• Title/Summary/Keyword: Medical Security System

Search Result 360, Processing Time 0.027 seconds

Cloud and Fog Computing Amalgamation for Data Agitation and Guard Intensification in Health Care Applications

  • L. Arulmozhiselvan;E. Uma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.685-703
    • /
    • 2024
  • Cloud computing provides each consumer with a large-scale computing tool. Different Cyber Attacks can potentially target cloud computing systems, as most cloud computing systems offer services to many people who are not known to be trustworthy. Therefore, to protect that Virtual Machine from threats, a cloud computing system must incorporate some security monitoring framework. There is a tradeoff between the security level of the security system and the performance of the system in this scenario. If strong security is needed, then the service of stronger security using more rules or patterns is provided, since it needs much more computing resources. A new way of security system is introduced in this work in cloud environments to the VM on account of resources allocated to customers are ease. The main spike of Fog computing is part of the cloud server's work in the ongoing study tells the step-by-step cloud server to change the tremendous measurement of information because the endeavor apps are relocated to the cloud to keep the framework cost. The cloud server is devouring and changing a huge measure of information step by step to reduce complications. The Medical Data Health-Care (MDHC) records are stored in Cloud datacenters and Fog layer based on the guard intensity and the key is provoked for ingress the file. The monitoring center sustains the Activity Log, Risk Table, and Health Records. Cloud computing and Fog computing were combined in this paper to review data movement and safe information about MDHC.

An Analysis of Medical Expenses for In-patients in an Oriental Medical Hospital and Factors Affecting Them (한방병원 입원환자의 진료비와 이에 영향을 미치는 요인 분석)

  • Ko, Min-Seok;Choi, Joon-Young
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.15 no.1
    • /
    • pp.71-87
    • /
    • 2011
  • Objective : The present study is aimed at providing basic data to help oriental medical hospitals devise efficient operational plans by analyzing the medical expenses of in-patients in an oriental medical hospital and the factors affecting such expenses. Methods : PASW 18.0 was used to analyze the medical insurance program data of 929 patients who were discharged from a university oriental medical hospital(with 105 sick-beds) during the period from January 1 to December 31, 2010 after treatment under the coverage of health insurance and medical aid. Results : 1) Of all the patients hospitalized, 63.3% were females, their mean age was 52.73 years old, and 87.7% was covered by the health insurance program. The biggest number or 31.2% of the patients were treated by the department of acupuncture, 31.5% suffered mainly from the diseases of musculoskeletal system and connective tissues, and the average length of stay at the hospital was 19.49 days. 2) There were statistically significant differences in total medical expenses by age, clinical department in charge, principal diagnosis, and number of days hospitalized while daily average medical expenses differed depending on age, type of medical security, clinical department, principal diagnosis, and number of days staying at the hospital. 3) Total medical expenses were found significantly influenced by age, type of medical security, clinical department, principal diagnosis, and number of days hospitalized(explanatory power : 95.9%), whereas type of medical security, clinical department and principal diagnosis turned out to exercise significant influence on the daily average medical expenses(explanatory power : 26.9%). Conclusion : Oriental medical hospitals are suggested to make efforts to ensure geographical and economical accessibility for their main clients, the elderly and middle-aged, as well as to improve satisfaction of the clients with the medical service provided. They are also encouraged to work out systems to specialize in treatment with a focus on chronic degenerative and adult diseases. In addition, they are expected to try to enhance people's awareness of oriental medicine in an attempt to diversify the brackets of clients and increase frequency of their utilization.

A Study on Security Event Detection in ESM Using Big Data and Deep Learning

  • Lee, Hye-Min;Lee, Sang-Joon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.42-49
    • /
    • 2021
  • As cyber attacks become more intelligent, there is difficulty in detecting advanced attacks in various fields such as industry, defense, and medical care. IPS (Intrusion Prevention System), etc., but the need for centralized integrated management of each security system is increasing. In this paper, we collect big data for intrusion detection and build an intrusion detection platform using deep learning and CNN (Convolutional Neural Networks). In this paper, we design an intelligent big data platform that collects data by observing and analyzing user visit logs and linking with big data. We want to collect big data for intrusion detection and build an intrusion detection platform based on CNN model. In this study, we evaluated the performance of the Intrusion Detection System (IDS) using the KDD99 dataset developed by DARPA in 1998, and the actual attack categories were tested with KDD99's DoS, U2R, and R2L using four probing methods.

Proposal on Guideline for Quality Assurance of Radiation Treatment Planning System

  • Oh, Yoonjin;Shin, Dong Oh;Kim, Juhye;Kwon, Nahye;Lee, Soon Sung;Choi, Sang Hyoun;Ahn, Sohyun;Park, Dong-wook;Kim, Dong Wook
    • Progress in Medical Physics
    • /
    • v.28 no.4
    • /
    • pp.197-206
    • /
    • 2017
  • We develop guidelines for the quality assurance of radiation treatment planning systems (TPS) by comparing and reviewing recommendations from major countries and organizations, as well as by analyzing the AAPM, ESTRO, and IAEA TPS quality assurance guidelines. We establish quality assurance items for acceptance testing, commissioning, periodic testing, system management, and security, and propose methods to perform each item within acceptable standards. Acceptance includes tests of hardware and network environments, data transmission, software, and benchmarking as specified by the system supplier, and apply the IAEA classification criteria. Commissioning includes dosimetric and non-dosimetric items for assessing TPS performance by applying the AAPM classification criteria and the latest technical items from the IAEA. Periodic quality assurance tests include daily, weekly, monthly, yearly, and occasional items by applying the AAPM classification criteria. System management and security items include the state and network connectivity of TPS, periodic data backup, and data access security. The guidelines for TPS quality assurance proposed in this study will help to improve the safety and quality of radiotherapy by preventing incidents related to radiotherapy.

