5 CONCLUSIONS/FUTURE
WORK
In this paper we depicted the need for risk-aware
access control models that support the regulation,
development, and deployment of access control
procedures for data sharing in biomedical research
platforms. We proposed a method that identifies the
essential risk components, necessary for such access
control procedures and extended existing models to
overcome the limitations of the “manual” biomedical
data sharing processes, such as the IRB, and the
“automated” ones based on e-HBS.
Currently we are working on coming up with
efficient equations to calculate the different risk
elements. This work is challenging and requires
significant efforts on many fronts:
• Assigning data sensitivity to datasets is the main
challenge. As a start, we are currently working
on classifying data into a set of pre-defined
sensitivity classes.
• Creating local (and ideally universal) user
records for storing data breach information is
another theoretical/practical challenge.
Analogous to credit scores, the risk associated
with individual users should indicate the gravity
of their past breaches, and should reward users’
progress. Our approach is to standardize all data
breaches (i.e. create a breach classification) and
create an account system for all users that can be
accessed by data holders when required.
• The security of the user’s environment is related
to the user’s institution (the research institution
to which a user is affiliated). Thus, the risk can
benefit from having universal security
certification programs for research institutions.
Such programs would provide certifications to
different institutions based on their privacy and
security practices. Refer to (El Emam et al.,
2009) for a list of parameters to take in
consideration when evaluating institutions’
privacy and security practices.
Another necessary task is to extend the system to
provide Omics data. For that, we need to study the re-
identification power of this data to be able to annotate
it with any privacy risk. Some work has already been
done along these lines for single nucleotide
polymorphisms (SNPs) (Lin et al., 2004).
REFERENCES
Armando, A., Bezzi, M., Metoui, N., Sabetta, A., 2015.
Risk-Aware Information Disclosure, in: Garcia-Alfaro,
J., Herrera-Joancomartí, J., Lupu, E., Posegga, J.,
Aldini, A., Martinelli, F., Suri, N. (Eds.), Data Privacy
Management, Autonomous Spontaneous Security, and
Security Assurance, Lecture Notes in Computer
Science. Springer International Publishing, pp. 266–
276.
Chen, L., Crampton, J., 2011. Risk-aware role-based access
control, in: International Workshop on Security and
Trust Management. Springer, pp. 140–156.
Chen, L., Crampton, J., Kollingbaum, M. J., Norman, T. J.,
2012. Obligations in risk-aware access control, in:
Privacy, Security and Trust (PST), 2012 Tenth Annual
International Conference on. IEEE, pp. 145–152.
Cheng, P.-C., Rohatgi, P., Keser, C., Karger, P.A., Wagner,
G.M., Reninger, A.S., 2007. Fuzzy multi-level security:
An experiment on quantified risk-adaptive access
control, in: 2007 IEEE Symposium on Security and
Privacy (SP’07). IEEE, pp. 222–230.
Choi, D., Kim, D., Park, S., 2015. A framework for context
sensitive risk-based access control in: medical
information systems. Comput. Math. Methods Med.
2015.
Dankar, F. K., Al-Ali, R., 2015. A Theoretical Multi-level
Privacy Protection Framework for Biomedical Data
Warehouses. Procedia Comput. Sci., The 6th Interna-
tional Conference on Emerging Ubiquitous Systems
and Pervasive Networks (EUSPN 2015)/ The 5th
International Conference on Current and Future
Trends of Information and Communication Technolo-
gies in Healthcare (ICTH-2015)/ Affiliated Workshops
63, 569–574. doi:10.1016/j.procs.2015.08.386
Dankar, F. K., Badji, R., 2017. A risk-based framework for
biomedical data sharing. J. Biomed. Inform. 66, 231–
240.
El Emam, K., Dankar, F. K., Vaillancourt, R., Roffey, T.,
Lysyk, M., 2009. Evaluating the risk of re-identification
of patients from hospital prescription records. Can. J.
Hosp. Pharm. 62, 307.
Google Android: A Comprehensive Security Assessment -
Google Scholar [WWW Document], n.d. URL
https://scholar.google.ae/scholar?q=Google+Android
%3A+A+Comprehensive+Security+Assessment&btn
G=&hl=en&as_sdt=0%2C5 (accessed 5.21.17).
He, S., Narus, S. P., Facelli, J. C., Lau, L. M., Botkin, J. R.,
Hurdle, J. F., 2014. A domain analysis model for eIRB
systems: Addressing the weak link in clinical research
informatics. J. Biomed. Inform. 52, 121–129.
Home | Global Alliance for Genomics and Health [WWW
Document], n.d. URL http://genomicsandhealth.org/
(accessed 5.21.17).
International Cancer Genome Consortium [WWW
Document], n.d. URL http://icgc.org/ (accessed
5.21.17).
Kandala, S., Sandhu, R., Bhamidipati, V., 2011. An
attribute based framework for risk-adaptive access
control models, in: Availability, Reliability and Security
A Risk-aware Access Control Model for Biomedical Research Platforms
327