DOI QR코드

DOI QR Code

The case study of implementation for a limited hospital medical information system based on ACL-applied router

ACL이 적용된 라우터 기반의 제한된 병원 의료정보시스템의 구현 사례

  • Received : 2016.09.19
  • Accepted : 2016.10.24
  • Published : 2016.10.31

Abstract

Recently hospitals have divided into many divisions, specialized the medical service, and shown organic cooperation, all to provide patients with various and high quality medical service. They have also showed improvement in information protection by introducing an information protection system to regulate the access to patients' medical and personal information. The purpose of this paper is to present a case study to implement of a limited hospital medical information system that can regulate the access to medical information. For this, a router-based virtual network applying an ACL(: Access Control List) to regulate access to information was made using a packet tracer.

최근 병원들은 다양한 서비스, 진료 활성화와 질 향상을 위하여 많은 부서들로 분업화 및 세분화되면서 유기적인 협업으로 양질의 환자서비스를 제공하고 있으며, 진료정보 접근권한 제한과 환자의 개인정보 유출 방지를 위한 정보보호 시스템을 도입하여 운영하는 등 정보보호 대책도 진일보하고 있다. 본 논문에서는 정보접근을 제한하기 위하여 ACL(: Access Control List)이 적용된 라우터 기반의 가상 망을 패킷 트레이서를 이용하여 구현한 다음, 시뮬레이션을 통해서 정보의 차단 및 허용을 검증할 수 있는 제한된 병원 의료정보시스템의 구현 사례를 제시하였다.

Keywords

References

  1. J. Kim, H. Park, S, Jang, and N. Kim, "The case study for verification of ACL(:Access Lis)," Conf. of the Korea Institute of Electronic Communication Sciences, vol. 9, no. 2, Sokcho, Korea, Nov. 2015, pp. 164-167.
  2. S. Bae, "Personal Information Security in Hospital Information System Using Degree of Key," Conf. of Korea Information Processing Society, Iksan, Korea, Nov. 2005, pp. 587-590.
  3. J. Song, S. Kim, M. Chung, and K. Chung, "A Review for information protection of Home-Healthcare Service," Review of Korea Institute of Information Security & Cryptology, vol. 16, no. 6, Dec. 2006, pp. 56-63.
  4. H. Mun, K. Kim, N. Um, Y. Li, and S. Lee, "Effective Access Control Mechanism for Protection of Sensitive Personal Information," J. of Korea Information and Communications Society, vol. 32, no. 7, July 2007, pp. 667-673.
  5. K. Kim and S. Hong, "Privacy Information Protection Model in e-Healthcare Environment," J. of Korean Society for Internet Information, vol. 10, no. 2, Apr. 2009, pp. 29-40.
  6. J. Lim, E. Jung, B. Jeong, D. Park, and T. Whangbo, "A Study for Sharing Patient Medical Information with Demographic Datasets," J. of the Institute of Electronics and Information Engineers, vol. 51, no. 10, Oct. 2014, pp. 2262-2270.
  7. S. Youn and J. Song, "EMR Management system for the patient management," J. of Engineering Paichai University, Korea, vol. 8, no. 1, Mar. 2006, pp. 79-85.
  8. N. Kim, "The case study to verify of a network based on router applying an ACL(:Access Lis)," J. of the Korea Institute of Electronic Communication Sciences, vol. 11, no. 5, May 2016, pp. 491-497. https://doi.org/10.13067/JKIECS.2016.11.5.491
  9. Y. Jeun, "The Medical Information Protection and major Issues," J. of the Korea Society of Computer and Information, vol. 17, no. 12, Dec. 2012, pp. 251-258. https://doi.org/10.9708/jksci/2012.17.12.251
  10. W. Seo and M. Jun, "A Study on Security Hole Attack According to the Establishment of Policies to Limit Particular IP Area," J. of the Korea Institute of Electronic Communication Sciences, vol. 5, no. 6, Dec. 2010, pp. 625-630.
  11. J. Choi, "Utilization value of medical Big Data created in operation of medical information system," J. of the Korea Institute of Electronic Communication Sciences, vol. 10, no. 12, Dec. 2015, pp. 1403-1410. https://doi.org/10.13067/JKIECS.2015.10.12.1403