International Journal of Advanced and Applied Sciences

Int. j. adv. appl. sci.

EISSN: 2313-3724

Print ISSN: 2313-626X

Volume 4, Issue 1  (January 2017), Pages:  74-83


Title: Role-based efficient information extraction using rule-based decision tree

Author(s):  Imran Khan 1, *, M. Sher 1, Syed M. Saqlain 1, Husnain A. Naqvi 1, Anwar Ghani 1, M. Usman Ashraf 2, Javed I. Khan 3

Affiliation(s):

1Department of Computer Science and Software Engineering, International Islamic University, Islamabad, Pakistan
2IBMS, University of Agriculture, Faisalabad, Pakistan
3Department of Computer Science, Kent State University, Kent Ohio, USA

https://doi.org/10.21833/ijaas.2017.01.011

Full Text - PDF          XML

Abstract:

This article presents a framework to reduce the comparison complexity required to evaluate requests for releasing Protected Health Information (PHI). A new methodology is introduced to divide HIPAA (Health Information Portability Accountability Act) into small independent integrate-able modules to facilitate the implementation process. The HIPAA World Rule Model is used for decision using formalized legal text. In order to reduce the time complexity of logical rule set comparison process for Role/Actor based approach, RBDT and Rules Filtering Algorithm are used. It reduces the time complexity of rule generation process from O(n5) to O(n) for producing quick responses to access requests. The achieved results show significant improvement even for huge data. 

© 2017 The Authors. Published by IASE.

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Keywords: Privacy rules, Logical rules set, Formalization, Health care, EHR, Rule base decision tree

Article History: Received 27 October 2016, Received in revised form 27 December 2016, Accepted 7 January 2017

Digital Object Identifier: 

https://doi.org/10.21833/ijaas.2017.01.011

Citation:

Khan I, Sher M, Saqlain SM, Naqvi HA, Ghani A, Ashraf MU, and Khan JI (2017). Role-based efficient information extraction using rule-based decision tree. International Journal of Advanced and Applied Sciences, 4(1): 74-83

http://www.science-gate.com/IJAAS/V4I1/Khan.html


References:

Ashley P, Hada S, Karjoth G, and Schunter M (2002a). E-P3P privacy policies and privacy authorization. In Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society. ACM: 103-109, Washington, USA.
https://doi.org/10.1145/644527.644538
Ashley P, Powers C, and Schunter M (2002b). From privacy promises to privacy management: A new approach for enforcing privacy throughout an enterprise. In Proceedings of the 2002 Workshop on New Security Paradigms. ACM: 43-50, Virginia, USA.
https://doi.org/10.1145/844102.844110
Breaux T and Antón A (2008). Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering, 34(1): 5-20.
https://doi.org/10.1109/TSE.2007.70746
Breaux TD, Vail MW, and Anton AI (2006). Towards regulatory compliance: Extracting rights and obligations to align requirements with regulations. In 14th IEEE International Requirements Engineering Conference (RE'06): 49-58, Minneapolis, USA.
https://doi.org/10.1109/RE.2006.68
Byun JW, Bertino E, and Li N (2005). Purpose based access control of complex data for privacy protection. In Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies. ACM: 102–110, Stockholm, Sweden.
https://doi.org/10.1145/1063979.1063998
Hodge JG (2003). Health information privacy and public health. The Journal of Law, Medicine and Ethics, 31(4): 663-671.
https://doi.org/10.1111/j.1748-720X.2003.tb00133.x
PMid:14968668
Khan I, Alwarsh M, and Khan JI (2012a). Quantitative charting of HIPAA section 164's legal universe privacy rules of HIPAA (Technical Report). Networking and Media Communications Lab, Kent State University. Available online at: http://www.medianet.kent.edu/techreports/TR2012-06-01-HIPAA-164-legaluniverse.pdf
Khan I, Alwarsh M, and Khan JI (2012b). Tr2012-16-02 a decision tree model of HIPAA section 164 of HIPAA legal requirements, Tech. rep., Technical Report, Networking and Media Communications Lab, Kent State University. Available online at: http://www.medianet.kent.edu/techreports/TR2012-06-02-HIPAA-164-decisiontree.pdf
Khan I, Alwarsh M, and Khan JI (2013). A comprehension approach for formalizing privacy rules of HIPAA for decision support. In Machine Learning and Applications (ICMLA), 12th International Conference, 2: 390-395, Miami, USA.
https://doi.org/10.1109/icmla.2013.154
Lam PE, Mitchell JC, and Sundaram S (2009). A formalization of HIPAA for a medical messaging system. In International Conference on Trust, Privacy and Security in Digital Business. Springer Berlin Heidelberg: 73-85.
https://doi.org/10.1007/978-3-642-03748-1_8
Massey AK, Otto PN, Hayward LJ, and Antón AI (2010). Evaluating existing security and privacy requirements for legal compliance. Requirements Engineering, 15(1): 119-137.
https://doi.org/10.1007/s00766-009-0089-5
Maxwell JC and Antón AI (2009). Developing production rule models to aid in acquiring requirements from legal texts. In 7th IEEE International Requirements Engineering Conference: 101–110, Atlanta, USA.
https://doi.org/10.1109/re.2009.21
Maxwell JC and Antón AI (2010). The production rule framework: developing a canonical set of software requirements for compliance with law. In proceedings of the 1st ACM International Health Informatics Symposium. ACM: 629-636.
https://doi.org/10.1145/1882992.1883092
Sandhu RS, Coynek EJ, Feinsteink HL, and Youmank CE (1996). Role-based access control models yz. IEEE Computer, 29(2): 38-47.
https://doi.org/10.1109/2.485845
Wilson JF (2006). Health insurance portability and accountability act privacy rule causes ongoing concerns among clinicians and researchers. Annals of Internal Medicine, 145(4): 313-316.
https://doi.org/10.7326/0003-4819-145-4-200608150-00019
PMid:16908928