scholarly journals A novel Double Tier Cryptographic System (nDTCS) to Reinforce Patients’ Privacy in Contemporary COVID-19 Telemedicine

Author(s):  
ANIRBAN BHOWMIK ◽  
JOYDEEP DEY ◽  
SUNIL KARFORMA

Abstract In this modern COVID-19 telemedicine industry, privacy and security of patients’ information is the most open challenge to keep it intact. Considering the current legal regulations, every hospital must impose a prominent security technique to maintain a secure electronic health records system. The realization of telemedicine is another notable advancement in the field of medical sciences. The healthcare services have increased its throughput with the help of Internet based computing. Recently, security flaws on patient’s information have become a more significant challenge in electronic healthcare system. Electronics health record i.e. collection of health related patients’ information are extremely sensitive in nature. So, it is very relevant to impose an advanced security techniques in such systems. Here, we have focused on security issues likes of technical safeguards. A novel Double Tier Cryptographic System (nDTCS) have been proposed here. We had proposed a modified logistic map and linear congruence based security model for the secured telemedicine transactions with an authentication technique. For encryption and decryption purpose, two keys have been used which were intermediate key, and session key. The modified logistic map and secret sharing were the backbone of the proposed technique. This new approach of key generation provides newness as well as extra robustness in our proposed technique. The chaotic sequences in the ranges of I and n on the initial values , and t respectively were noted under this technique test. 264, 2256, 21024, 24096, 216384hand 265536 were the possibilities of combined key space volumes. The different types of mathematical experiments like randomness test, brute force, histogram analysis and their obtained results have guided that it is very secured and efficient for patients’ data transmission in health sectors.

2011 ◽  
pp. 219-238 ◽  
Author(s):  
Pooja Deshmukh ◽  
David Croasdell

This chapter explores privacy and security issues in health care. It describes the difference between privacy and security in the context of health care, identifies sources of concern for individuals who use information technologies for health-related purposes, and presents technology-based solutions for privacy and security in health care networks. The purpose of the chapter is to provide an investigation of the sources of concern for regulations and technologies in the health care industry. The discussion is based on the Health Insurance Portability and Accountability Act (HIPAA) and its eight guiding principles. The chapter explores the implications of legal and regulatory environments driving HIPAA regulations, the need for privacy and security in health care networks, and information technologies used in the health care industry. Related ethical issues, current technologies for providing secure solutions that comply with the regulations, and products emerging in the market are also examined.


2011 ◽  
pp. 1897-1909
Author(s):  
Pooja Deshmukh ◽  
David Croasdell

This chapter explores privacy and security issues in health care. It describes the difference between privacy and security in the context of health care, identifies sources of concern for individuals who use information technologies for health-related purposes, and presents technology-based solutions for privacy and security in health care networks. The purpose of the chapter is to provide an investigation of the sources of concern for regulations and technologies in the health care industry. The discussion is based on the Health Insurance Portability and Accountability Act (HIPAA) and its eight guiding principles. The chapter explores the implications of legal and regulatory environments driving HIPAA regulations, the need for privacy and security in health care networks, and information technologies used in the health care industry. Related ethical issues, current technologies for providing secure solutions that comply with the regulations, and products emerging in the market are also examined.


Author(s):  
Pappu Sowmya ◽  
R Kumar

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet, while providing the privacy and security. By using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, ‘virtualization’ is one of the techniques dividing memory into different blocks. In most of the existing systems there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: 1) allotting the VSM(VM Security Monitor) model for each virtual machine; 2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model.


2022 ◽  
pp. 104-130
Author(s):  
Sudhakar Hallur ◽  
Roopa Kulkarni ◽  
Prashant P. Patavardhan ◽  
Vishweshkumar Aithal

A majority of the applications now go wireless involving IoT as a technology to communicate to their respective destination. IoT is considered as a future of internet. The internet of things integration and efficient communication of the patient health monitoring parameters is the need of the hour in this pandemic. This chapter discusses the three-layer architecture involving hardware communication protocols supporting a layer of healthcare services and applications. Also, the data-guarantee, security and integrity issues, threats risks, and solutions involving deployment of efficient privacy, control, integration methods to confront various prominent and erroneous data manipulation techniques, malicious, and a series of cyber-attacks are proposed. The deployment of various efficient privacy and security protocols in IoT networks is of extreme need to ensure the confidentiality, access-control, authentication, and integrity of the health data transferred and to guarantee the availability of the services to the user at any point of time.


