• Title/Summary/Keyword: Medical Security System

Search Result 360, Processing Time 0.025 seconds

Telemedicine Software Application

  • UNGUREANU, Ovidiu Costica;POPESCU, Marius-Constantin;CIOBANU, Daniela;UNGUREANU, Elena;SARLA, Calin Gabriel;CIOBANU, Alina-Elena;TODINCA, Paul
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.171-180
    • /
    • 2021
  • Currently, hospitals and medical practices have a large amount of unstructured information, gathered in time at each ward or practice by physicians in a wide range of medical branches. The data requires processing in order to be able to extract relevant information, which can be used to improve the medical system. It is useful for a physician to have access to a patient's entire medical history when he or she is in an emergency situation, as relevant information can be found about the patient's problems such as: allergies to various medications, personal history, or hereditary collateral conditions etc. If the information exists in a structured form, the detection of diseases based on specific symptoms is much easier, faster and with a higher degree of accuracy. Thus, physicians may investigate certain pathological profiles and conduct cohort clinical trials, including comparing the profile of a particular patient with other similar profiles that already have a confirmed diagnosis. Involving information technology in this field will change so the time which the physicians should spend in front of the computer into a much more beneficial one, providing them with the possibility for more interaction with the patient while listening to the patient's needs. The expert system, described in the paper, is an application for medical diagnostic of the most frequently met conditions, based on logical programming and on the theory of probabilities. The system rationale is a search item in the field basic knowledge on the condition. The web application described in the paper is implemented for the ward of pathological anatomy of a hospital in Romania. It aims to ease the healthcare staff's work, to create a connection of communication at one click between the necessary wards and to reduce the time lost with bureaucratic proceedings. The software (made in PHP programming language, by writing directly in the source code) is developed in order to ease the healthcare staff's activity, being created in a simpler and as elegant way as possible.

The Evaluation-based CBR Model for Security Risk Analysis (보안위험분석을 위한 평가기반 CBR모델)

  • Bang, Young-Hwan;Lee, Gang-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.282-287
    • /
    • 2007
  • Information society is dramatically developing in the various areas of finance, trade, medical service, energy, and education using information system. Evaluation for risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, Modeling it did the evaluation-base CBD function it will be able to establish the evaluation plan of optimum. Evaluation-based CBD(case-based reasoning) functions manages a security risk analysis evaluation at project unit. it evaluate the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and Result security risk analysis evaluation of optimum about under using planning.

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

A Review of Security and Privacy of Cloud Based E-Healthcare Systems

  • Faiza Nawaz;Jawwad Ibrahim;Maida Junaid
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.153-160
    • /
    • 2024
  • Information technology plays an important role in healthcare. The cloud has several applications in the fields of education, social media and medicine. But the advantage of the cloud for medical reasons is very appropriate, especially given the large volume of data generated by healthcare organizations. As in increasingly health organizations adopting towards electronic health records in the cloud which can be accessed around the world for various health issues regarding references, healthcare educational research and etc. Cloud computing has many advantages, such as "flexibility, cost and energy savings, resource sharing and rapid deployment". However, despite the significant benefits of using the cloud computing for health IT, data security, privacy, reliability, integration and portability are some of the main challenges and obstacles for its implementation. Health data are highly confidential records that should not be made available to unauthorized persons to protect the security of patient information. In this paper, we discuss the privacy and security requirement of EHS as well as privacy and security issues of EHS and also focus on a comprehensive review of the current and existing literature on Electronic health that uses a variety of approaches and procedures to handle security and privacy issues. The strengths and weaknesses of some of these methods were mentioned. The significance of security issues in the cloud computing environment is a challenge.

Monitoring System for Elderly Living Alone using Ubiquitous Sensor and ZigbeX (유비쿼터스 센서와 ZigbeX를 이용한 독거노인 모니터링 시스템 구현)

  • Shin, Jin-Ho;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.30 no.B
    • /
    • pp.55-59
    • /
    • 2010
  • The number of elderly people living alone increases with the trend of nuclear family in recent aging society and advances of health and medical technologies, where the safety of the elderly people becomes a big social issue. One of the safety system for them these days is that security guards regularly visit homes of the elderly living alone to check their safety. However, it is an inefficient system since it costs a great deal. So, a new efficient system with low cost using modern advanced technologies needs to be developed. In this paper, we implement a monitoring system for elderly living alone using ubiquitous sensor and zigbeX. The system can remotely determine the health status of elderly people and report to their hospitals. Since the system can be implemented with low cost and do the same job as security guards do, we expect that it should replace the existing expensive monitoring system.

  • PDF

A Study on the Procedure, Method of Search and Seizure for HIS (Hospital Information System) (의료정보시스템의 압수수색 절차와 방법에 대한 연구)

  • Kim, Taehoon;Lee, Sangjin
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.83-96
    • /
    • 2018
  • Electronic medical records in the hospital information system are the important evidence related to the crime and are subject to search and seizure. In the case of a large general hospital, it is possible to search for seizures through cooperation of the staff, but it is impossible in small hospitals. The investigation agency copies the database of electronic medical records and then selects relevant content. This approach has an issue of excessive search and seizure. In this paper, we propose field selection procedures and methods for electronic medical records while ensuring integrity, reproducibility, and chain of custody. Currently, it is necessary to study the procedures and methods of search and seizure of medical information system so that it can respond to next changing cloud hospital information system.

Medical Image Verification Watermarking for Healthcare Information Management

  • Choi, Un-Sook;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.205-210
    • /
    • 2017
  • This paper presents a verification watermarking applied to healthcare information management. The proposed method uses the whole region based on the public-key cryptograph, which is transformed by the DWT transform to integrity verification. Furthermore, the public-key cryptograph algorithm is used for the embedded watermark image. We adaptively select the upper bit-plane including the LSB parts of each block when the watermark is inserted.

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

The Development Path of China's Private Health Insurance and Its Role in the Health Care System (중국 민간의료보험의 발전경로와 의료보장체계에서의 역할)

  • Jung, Kee Taig;Fan, Jian Cheng;Chen, Wan Yun
    • Health Policy and Management
    • /
    • v.31 no.4
    • /
    • pp.423-436
    • /
    • 2021
  • This article summarizes the structure of China's current social health insurance system and reviews the development status of China's private health insurance (PHI). China's medical security system is mainly composed of two parts: basic medical insurance (BMI) and PHI. Among them, the BMI provides reimbursement of basic medical expenses for the insured persons according to different proportions. PHI is a necessary supplement to the BMI and provides assistance to the insured persons in the event of illness or accident. By having PHI, people can obtain medical protection outside the coverage of BMI. In the development of PHI in China, the total medical cost is high and the insurance market size is large, but the proportion of PHI expenditure is low and the personal burden is high. Through this Chinese case, it will be helpful for mutual development between Korean PHI and national health insurance, for Korean insurance companies to enter the Chinese market, and for removing the medical burden on the people.