Biomedical Data &
Applications Security
Research Projects
-
A New Framework for a Secure Federated Patient Healthcare System (S. Upadhyaya, CSE Dept.,
R. Sharman, MIS
Dept., H.R. Rao, MIS Dept.)
-
Protecting Documents from Insider Threat – A
Multiphase Approach (S. Upadhyaya, CSE Dept.)
-
Modeling Insider Threats and Reasoning about Intrusions (S. Upadhyaya, CSE Dept.,
Hung Ngo, CSE Dept.)
-
HIPAA Compliant Medical Data Repository for Teaching
(R.
Sharman, MIS Dept., H.R. Rao, MIS Dept., S. Upadhyaya, CSE Dept.)
-
Protecting Senior Citizens from Cyber Security Attacks in the
e-Health Scenario (H.R. Rao, MIS Dept., S. Upadhyaya, CSE CSE Dept.)
-
Health Informatics and Data Privacy (Sheng Zhong, CSE Dept.)
-
BioNav: Effective navigation on query results of biomedical
databases (Michalis Petropoulos, CSE Dept.)
Research Projects - Description
A New Framework for a Secure Federated Patient Healthcare
System (S. Upadhyaya, CSE Dept., R. Sharman, MIS
Dept., H.R. Rao, MIS Dept.) (2004-05)
Designing a framework for a secure federated database
system for healthcare is the focus of this project. The
design involves merging heterogeneous hospital databases
(Microsoft Access, AL, MUMPS, etc.) with predefined merge
rules and conflict resolution algorithms. A unified medical
ontology has been incorporated during the merge process to
prevent semantic divergence. New access controls are defined
at metadata level and record level to provide a finely
grained role based access in the design. Additionally,
scrubbing of patient's personal information with the aid of
a medical dictionary prevents he disclosure of patient's
personal information for researchers. A relational data
management system in Microsoft Access is developed by
merging three heterogeneous medical databases (MS Access, MS
Excel and text file) as a proof-of-concept.
|
Protecting Documents from Insider Threat – A
Multiphase Approach (S. Upadhyaya, CSE Dept.) (2004-06)
This project develops a comprehensive document control and
management system through several innovative schemes for secure
access, on-line monitoring and support for log-based forensics. The
uniqueness of the approach is the security consideration throughout
the life cycle of a document, viz., pre-document access phase,
mid-document access phase and post-document access phase. We are
applying the concept of user profiling, document profiling and
role-based access control mechanisms to accomplish the goals. The
expected outcomes of this research are: more accurate modeling and
mitigation of insider threat (graph-based), protection against
subversion/circumvention of the monitoring mechanism itself
(structural knowledge) and post-attack trace-back for attack
identification (forensics) as applicable to the realm of document
control.
|
Modeling Insider Threats and Reasoning about Intrusions (S.
Upadhyaya, CSE Dept., Hung Ngo, CSE Dept.)
(2005-07)
We have developed a theory of insider threat assessment. This is the
first such work which systematically and specifically addressed
insider threat. The team has developed a modeling methodology which
captures several aspects of insider threat, and subsequently makes
an assessment to reveal possible attack strategies of an insider in
an organization.
|
HIPAA Compliant Medical Data Repository for Teaching (R. Sharman,
MIS Dept., H.R. Rao, MIS Dept., S. Upadhyaya, CSE Dept.)
(2004-05)
This project has focused on developing, stripping and identifying
information from PHI data obtained from the Children's Hospital,
Buffalo, New York. The main objective of the project was to explore
critical factors that lead to a creation of a data warehouse that
doesn't contain personally identifying information from a number of
sources. The goal was also to measure the quality of the data after
the identifying information has been removed. The project provided
insight on data format issues and its impact on performance.
|
Protecting Senior Citizens from Cyber Security Attacks in the
e-Health Scenario (H.R. Rao, MIS Dept., S. Upadhyaya, CSE CSE Dept.)
(2009-)
Senior citizens represent a substantial percentage of population
around the world and most of them need health care. Health care is
becoming expensive around the world. As one of the cost-reduction
measures, most of the health care providers are moving the patient’s
data into electronic format (Electronic Medical Records). Even
though this migration is necessary for efficient health care
service, it opens up a big can of worms with respect to security and
privacy issues. In particular, when the doctors and patients access
this medical information through the Internet, there is a large room
for cyber security attacks. Given that the senior citizens have less
resources (memory, physical energy, technical skills), developing
solutions and processes that will help them in not becoming a victim
to attacks, is essential. In this research, we plan to study the
social and cultural effect of using electronic health care services,
and cyber security attacks due to using e-health care services.
|
Health Informatics and Data Privacy (Sheng Zhong, CSE Dept.)
(2008-)
In this project, we are concerned with the protection of data
owners' privacy in health data collection, processing, and mining,
and proposed a number of algorithms that provide privacy guarantees
using cryptographic techniques. Recently, we have also started
exploring privacy issues brought forth by electronic health records.
Our research suggest various methods to allow emergency access to
personally
controlled health data without violating patient privacy.
|
BioNav: Effective navigation on query results of biomedical
databases (Michalis Petropoulos, CSE Dept.) (2008-)
Search queries on biomedical databases like PubMed often return a
large number of results, only a small subset of which is relevant to
the user. Ranking and categorization, which can also be combined,
have been proposed to alleviate this information overload problem.
Results categorization for biomedical databases is the focus of this
work. A natural way to organize biomedical citations is according to
their MeSH annotations, a comprehensive concept hierarchy used by
PubMed. In this project, we develop the BioNav system, a novel
search interface that enables the user to navigate large number of
query results by organizing them using the MeSH concept hierarchy.
First, the query results are organized into a navigation tree.
Previous works expand the hierarchy in a predefined static manner.
In contrast, BioNav uses an intuitive navigation cost model to
decide what concepts to display at each step. Another difference
from previous works is that the hierarchy is not strictly displayed
level-by-level. |
|