Author(s):  
Prashant Srivastava ◽  
Niraj Kumar Tiwari ◽  
Ali Abbas

Organizations now have knowledge of big data significance, but new challenges stand up with new inventions. These challenges are not only limited to the three Vs of big data, but also to privacy and security. Attacks on big data system ranges from DDoS to information theft, ransomware to end user level security. So implementing security to big data system is a multiple phase-based ongoing process in which security is imposed from perimeter level to distributed file system security, cloud security to data security, storage to data mining security, and so on. In this chapter, the authors have identified some key vulnerable point related to big data and also proposed a security model.


2008 ◽  
pp. 2770-2781
Author(s):  
Pooja Deshmukh ◽  
David Croasdell

This chapter explores privacy and security issues in health care. It describes the difference between privacy and security in the context of health care, identifies sources of concern for individuals who use information technologies for health-related purposes, and presents technology-based solutions for privacy and security in health care networks. The purpose of the chapter is to provide an investigation of the sources of concern for regulations and technologies in the health care industry. The discussion is based on the Health Insurance Portability and Accountability Act (HIPAA) and its eight guiding principles. The chapter explores the implications of legal and regulatory environments driving HIPAA regulations, the need for privacy and security in health care networks, and information technologies used in the health care industry. Related ethical issues, current technologies for providing secure solutions that comply with the regulations, and products emerging in the market are also examined.


Author(s):  
K Dinesh Kumar ◽  
E Umamaheswari

Cloud computing is one of the trending technologies that provide boundless virtualized resources to the internet users as an important services through the internet while providing the privacy and security. Using these cloud services, internet users get many parallel computing resources at low cost. It predicted that till 2016, revenues from the online business management spent $4 billion for data storage. Cloud is an open-source platform structure, so it is having more chances to malicious attacks. Privacy, confidentiality, and security of stored data are primary security challenges in cloud computing. In cloud computing, “virtualization” is one of the techniques dividing memory into different blocks. In most of the existing systems, there is only single authority in the system to provide the encrypted keys. To fill the few security issues, this paper proposed a novel authenticated trust security model for secure virtualization system to encrypt the files. The proposed security model achieves the following functions: (1) allotting the VM security monitor model for each virtual machine and (2) providing secret keys to encrypt and decrypt information by symmetric encryption.The contribution is a proposed architecture that provides a workable security that a cloud service provider can offer to its consumers. Detailed analysis and architecture design presented to elaborate security model. 


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zeeshan Ali ◽  
Bander A. Alzahrani ◽  
Ahmed Barnawi ◽  
Abdullah Al-Barakati ◽  
Pandi Vijayakumar ◽  
...  

In smart cities, common infrastructures are merged and integrated with various components of information communication and technology (ICT) to be coordinated and controlled. Drones (unmanned aerial vehicles) are amongst those components, and when coordinated with each other and with the environment, the drones form an Internet of Drones (IoD). The IoD provides real-time data to the users in smart cities by utilizing traditional cellular networks. However, the delicate data gathered by drones are subject to many security threats and give rise to numerous privacy and security issues. A robust and secure authentication scheme is required to allow drones and users to authenticate and establish a session key. In this article, we proposed a provably secure symmetric-key and temporal credential-based lightweight authentication protocol (TC-PSLAP) to secure the drone communication. We prove that the proposed scheme is provably secure formally through the automated verification tool AVISPA and Burrows–Abadi–Needham logic (BAN logic). Informal security analysis is also performed to depict that the proposed TC-PSLAP can resist known attacks.


Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


Sign in / Sign up

Export Citation Format

Share Document