Patient-Controlled Mechanism Using Pseudonymization Technique for Ensuring the Security and Privacy of Electronic Health Records

Patient-Controlled Mechanism Using Pseudonymization Technique for Ensuring the Security and Privacy of Electronic Health Records

Bipin Kumar Rai
Copyright: © 2022 |Pages: 15
DOI: 10.4018/IJRQEH.297076
Article PDF Download
Open access articles are freely available for download

Abstract

An Internet-based Electronic Health Record (EHR) system allows patients to access their medical history whenever they need it. Access to patient records and transactions related to diagnosis is helpful to patients and the health care department and executives. But this practice may lead to major privacy concerns of patients' private data. For EHR adaptation, the major elements are laws and regulations, monetary inducement and hurdles, technology state, and corporation effect. In this paper, I have proposed a Patient Controlled mechanism using the pseudonymization technique for ensuring the security and privacy of Electronic Health records. It is found that most of the potential approaches have used pseudonymization techniques to deal with the issues involved in a healthcare information system. This proposed solution is simple and efficiently ensures the privacy of patient data. Comparative analysis with other existing approaches has been undertaken.
Article Preview
Top

Introduction

Currently, events are often covered in the public media, yet there is a lack of care regarding sensitive data. On the other hand, people tend to feel more concerned when their healthcare-related data is at risk, owing to the ease of envisioning reasons for abuse and comprehending the consequences of such misuse. Another obvious example is that almost everyone is presented with loan and insurance applications at some time in their lives. We can no longer dispute that privacy protection directly influences both personal well-being and society as a whole. Privacy is regarded as a fundamental human right.

There are currently no particular entities in India that pay close attention to the necessity of getting informed consent from subjects. As a result, most hospitals and clinics are overly cautious when analyzing their material since they are aware that the implications of the information included are pretty complicated; hence, there is a genuine risk that informed consent is ill-informed consent. Research ethics and security rules compel research units to devote increasing money and effort to privacy and identity protection. Yet, restrictive regulations controlling the transfer of medical information may discourage research needlessly. Therefore, a patient-controlled mechanism is required.

EHR systems are extremely craved for the structured unification of all pertinent medical data of an individual and to exhibit the lifelong medical record. Various confidentiality threats of healthcare data are crucial, either from within the institution or outside by some intruder. Each healthcare unit, hospitals and clinic have an information system for maintaining the patient's data. Therefore, standards for data exchange are required, and electronic health records and data needs to be standardized, including semantic interoperability (standards for the exchange of patient's data among EHR systems). Several solutions are available to create EHR standards, such as openEHR, ANSI, Google Health and Microsoft's HealthVault, HL7. Most of these services don't provide complete control to the patients (Al-Hamdani, 2010). Innovative card healthcare systems developed in European countries are not strong privacy-preserving as anyone can access a patient's information from a health card without their consent. Indivo is the first patient-controlled web-based healthcare system that provides options to own a secure complete medical record, integrating EHRs of different health centers. In Serbia, the architecture of the healthcare system is a hybrid intelligent card-based solution (Vučetić et al., 2011).

The whole patient's experience of medical care is private. Hence providing confidentiality of medicine prescriptions is an important one (Ateniese & de Medeiros, 2002). In a smart-card-based e-prescriptions system, both patients and doctors have security concerns with this e-prescription data. Other parties are involved, and some parties may use it for their benefits like marketing, etc. (Yang et al., 2004).

Access control mechanisms and applications related to e-prescription systems and other consumer-related healthcare services require a secure mechanism (Rai & Solanki, 2021). Blockchain technology seems to be more appealing in healthcare(Mayer et al., 2020).

The objectives of the paper can be summarized as follows:

  • How pseudonymization technique can solve privacy and security issues in the healthcare industry today.

  • A patient-controlled architecture is proposed, which will be most suitable for health care information systems.

  • An efficient system model of separate storage of patient personal data and pseudonymized health data.

  • Furthermore, we show the performance analysis of the proposed scheme with existing solutions.

Top

Security Challenges In Healthcare

We need to handle the following security issues properly while accessing EHR (Rai & Srivastava, 2014):

Complete Article List

Search this Journal:
Reset
Volume 13: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 12: 2 Issues (2023)
Volume 11: 4 Issues (2022)
Volume 10: 4 Issues (2021)
Volume 9: 4 Issues (2020)
Volume 8: 4 Issues (2019)
Volume 7: 4 Issues (2018)
Volume 6: 4 Issues (2017)
Volume 5: 4 Issues (2016)
Volume 4: 4 Issues (2015)
Volume 3: 4 Issues (2014)
Volume 2: 4 Issues (2013)
Volume 1: 4 Issues (2012)
View Complete Journal Contents Listing