has been treated for depression. He believes that the
International Hospital is responsible for this
unlawful disclosure and threatens to sue the hospital
under national data protection laws. The Hospital
manager is very concerned about this case and
requests that Mary, the database administrator,
immediately provide him with an accounting of all
who have accessed George’s personal health data
and to make all the efforts to know if any one in the
hospital has disclosed George's health information.
Mary logs into the audit interface of our proposed
system to begin the investigation. Mary would first
like to know the identities of all persons who have
accessed George’s medical information in the past
year. She starts with the allowed (user/purpose)
combinations. In order to focus her search, she chose
to know those who can access his health information
only not other personal records (e.g., address,
telephone number, payment information). This task
was to be very difficult and takes more time without
the aid of the proposed method. She has tracked and
analyzed the queries that have accessed George
health information. Especially those who have
accessed his nervous records. Mary notices that the
results show a large number of queries accessing
George’s medical records, but not all of those
queries revealed the diagnosis of depression or his
prescription for anti-depression medication. She has
noticed in particular, that a nurse called Sally has
accessed George's nervous record 50 times in one
month. Though, she has no purpose for that as she
has finished from giving him injections. It appears to
Mary, that Sally is accessing George's nervous
records without reasons for 50 times in one month
using the same query. That's why she suspects in her
and submits a report of all her database analysis to
the manager. He did his investigations and he
discovered that she has disclosed the depression
information to the magazine. Without the aid of the
proposed system, Mary would spend months looking
in files and may have gotten no result at the end. The
proposed system has shortened the way to Mary and
made her job much easier than analyzing an ordinary
database.
5 CONCLUSIONS
In this paper, we have opened the door for research
in using ontology in data access management. We
have integrated the Hippocratic database method
with investigated personal information ontology in
order to provide better privacy security. We
achieved that by first giving a presentation to the
Hippocratic ontology based technology and how it
could play significant role in protecting the privacy
of personal health records without sacrificing the
value of information for diagnosis, treatment, or
research purposes. Our presentation demonstrates
how this technology enables efficient management,
sharing, and processing of sensitive data in
compliance with the principles of the PIPEDA and
other data protection acts and laws. We have also
discussed number of scenarios to demonstrate the
importance of the new method. Finally we have
presented some technical challenges that have been
addressed. We have demonstrated this method as a
possibility for privacy protection technologies and
overcoming its difficulties and problems (Bertino,
2005). We hope that the technology outlined herein
serve as a base for modern health records
infrastructures and encourage the researches in
applying ontology in information management
security.
6 FUTURE WORK
The investigated system has been built in a
prototype implementation and will shortly be
applied to a real health project in order to prove its
reliability. In addition the new method will be
compared with traditional methods from literature
such as classical Hippocratic database and k-
anonymity (Sweeny, 2002).
REFERENCES
Sabah Al-Fedaghi, January 29th - 2nd February, 2007,
"Beyond Purpose-Based Privacy Access Control", The
18th Australasian Database Conference, Ballarat,
Australia.
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. , VLDB
2002, "Hippocratic databases".
Rakesh Agrawal and Christopher Johnson." Securing
Electronic Health Records without Impeding the Flow
of Information" IBM Almaden Research Center
University of Alberta, Health Law Institute, University of
Victoria, School of Health Information Science, April
2005, "Electronic Health Records and the Personal
Information Protection and Electronic Documents
Act", Report prepared with generous funding support
from the Office of the Privacy Commissioner of
Canada.
http://www.w3.org/P3P/
M. Richardson, R. Agrawal, P. Domingos, October 2003,
“Trust Management for the Semantic Web”, 2nd Int'l
Semantic Web Conf., Sanibel Island, Florida.
USING ONTOLOGIES WITH HIPPOCRATIC DATABASES - A Model for Protecting Personal Information Privacy
381