scholarly journals Keamanan Data Pasien dengan Algoritma Blowfish pada HOTSPODT

Author(s):  
Nuniek Fahriani ◽  
Indah Kurniawati

At HOTSPODT (Hospital Ship for Covid Disaster) there are no stages regarding the application of the use of information technology systems, especially for securing patient data which includes personal data and patient medical records. Confidential patient data collected during the current pandemic, including the patient’s name, address, diagnosis, family history and medical records without the patient’s consent, may pose a risk to the individual concerned. The concept of patient data security is adjusted to the user’s position on the importance of data. Access to patient data authorization is one of the security gaps that the security system needs to pay attention to and guard against. So, in this case applied a data security algorithm in the form of cryptography. The algorithm used is the Blowfish Algorithm. The test results of the scenario in the application prove that it can be successfully processed from the encrypted file to ciphertext until it is returned as the original file.

2019 ◽  
Vol 45 (9) ◽  
pp. 604-607 ◽  
Author(s):  
Elias Aboujaoude

Confidentiality is a central bioethical principle governing the provider–patient relationship. Dating back to Hippocrates, new laws have interpreted it for the age of precision medicine and electronic medical records. This is where the discussion of privacy and technology often ends in the scientific health literature when Internet-related technologies have made privacy a much more complex challenge with broad psychological and clinical implications. Beyond the recognised moral duty to protect patients’ health information, clinicians should now advocate a basic right to privacy as a means to safeguard psychological health. The article reviews empirical research into the functions of privacy, the implications for psychological development and the resigned sentiment taking hold regarding the ability to control personal data. The article concludes with a call for legislative, educational and research steps to readjust the equilibrium between the individual and ‘Big Data’.


2020 ◽  
Vol 5 (2) ◽  
pp. 259
Author(s):  
Beni Harzani ◽  
Diana Diana

Nagaswidak Health Center is one of the community health centers that is quite large and has complete facilities. But the problem that is often faced by officers in the puskesmas is the medical record data processing system which is still manual, causing the accumulation of patient medical record file data, in addition to patients who have been checked before and lost their medical records, it is very difficult for officers to find back, so the officer made a new medical record data. To overcome this problem, a Medical Records Filling Application was made at the Nagaswidak Health Center which includes the processing of medical records, patient data, drug data, action data, doctor data, and admin logins. So that the data search problem is not difficult, the turbo boyer moore algorithm method is applied which is expected to later be able to facilitate the search for patient data in the medical record filling application. Based on the test results Boyer Moore's Algorithm successfully applied to search for the beginning of a word, middle word, and final word. And the level of ease and usefulness of medical records application using Boyer Moore's algorithm obtained results that the level of ease is 80% and 100% usability rate.


Author(s):  
Sue Milton

The proliferation of data exposure via social media implies privacy and security are a lost cause. Regulation counters this through personal data usage compliance. Organizations must also keep non-personal data safe from competitors, criminals, and nation states. The chapter introduces leaders to the two data governance fundamentals: data privacy and data security. The chapter argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The fundamentals are then discussed more broadly, covering data and information management, cyber security, governance, and innovations in IT service provisioning. The chapter clarifies the complementary fundamentals and how they reduce data abuse. The link between privacy and security also demystifies the high resource costs in implementing and maintaining security practices and explains why leaders must provide strong IT leadership to ensure IT investment is defined and implemented wisely.


