Protecting Patient Records from Unwarranted Access
Securing access to medical information is vital to protecting patient privacy. However, Electronic Patient Record (EPR) systems are vulnerable to a number of inside and outside threats. Adversaries can compromise EPR client machines to obtain a variety of highly sensitive information including valid EPR login credentials, without detection. Furthermore, medical staff can covertly view records of their choosing for personal interest or more malicious purposes. In particular, we observe that the lack of integrity measurement and auditability in these systems creates a potential threat to the privacy of patient information. We explore the use of virtualization and trusted computing hardware to address these problems. We identify open problems and encourage further research in the area.
Unable to display preview. Download preview PDF.
- Arbaugh, William, Farber, David, and Smith, Jonathan: A secure and reliable bootstrap architecture. In IEEE Symposium on Security and Privacy, 1997.Google Scholar
- Arbaugh, William, Keromytis, Angelos, Farber, David, and Smith, Jonathan: Automated recovery in a secure bootstrap process, 1997.Google Scholar
- Caroll, Amy, Juarez, Mario, Polk, Julia, and Leininger, Tony: Microsoft Palladium: A business overview, August 2002.Google Scholar
- England, Paul, Lampson, Butler, Manferdelli, John, Peinado, Marcus, and Willman, Bryan: A trusted open platform. In IEEE Spectrum, 36(7):55–62, 2003.Google Scholar
- England, Paul and Pienado, Marcus: Authenticated operation of open computing devices. In Australasian Conference on Information Security and Privacy, 2002.Google Scholar
- Gasser, Morrie, Goldstein, Andy, Kaufman, Charlie and Lampson, Butler: The digital distributed system security architecture. In NIST/NCSC National Computer Security Conference, 1989.Google Scholar
- Garfinkel, Tal, Pfaff Ben, Chow, Jim, Rosenblum, Mendel, and Boneh, Dan: Terra: A virtual machine based platform for trusted computing. In ACM Symposium on Operating Systems Principles, 2003.Google Scholar
- Hammel, Sara: George Clooney addresses the leak of his medical records, In People, October 2007.Google Scholar
- Intel Corporation: Intel Trusted Execution Technology. 2007. Available at http://www.mtel.com/technology/security/.
- Leahy, Patrick and Kennedy, Edward: Setting information age parameters for medical privacy. November 1997. Available at http://www.leahy.senate.gov/press/199711/sl368.html.
- Marchesini, John, Smith, Sean, Wild, Omen, and MacDonald, Rich: Experimenting with TCPA/ TCG hardware, OR: How I learned to stop worrying and love the bear. Technical Report, Dartmouth College. December 2003. Available at http://www.cs.dartmouth.edu/~sws/pubs/TR2003–476.pdf
- Petroni, Nick, Fraser, Timothy, Molina, Jesus, and Arbaugh, William: Copilot - a coprocessor based kernel runtime integrity monitor. In USENIX Security Symposium, 2004.Google Scholar
- Sailer, Reiner, Jaeger, Trent, Zhang, Xiaolan, and van Doorn, Leendert: Attestation based policy enforcement for remote access. In ACM Conference on Computer and Communications Security, 2004.Google Scholar
- Seshadri, Arvind, Luk, Mark, Shi, Elaine, Perrig, Adrian, van Doorn, Leendert, and Khosla, Pradeep: Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In Symposium on Operating System Principles, 2005.Google Scholar
- Shi, Elaine, Perrig, Adrian, and van Doom, Leendert: Bind: a fine grained attestation service for secure distributed systems. In IEEE Symposium on Security and Privacy, 2005.Google Scholar
- Sailer, Reiner, Zhang, Xiolan, Jaeger, Trent, and van Doom, Leendert: Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security Symposium, 2004.Google Scholar
- Tasker, Peter: Trusted computer systems. In IEEE Symposium on Security and Privacy 1981.Google Scholar
- Trusted Computing Group: TPM main part 1 - design principles, specification version 1.2 revision 94, March 2006.Google Scholar
- Tygar, J.D. and Yee, Bennet: Dyad: A system for using physically secure coprocessors. In IP Workshop Proceedings, 1994.Google Scholar
- Win, Khin: A review of security of electronic health records. Health Information Management, 34(1), 2005. Available at http://www.mja.com.au/public/joumal/34-l-2005/win.html.
- Yee, Bennett and Tygar, J.D.: Secure coprocessors in electronic commerce applications. In USENIX Workshop on Electronic Commerce, 1995.Google Scholar