPT, 2023, pp. 159–170.
  23. D. Mulamba and I. Ray, “Resilient reference monitor for distributed access control via moving target defense,” in Data and Applications Security and Privacy XXXI: 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings 31.   Springer, 2017, pp. 20–40.
  24. C. N. Samuel, S. Glock, F. Verdier, and P. Guitton-Ouhamou, “Choice of ethereum clients for private blockchain: Assessment from proof of authority perspective,” in 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).   IEEE, 2021, pp. 1–5.
  25. S. Kim and S. Hwang, “Etherdiffer: Differential testing on rpc services of ethereum nodes,” in Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023, pp. 1333–1344.
  26. E. Albert, J. Correas, P. Gordillo, G. Román-Díez, and A. Rubio, “Gasol: Gas analysis and optimization for ethereum smart contracts,” in International Conference on Tools and Algorithms for the Construction and Analysis of Systems.   Springer, 2020, pp. 118–125.
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (4)
  1. Md Al Amin (6 papers)
  2. Hemanth Tummala (4 papers)
  3. Rushabh Shah (5 papers)
  4. Indrajit Ray (9 papers)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com