architecture, a prototype implementation is
presented that is under development. Without the
loss of generality, for the purpose of the prototype
experimental implementation are used the public
cloud infrastructure of Amazon, the social network
of Facebook and the PHR of Microsoft called
HealthVault. Web services based on REST
technology were developed using the open source
Jersey to implement the access control services of
the middleware as well as the middleware
functionality. The HealthVault Application SDK
was used to access data from Microsoft HealthVault
PHR. Regarding the access control mechanism
implementation, the XML access control language
(XACML) is used and XACML policies are created
to represent user sharing preferences that are stored
to the cloud servers using Amazon S3 service
(Wrona et al., 2005). In addition, a web application
loaded in the context of Facebook is created to
provide the user application interface to access the
access control services and the middleware
functionality.
5 CONCLUDING REMARKS
This paper presents a security architecture that aims
at promoting secure patient information sharing
among users at anytime and from anywhere through
the use of SNs that are always available by any
device. In particular, the proposed access control
services ensure authorized patient information
retrieval from PHRs and its provision through SNs
messaging mechanisms and applications/tools
according to user’s access control preferences. To
realize this, there is a need to balance the urge to
protect individuals from potential harm that may be
caused by exposing personal information through
SNs and therefore to ensure that high quality
healthcare can be provided through the use of
eHealth services. In this paper, only the issue of
what other users can see has been addressed.
Questions of how to prevent the organisation in
control of the SN site using personal data which has
been freely shared for commercial gain through SN
functionality are left unanswered. Finally, there are
other problems not addressed here, such as legal and
ethical issues (Cushman et al., 2010).
The proposed security approach constitutes a
technological solution that is clearly implementable.
At present the development of the prototype is still
in the early stage. Thus, testing, user acceptance,
validation, evaluation and performance count on real
use of the eHealth services are still to be done.
REFERENCES
Beimel, D. and Peleg, M., 2011. ‘Using OWL and SWRL
to represent and reason with situation-based access
control policies’, Data and Knowledge Engineering,
vol. 70, pp. 596-615.
Cushman, R., Froomkin, M., Cava, A., Abril, P. and
Goodman, K., 2010. ‘Ethical, legal and social issues
for personal health records and applications’, Journal
of Biomedical Informatics, vol. 43, pp. S51-S55.
Domingo, M., 2010. ‘Managing healthcare through social
network’, IEEE Computer Society, vol. 43, no. 7, pp.
20-25.
Gajanayake, R., Iannella, R. and Sahama, T., 2011.
‘Sharing with care: An information accountability
perspective’, IEEE Computer Society, vol. 15, no. 4,
pp 31-38.
Greene, J., Choudhry, N., Kilabuk, E. and Shrank, W.,
2011. ‘Online social networking by patients with
diabetes: A qualitative evaluation of communication
with Facebook’, Journal of General Internal
Medicine, vol. 26, no. 3, pp. 287-292.
Shachak, A. and Jadad, A., 2010. ‘Electronic health
records in the age of social networks and global
telecommunications’, Journal of the American
Medical Association, vol. 303, no. 5, pp. 452-453.
Sunyaev, A., Kaletsch, A. and Krcmar, H., 2010.
‘Comparative evaluation of Google health api vs.
Microsoft Helathvault api’, International Conference
on Health Informatics - HEALTHINF 2010, Valencia,
Spain, pp. 195-201.
Thompson, L., Black, E., Duff, P., Black,
N., Saliba,
H.
and Dawson, K., 2011. ‘Protected health information
on social networking sites: Ethical and legal
considerations’, Journal of Medical Internet Research,
vol. 13, no. 1.
Williams, J., 2010. ‘Social networking applications in
health care: threats to the privacy and security of
health information’, Proceedings of the 2010 ICSE
Workshop on Software Engineering in Health Care,
Cape Town, South Africa, pp. 39-49.
Wrona, K. and Gomez, L., 2005. ‘Context-aware security
and secure context-awareness in ubiquitous computing
environments’, Proceedings of the XII Autumn
Meeting of Polish Information Processing Society
Conference, pp. 255-265.
ENHANCING PATIENT INFORMATION SHARING THROUGH SOCIAL NETWORKS
381