Non-repudiable Provenance for Clinical Decision Support Systems

  • Conference paper
  • First Online:
Provenance and Annotation of Data and Processes (IPAW 2020, IPAW 2021)

Abstract

Provenance templates are now a recognised methodology for the construction of data provenance records. Each template defines the provenance of a domain-specific action in abstract form, which may then be instantiated as required by a single call to the provenance template service. As data reliability and trustworthiness becomes a critical issue in an increasing number of domains, there is a corresponding need to ensure that the provenance of that data is non-repudiable. In this paper we contribute two new, complementary modules to our template model and implementation to produce non-repudiable data provenance. The first, a module that traces the operation of the provenance template service itself, and records a provenance trace of the construction of an object-level document, at the level of individual service calls. The second, a non-repudiation module that generates evidence for the data recorded about each call, annotates the service trace accordingly, and submits a representation of that evidence to a provider-agnostic notary service. We evaluate the applicability of our approach in the context of a clinical decision support system. We first define a policy to ensure the non-repudiation of evidence with respect to a security threat analysis in order to demonstrate the suitability of our solution. We then select three use cases from within a particular system, Consult, with contrasting data provenance recording requirements and analyse the subsequent performance of our prototype implementation against three different notary providers.

This work has been supported by European Union’s Horizon 2020 research and innovation programme under grant agreement No 654248, project CORBEL, and under grant agreement No 824087, project EOSC-Life.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 35.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 44.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    The provenance template model adds three special attributes (start, end, time) to the prov namespace in order to allow the start and end times of activities, and the times of influences to be instantiated as template value variables. These attributes are translated in the document model into the respective PROV timings. This is necessary because the PROV data model only allows these timings to be of type xsd:dateTime and so cannot be replaced by a variable name directly.

  2. 2.

    https://github.com/kclhi/nr.

References

  1. Ahmed, I., Khan, A., Khan, M.S., Ahmed, M.: Aggregated signatures for chaining: a secure provenance scheme. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 2012–2017, August 2016

    Google Scholar 

  2. Anderson, R.J.: Liability and computer security: nine principles. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 231–245. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-58618-0_67

    Chapter  Google Scholar 

  3. Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC 2008, Berkeley, CA, USA, pp. 4:1–4:5. USENIX Association (2008)

    Google Scholar 

  4. Chapman, M., et al.: Computational Argumentation-based Clinical Decision Support. In: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2019, pp. 2345–2347, Richland, SC. International Foundation for Autonomous Agents and Multiagent Systems (2019)

    Google Scholar 

  5. Curcin, V., Fairweather, E., Danger, R., Corrigan, D.: Templates as a method for implementing data provenance in decision support systems. J. Biomed. Inf. 65, 1–21 (2017)

    Google Scholar 

  6. Fairweather, E., Alper, P., Porat, T., Curcin, V.: Architecture for template-driven provenance recording. In: Belhajjame, K., Gehani, A., Alper, P. (eds.) IPAW 2018. LNCS, vol. 11017, pp. 217–221. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-98379-0_23

    Chapter  Google Scholar 

  7. Gleeson, S., Zimman, C.: PKCS #11 cryptographic token interface base specification. Technical report, OASIS (2015)

    Google Scholar 

  8. Gordon, W.J., Catalini, C.: Blockchain technology for healthcare: facilitating the transition to patient-driven interoperability. Comput. Struct. Biotechnol. J. 16, 224–230 (2018)

    Article  Google Scholar 

  9. Hafner, M., Memon, M., Breu, R.: Seaas - a reference architecture for security services in SOA. J. Univ. Comput. Sci. 15(15), 2916–2936 (2009)

    Google Scholar 

  10. Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: Problems and challenges. In: Proceedings of the 2007 ACM Workshop on Storage Security and Survivability, StorageSS 2007, New York, NY, USA, pp. 13–18. ACM (2007)

    Google Scholar 

  11. Hasselgren, A., Kralevska, K., Gligoroski, D., Pedersen, S.A., Faxvaag, A.: Blockchain in healthcare and health sciences - a sco** review. Int. J. Med. Inf. 134, 104040 (2020)