A Portable IoT-cloud ECG Monitoring System for Healthcare

  • Qtaish, Amjad;Al-Shrouf, Anwar
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.269-275
    • /
    • 2022
  • Public healthcare has recently become an issue of great importance due to the exponential growth in the human population, the increase in medical expenses, and the COVID-19 pandemic. Speed is one of the crucial factors in saving life, particularly in case of heart attack. Therefore, a healthcare device is needed to continuously monitor and follow up heart health conditions remotely without the need for the patient to attend a medical center. Therefore, this paper proposes a portable electrocardiogram (ECG) monitoring system to improve healthcare for heart attack patients in both home and ambulance settings. The proposed system receives the ECG signals of the patient and sends the ECG values to a MySQL database on the IoT-cloud via Wi-Fi. The signals are displayed as an ECG data chart on a webpage that can be accessed by the patient's doctor based on the HTTP protocol that is employed in the IoT-cloud. The proposed system detects the ECG data of the patient to calculate the total number of heartbeats, number of normal heartbeats, and the number of abnormal heartbeats, which can help the doctor to evaluate the health status of the patient and decide on a suitable medical intervention. This system therefore has the potential to save time and life, but also cost. This paper highlights the five main advantages of the proposed ECG monitoring system and makes some recommendations to develop the system further.

System for Supporting the Decision about the Possibility of Concluding the Civil Law Agreements for Medical, Therapeutic and Dental Services

  • Hnatchuk, Yelyzaveta;Hovorushchenko, Tetiana;Shteinbrekher, Daria;Kysil, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.155-164
    • /
    • 2022
  • The review of known decisions showed that currently there are no systems and technologies for supporting the decision about the possibility of concluding the civil law agreements for medical, therapeutic and dental services. The paper models the decision-making support process on the possibility of concluding the civil law agreements for medical, therapeutic and dental services, which is the theoretical basis for the development of rules, methods and system for supporting the decision about the possibility of concluding the civil law agreements for medical, therapeutic and dental services. The paper also developed the system for supporting the decision about the possibility of concluding the civil law agreements for medical, therapeutic and dental services, which automatically and free determines the possibility or impossibility of concluding the corresponding civil law agreement for the provision of a corresponding medical service. In the case of formation of a conclusion about the possibility of concluding the agreement, further conclusion and signing of the corresponding agreement takes place. In the case of forming a conclusion about the impossibility of concluding the agreement, a request is made for finalizing the relevant agreement for the provision of the relevant medical service, indicating the reasons for the impossibility of concluding the agreement - missing essential conditions in the agreement. After finalization, the agreement can be analyzed again by the developed system for supporting the decision.

Telemedicine Security Risk Evaluation Using Attack Tree (공격트리(Attack Tree)를 활용한 원격의료 보안위험 평가)

  • Kim, Dong-won;Han, Keun-hee;Jeon, In-seok;Choi, Jin-yung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.951-960
    • /
    • 2015
  • The smart screening in the medical field as diffusion of smart devices and development of communication technologies is emerging some medical security concerns. Among of them its necessary to taking risk management measures to identify, evaluate and control of the security risks that can occur in Telemedicine because of the Medical information interchanges as Doctor to Doctor (D2D), Doctor to Patient (D2P). This research paper studies and suggests the risk analysis and evaluation methods of risk security that can occur in Telemedicine based on the verified results of Telemedicine system and equipment from the direct site which operating in primary clinics, public health centers and it's branches, etc.

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

Multilevel Security Management for Global Transactions

  • Jeong, Hyun-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.735-738
    • /
    • 2000
  • The most important issue in database security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of database. In this paper, we consider the security environment of multidatabase system with replicated data. The read-from relationship in the existed serializability is improper in security environment. So, we define new read-from relationship and propose new secure 1-copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure 1-copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.

  • PDF

A Prediction Triage System for Emergency Department During Hajj Period using Machine Learning Models

  • Huda N. Alhazmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.11-23
    • /
    • 2024
  • Triage is a practice of accurately prioritizing patients in emergency department (ED) based on their medical condition to provide them with proper treatment service. The variation in triage assessment among medical staff can cause mis-triage which affect the patients negatively. Developing ED triage system based on machine learning (ML) techniques can lead to accurate and efficient triage outcomes. This study aspires to develop a triage system using machine learning techniques to predict ED triage levels using patients' information. We conducted a retrospective study using Security Forces Hospital ED data, from 2021 through 2023 during Hajj period in Saudia Arabi. Using demographics, vital signs, and chief complaints as predictors, two machine learning models were investigated, naming gradient boosted decision tree (XGB) and deep neural network (DNN). The models were trained to predict ED triage levels and their predictive performance was evaluated using area under the receiver operating characteristic curve (AUC) and confusion matrix. A total of 11,584 ED visits were collected and used in this study. XGB and DNN models exhibit high abilities in the predicting performance with AUC-ROC scores 0.85 and 0.82, respectively. Compared to the traditional approach, our proposed system demonstrated better performance and can be implemented in real-world clinical settings. Utilizing ML applications can power the triage decision-making, clinical care, and resource utilization.