Skip to main content
Erschienen in: Journal of Medical Systems 5/2010

01.10.2010 | Original Paper

Biometrics for Electronic Health Records

verfasst von: Alejandro Enrique Flores Zuniga, Khin Than Win, Willy Susilo

Erschienen in: Journal of Medical Systems | Ausgabe 5/2010

Einloggen, um Zugang zu erhalten

Abstract

Securing electronic health records, in scenarios in which the provision of care services is share among multiple actors, could become a complex and costly activity. Correct identification of patients and physician, protection of privacy and confidentiality, assignment of access permissions for healthcare providers and resolutions of conflicts rise as main points of concern in the development of interconnected health information networks. Biometric technologies have been proposed as a possible technological solution for these issues due to its ability to provide a mechanism for unique verification of an individual identity. This paper presents an analysis of the benefit as well as disadvantages offered by biometric technology. A comparison between this technology and more traditional identification methods is used to determine the key benefits and flaws of the use biometric in health information systems. The comparison as been made considering the viability of the technologies for medical environments, global security needs, the contemplation of a share care environment and the costs involved in the implementation and maintenance of such technologies. This paper also discusses alternative uses for biometrics technologies in health care environments. The outcome of this analysis lays in the fact that even when biometric technologies offer several advantages over traditional method of identification, they are still in the early stages of providing a suitable solution for a health care environment.
Literatur
4.
Zurück zum Zitat Au, M., Huang, Q., Liu, J., Susilo, W., Wong, D., and Yang, G., Traceable and retrievable identity-based encryption. Applied Cryptography and Network Security, 2008, pp. 94–110. Au, M., Huang, Q., Liu, J., Susilo, W., Wong, D., and Yang, G., Traceable and retrievable identity-based encryption. Applied Cryptography and Network Security, 2008, pp. 94–110.
11.
Zurück zum Zitat CEN-ENV. Health informatics—Security for healthcare communication—Part 1: Concepts and terminology. Published Standard CEN ENV 13608-1:2000: European Committee for Standardization; 2000. CEN-ENV. Health informatics—Security for healthcare communication—Part 1: Concepts and terminology. Published Standard CEN ENV 13608-1:2000: European Committee for Standardization; 2000.
12.
Zurück zum Zitat CEN-ENV. Health informatics—Security for healthcare communication—Part 2: Secure data objects. Published Standard CEN ENV 13608-2:2000: European Committee for Standardization; 2000. CEN-ENV. Health informatics—Security for healthcare communication—Part 2: Secure data objects. Published Standard CEN ENV 13608-2:2000: European Committee for Standardization; 2000.
13.
Zurück zum Zitat CEN-ENV. Health informatics—Security for healthcare communication—Part 3: Secure data channels. Published Standard CEN ENV 13608-3:2000: European Committee for Standardization; 2000. CEN-ENV. Health informatics—Security for healthcare communication—Part 3: Secure data channels. Published Standard CEN ENV 13608-3:2000: European Committee for Standardization; 2000.
14.
16.
Zurück zum Zitat Choi, Y. B., Capitan, K. E., Krause, J. S., and Streeper, M. M., Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J. Med. Syst. 30 (1)57–64, 2006. doi:10.1007/s10916-006-7405-0.CrossRef Choi, Y. B., Capitan, K. E., Krause, J. S., and Streeper, M. M., Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J. Med. Syst. 30 (1)57–64, 2006. doi:10.​1007/​s10916-006-7405-0.CrossRef
17.
Zurück zum Zitat Conrick, M., and Newell, C., Issues of ethics and law. In: Conrick, M. (Ed.), Health informatics: transforming healthcare with technologyThomson Social Science Press, Melbourne, 2006. Conrick, M., and Newell, C., Issues of ethics and law. In: Conrick, M. (Ed.), Health informatics: transforming healthcare with technologyThomson Social Science Press, Melbourne, 2006.
18.
Zurück zum Zitat Delac, K., and Grgic, M., A survey of biometric recognition methods. 46th International SymPoSium Electronic in Marine. ELMAR 2004, Zadar, 2004. Delac, K., and Grgic, M., A survey of biometric recognition methods. 46th International SymPoSium Electronic in Marine. ELMAR 2004, Zadar, 2004.
19.
Zurück zum Zitat Garson, K., and Adams, C., Security and privacy system architecture for an e-hospital environment. Proceedings of the 7th Symposium on Identity and Trust on the Internet. ACM, Gaithersburg, Maryland, 2008. Garson, K., and Adams, C., Security and privacy system architecture for an e-hospital environment. Proceedings of the 7th Symposium on Identity and Trust on the Internet. ACM, Gaithersburg, Maryland, 2008.