    Google Scholar 

  12. ISO/TC JTC1, SC 27: ISO 13888–1:2009 Information technology - Security techniques - Non-repudiation Part 1 - General. Technical report, International Organisation for Standardization (2009)

    Google Scholar 

  13. Jamil, F., Khan, A., Anjum, A., Ahmed, M., Jabeen, F., Javaid, N.: Secure provenance using an authenticated data structure approach. Comput. Secur. 73, 34–56 (2018)

    Article  Google Scholar 

  14. Kleinaki, A.S., Mytis-Gkometh, P., Drosatos, G., Efraimidis, P.S., Kaldoudi, E.: A blockchain-based notarization service for biomedical knowledge retrieval. Comput. Struct. Biotechnol. J. 16, 288–297 (2018)

    Article  Google Scholar 

  15. Kokciyan, N., et al.: Towards an argumentation system for supporting patients in self-managing their chronic conditions. In: Joint Workshop on Health Intelligence (W3PHIAI) (2018)

    Google Scholar 

  16. Massi, M., Miladi, A., Margheri, A., Sassone, V., Rosenzweig, J.: Using PROV and Blockchain to Achieve Health Data Provenance. University of Southampton, Technical report (2018)

    Google Scholar 

  17. Menezes, A.J., Vanstone, S.A., Oorschot, P.C.V.: Handbook of Applied Cryptography, 1st edn. CRC Press Inc., Boca Raton (1996)

    MATH  Google Scholar 

  18. Miller, T.: Explanation in artificial intelligence: Insights from the social sciences (2019)

    Google Scholar 

  19. Moreau, L.: A canonical form for PROV documents and its application to equality, signature, and validation. ACM Trans. Internet Technol. 17(4), 1–21 (2017)

    Article  Google Scholar 

  20. Moreau, L., et al.: The open provenance model core specification (v1.1). Future Gener. Comput. Syst. 27(6), 743–756 (2011)

    Google Scholar 

  21. Moreau, L., et al.: Prov-DM: The PROV data model. W3C (2013)

    Google Scholar 

  22. Moxey, A., Robertson, J., Newby, D., Hains, I., Williamson, M., Pearson, S.A.: Computerized clinical decision support for prescribing: provision does not guarantee uptake. J. Am. Med. Inf. Assoc. 17(1), 25–33 (2010)

    Google Scholar 

  23. Pinto, F.: Digital time-stam** to support non repudiation in electronic communications. Proceedings of SECURICOM 1996-14th Worldwide Congress on Computer and Communications Security and Protection, pp. 397–406 (1990)

    Google Scholar 

  24. Provenance Working Group W3C: W3C-PROV (2011)

    Google Scholar 

  25. Roe, M.: Cryptography and evidence. Technical report UCAM-CL-TR-780, University of Cambridge, Computer Laboratory (2010)

    Google Scholar 

  26. Toniolo, A., Cerutti, F., Oren, N., Norman, T., Sycara, K.: Making Informed Decisions with Provenance and Argumentation Schemes. In: 11th International Workshop on Argumentation in Multi-Agent Systems, pp. 1–20 (2014)

    Google Scholar 

  27. Vigil, M., Buchmann, J., Cabarcas, D., Weinert, C., Wiesmaier, A.: Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey. Comput. Secur. 50, 16–32 (2015)

    Article  Google Scholar 

  28. Zuccherato, R., Cain, P., Adams, D.C., Pinkas, D.: Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP). Technical report, Internet Engineering Task Force (Aug 2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rudolf Wittner .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fairweather, E., Wittner, R., Chapman, M., Holub, P., Curcin, V. (2021). Non-repudiable Provenance for Clinical Decision Support Systems. In: Glavic, B., Braganholo, V., Koop, D. (eds) Provenance and Annotation of Data and Processes. IPAW IPAW 2020 2021. Lecture Notes in Computer Science(), vol 12839. Springer, Cham. https://doi.org/10.1007/978-3-030-80960-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-80960-7_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-80959-1

  • Online ISBN: 978-3-030-80960-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation