in consent management and describes potential
solutions for tackling these challenges. The
implications for practice include the experiences and
solutions and, more specifically, our framework,
which offers a means of realizing a consent
management architecture.
Our study also indicates issues and directions for
future research, such as the need for a better
understanding of consent management mechanisms
and architecture. As our consent management
architecture is defined at a general level and is not a
functional or requirements specification, further
work is still needed. Our future work will include
more thorough specification and empirical
evaluation of our framework, especially with regard
to performance and usability, in collaboration with
industry and research organizations.
6 CONCLUSIONS
Significant amounts of personal data are currently
collected by different applications and services,
which can be used for further processing with e.g.
monetizable outcomes. To date, individuals have
typically had little or no control over how their data
are created or used. Privacy laws set strict
requirements for collecting, processing and sharing
personally identifiable information, and utilizing
personal data must begin from free, informed,
specific and explicit consent given by the data
subject. Domain specific solutions for consent
management do exist, but there is strong demand for
more generic cross-domain solutions that would
enable new and legacy systems to share and use
personally identifiable information. Our research
question was addressed by means of a novel
consent-based authorization architecture, and in
addition we presented a proof-of-concept
implementation and discussed our experiences
during implementation.
This paper makes an important contribution to
the secure digitalization of data and personalization
of services in the domains of health and information
systems. Furthermore, our results enable the creation
of new digital health solutions by virtue of a novel
privacy-preserving architecture. Organizations will
also benefit from practical methods of securing an
individual’s consent to the use of personal data, so
improving opportunities to utilize those data to
provide innovative services. Finally, our
implementation confirms that the technologies
already exist to build CMA, although some still need
further development. Improvements are proposed,
such as the centralized operator (MyData Operator),
which lends novelty to our approach, and we
recommend consideration of MyData Operator’s
role in addition to UMA-specified roles to simplify
the authorization process.
This paper has its code available at
https://github.com/dhrproject.
ACKNOWLEDGEMENTS
This research has been supported by a grant from
Tekes–the Finnish Funding Agency for Innovation
as part of Digital Health Revolution programme.
The multi-disciplinary programme is coordinated
and managed by Center for Health and Technology,
University of Oulu, Finland.
REFERENCES
Al Ameen, M., Liu, J., Kwak, K., 2012. Security and
privacy issues in wireless sensor networks for
healthcare applications. Journal of Medical Systems,
36(1), 93–101.
Archer, N., Fevrier-Thomas, U., Lokker, C., McKibbon,
K. A., Straus, S., 2011. Personal health records: A
scoping review. Journal of the American Medical
Informatics Association, 18(4), 515–522.
Blume, P., 2014. The myths pertaining to the proposed
General Data Protection Regulation. International
Data Privacy Law, 4(4), 269–273.
Byström, N., Hirvonsalo, H., Honko, H., Kallonen, A.,
Kortesniemi, Y., Kuikkaniemi, K., Maarala, I.,
Niskanen, I., Poikola, A., Rautiainen, M., Tuoriniemi,
S., 2015. MyData Architecture—The Stack, version
1.0.0. Available at: https://hiit.github.io/mydata-stack/
Cresswell, K.M., Bates, D.W., Sheikh, A., 2013. Ten key
considerations for the successful implementation and
adoption of large-scale health information technology.
Journal of the American Medical Informatics
Association, 20(e1), e9–e13.
De Hert, P., Papakonstantinou, V., 2012. The proposed
data protection Regulation replacing Directive
95/46/EC: A sound system for the protection of
individuals. Computer Law & Security Review, 28(2),
130–142.
Ferreira, A., Ricardo, C.C., Antunes, L., Chadwick, D.,
2007. Access Control: how can it improve patients’
healthcare?. Medical and care compunetics, 4(4), 65.
Gnesi, S., Matteucci, I., Moiso, C., Mori, P., Petrocchi,
M., Vescovi, M., 2014. My data, your data, our data:
Managing privacy preferences in multiple subjects
personal data. In Privacy Technologies and Policy,
154–171. Springer International Publishing.
Jin, J., Ahn, G.J., Hu, H., Covington, M.J., Zhang, X.,
2011. Patient-centric authorization framework for