Anatomy of log files: Implications for information accountability measures

Due to the growing use of digital technologies and Electronic Health Record systems, new auditing mechanisms are needed to help protect stakeholders from information misuse, both deliberate and accidental. Electronic storage of health records and use of sensor networks, wearable and ubiquitous health tracking devices raise numerous privacy related threats for both healthcare providers and their patients. A purely preventive approach to information access is not appropriate in healthcare scenarios, especially during emergencies, so after-the-fact justifications are needed to manage information handling risks in such an environment. To allow such justifications we need to analyse the root causes for unusual human actions or behaviours but current system event logs are inadequate for this purpose. Hence, a better solution would be to generate audit logs sufficient for analysing information use anomalies. Here we explain the limitations of existing event logs in clinical settings when attempting to perform after-the-fact justifications as part of a clinical Information Accountability system. From this we recommend additional features that must be added to event logs to support a healthcare-based Information Accountability Framework.

[1]  Rafael Accorsi,et al.  BBox: A Distributed Secure Log Architecture , 2010, EuroPKI.

[2]  Joan Feigenbaum,et al.  Towards a formal model of accountability , 2011, NSPW '11.

[3]  Shaker El-Sappagh,et al.  A Proposal of Clinical Decision Support system Architecture for Distributed Electronic Health Records , .

[4]  Shaker El-Sappagh,et al.  A distributed clinical decision support system architecture , 2014, J. King Saud Univ. Comput. Inf. Sci..

[5]  M. Eric Johnson,et al.  Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..

[6]  Luís Velez Lapão,et al.  Analysis of the quality of hospital information systems audit trails , 2013, BMC Medical Informatics and Decision Making.

[7]  Daisuke Mashima,et al.  Enabling Robust Information Accountability in E-healthcare Systems , 2012, HealthSec.

[8]  Limin Jia,et al.  Policy auditing over incomplete logs: theory, implementation and applications , 2011, CCS '11.

[9]  Tony R. Sahama,et al.  Sharing with Care: An Information Accountability Perspective , 2011, IEEE Internet Computing.

[10]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[11]  Bo Liu,et al.  Integration of LDSE and LTVS logs with HIPAA compliant auditing system (HCAS) , 2006, SPIE Medical Imaging.

[12]  Achim D. Brucker,et al.  Extending access control models with break-glass , 2009, SACMAT '09.

[13]  John Leubsdorf,et al.  Privacy and Freedom , 1968 .

[14]  L. Emanuel,et al.  What Is Accountability in Health Care? , 1996, Annals of Internal Medicine.

[15]  Glen Marshall Security Audit and Access Accountability Message XML Data Definitions for Healthcare Applications , 2004, RFC.

[16]  Indrajit Ray,et al.  Secure Logging as a Service—Delegating Log Management to the Cloud , 2013, IEEE Systems Journal.

[17]  Gunnar Peterson,et al.  How to Do Application Logging Right , 2010, IEEE Security & Privacy.

[18]  Laurie A. Williams,et al.  Cataloging and Comparing Logging Mechanism Specifications for Electronic Health Record Systems , 2013, HealthTech.

[19]  Alexander Pretschner,et al.  Data Accountability in Socio-Technical Systems , 2016, BMMDS/EMMSAD.

[20]  Tony R. Sahama,et al.  Demonstrating Accountable-eHealth systems , 2014, 2014 IEEE International Conference on Communications (ICC).

[21]  Joint Task Force Transformation Initiative,et al.  Security and Privacy Controls for Federal Information Systems and Organizations , 2013 .

[22]  James A. Hendler,et al.  Information accountability , 2008, CACM.