20.
Zurück zum Zitat Gates, M. A., Biometrics—passing on using passwords. Radiol. Today. 8 (17)28–31, 2007. Gates, M. A., Biometrics—passing on using passwords. Radiol. Today. 8 (17)28–31, 2007.
21.
Zurück zum Zitat Grain, H., Consumer issues in Informatics. In: Conrick, M. (Ed.), Health informatics: transforming healthcare with technologyThomson Social Science Press, Melbourne, 2006. Grain, H., Consumer issues in Informatics. In: Conrick, M. (Ed.), Health informatics: transforming healthcare with technologyThomson Social Science Press, Melbourne, 2006.
23.
Zurück zum Zitat Heckle, R. R., and Lutters, W. G., Privacy implications for single sign-on authentication in a hospital environment. Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM, Pittsburgh, Pennsylvania, 2007. Heckle, R. R., and Lutters, W. G., Privacy implications for single sign-on authentication in a hospital environment. Proceedings of the 3rd Symposium on Usable Privacy and Security. ACM, Pittsburgh, Pennsylvania, 2007.
24.
Zurück zum Zitat Hoque, S., Fairhurst, M. C., Deravi, F., and Howells, W. G. J., On the feasibility of generating biometric encryption keys. IEEE Electron. Lett. 41 (6)309–311, 2005. doi:10.1049/el:20057524.CrossRef Hoque, S., Fairhurst, M. C., Deravi, F., and Howells, W. G. J., On the feasibility of generating biometric encryption keys. IEEE Electron. Lett. 41 (6)309–311, 2005. doi:10.​1049/​el:​20057524.CrossRef
30.
Zurück zum Zitat Pierce, F. S., Biometric identification. Health Manag. Technol. 24 (5)38, 2003. Pierce, F. S., Biometric identification. Health Manag. Technol. 24 (5)38, 2003.
32.
Zurück zum Zitat Rash, M. C., Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area 2005 April 4. Rash, M. C., Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area 2005 April 4.
33.
Zurück zum Zitat Reynolds, P., The keys to identity: as healthcare organizations strive for greater security, some are using a very personal approach in the form of biometrics.(Security/Authentication) (Cover Story). Health Manag. Technol. 25(12):12(14), 2004. Reynolds, P., The keys to identity: as healthcare organizations strive for greater security, some are using a very personal approach in the form of biometrics.(Security/Authentication) (Cover Story). Health Manag. Technol. 25(12):12(14), 2004.
34.
Zurück zum Zitat Safran, C., Bloomrosen, M., Hammond, W. E., Labkoff, S., Markel-Fox, S., Tang, P. C., and Detmer, D. E., Toward a national framework for the secondary use of health data: an American medical informatics association white paper. J. Am. Med. Inform. Assoc. 14 (1)1–9, 2007. doi:10.1197/jamia.M2273.CrossRef Safran, C., Bloomrosen, M., Hammond, W. E., Labkoff, S., Markel-Fox, S., Tang, P. C., and Detmer, D. E., Toward a national framework for the secondary use of health data: an American medical informatics association white paper. J. Am. Med. Inform. Assoc. 14 (1)1–9, 2007. doi:10.​1197/​jamia.​M2273.CrossRef
35.
Zurück zum Zitat Sahai, A., and Waters, B., Fuzzy identity-based encryption. Advances in Cryptolog EUROCRYPT 2005, 2005, pp. 457–473. Sahai, A., and Waters, B., Fuzzy identity-based encryption. Advances in Cryptolog EUROCRYPT 2005, 2005, pp. 457–473.
36.
Zurück zum Zitat Schneier, B., Security engineering: a guide to building dependable distributed systems. Wiley, New York, 2001. Schneier, B., Security engineering: a guide to building dependable distributed systems. Wiley, New York, 2001.
37.
Zurück zum Zitat Shamir, A., Identity-based cryptosystems and signature schemes. Advances in Cryptology, 1985, pp. 47–53. Shamir, A., Identity-based cryptosystems and signature schemes. Advances in Cryptology, 1985, pp. 47–53.
38.
Zurück zum Zitat Shin, Y. N., Lee, Y. J., Shin, W., and Choi, J., 110 P.s.-. and 10.1109/WAINA.2008.289 D.O.I. Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems. INAW 2008—2nd International Conference on Advanced Information Networking and Applications—Workshops, Okinawa, Japan, 2008. Shin, Y. N., Lee, Y. J., Shin, W., and Choi, J., 110 P.s.-. and 10.1109/WAINA.2008.289 D.O.I. Designing Fingerprint-Recognition-Based Access Control for Electronic Medical Records Systems. INAW 2008—2nd International Conference on Advanced Information Networking and Applications—Workshops, Okinawa, Japan, 2008.
39.
Zurück zum Zitat Stamp, M., Information security: principles and practice. Wiley, Hoboken, 2006. Stamp, M., Information security: principles and practice. Wiley, Hoboken, 2006.
Metadaten
Titel
Biometrics for Electronic Health Records
verfasst von
Alejandro Enrique Flores Zuniga
Khin Than Win
Willy Susilo
Publikationsdatum
01.10.2010
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 5/2010
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-009-9313-6

Weitere Artikel der Ausgabe 5/2010

Journal of Medical Systems 5/2010 Zur Ausgabe