2019 ◽  
Author(s):  
Ray Hales Hylock ◽  
Xiaoming Zeng

BACKGROUND Blockchain has the potential to disrupt the current modes of patient data access, accumulation, contribution, exchange, and control. Using interoperability standards, smart contracts, and cryptographic identities, patients can securely exchange data with providers and regulate access. The resulting comprehensive, longitudinal medical records can significantly improve the cost and quality of patient care for individuals and populations alike. OBJECTIVE This work presents HealthChain, a novel patient-centered blockchain framework. The intent is to bolster patient engagement, data curation, and regulated dissemination of accumulated information in a secure, interoperable environment. A mixed-block blockchain is proposed to support immutable logging and redactable patient blocks. Patient data are generated and exchanged through Health Level-7 Fast Healthcare Interoperability Resources, allowing seamless transfer with compliant systems. In addition, patients receive cryptographic identities in the form of public and private key pairs. Public keys are stored in the blockchain and are suitable for securing and verifying transactions. Furthermore, the envisaged system uses proxy re-encryption (PRE) to share information through revocable, smart contracts, ensuring the preservation of privacy and confidentiality. Finally, several PRE improvements are offered to enhance performance and security. METHODS The framework was formulated to address key barriers to blockchain adoption in health care, namely, information security, interoperability, data integrity, identity validation, and scalability. It supports 16 configurations through the manipulation of 4 modes. An open-source, proof-of-concept tool was developed to evaluate the performance of the novel patient block components and system configurations. To demonstrate the utility of the proposed framework and evaluate resource consumption, extensive testing was performed on each of the 16 configurations over a variety of scenarios involving a variable number of existing and imported records. RESULTS The results indicate several clear high-performing, low-bandwidth configurations, although they are not the strongest cryptographically. Of the strongest models, one’s anticipated cumulative record size is shown to influence the selection. Although the most efficient algorithm is ultimately user specific, Advanced Encryption Standard–encrypted data with static keys, incremental server storage, and no additional server-side encryption are the fastest and least bandwidth intensive, whereas proxy re-encrypted data with dynamic keys, incremental server storage, and additional server-side encryption are the best performing of the strongest configurations. CONCLUSIONS Blockchain is a potent and viable technology for patient-centered access to and exchange of health information. By integrating a structured, interoperable design with patient-accumulated and generated data shared through smart contracts into a universally accessible blockchain, HealthChain presents patients and providers with access to consistent and comprehensive medical records. Challenges addressed include data security, interoperability, block storage, and patient-administered data access, with several configurations emerging for further consideration regarding speed and security.


Author(s):  
Ibnu Utomo Wahyu Mulyono ◽  
Ajib Susanto ◽  
Tiara Anggraeny ◽  
Christy Atika Sari

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.


2021 ◽  
Vol 8 (2) ◽  
pp. 89
Author(s):  
Aidha Puteri Mustikasari

<p><strong><em>Abstract</em></strong></p><p><em>Health services continue to develop following the updates in information technology, one of </em> <em>which is the use of telemedicine as a means of communicating between doctors and patients who experience long-distance consultation or treatment interactions. Not only to make it easier, but there are several new problems related to the delivery of informed consent, where any information related to disease diagnosis and treatment must be accepted, understood and approved by the patient. The recording of medical records has also experienced some turmoil because the data security system in Indonesia is not ready to allow the leakage of confidential information related to patients. Telemedicine is also not easy to do because there is no physical examination that can help doctors diagnose a disease, and it does not rule out that patients are not honest in providing information related to their condition. So this study focuses on how to deliver informed consent in the telemedicine process and the efforts that can be made to maintain the confidentiality of medical records. The government, the Indonesian Medical Association and the Medical Ethics Council are expected to support efforts to make telemedicine services in Indonesia safer and more orderly.</em></p><p><strong><em><br /></em></strong><em></em></p><p><strong> </strong></p><p><strong>Abstrak</strong></p><p>Layanan kesehatan terus berkembang mengikuti perkembangan teknologi informasi, salah  satunya adalah penggunaan telemedicine sebagai sara berhubungan antara dokter dengan pasien yang memberi kan pengalama konsultasi atau interaksi pengobatan jarak jauh. Tidak semata-mata mempermudah namun ada beberapa hal yang menjadi masalah baru yaitu terkait dengan penyampaian informed consent yang mana setiap informasi terkain dengan diagnose penyakit dan penangana harus dapat diterima, dimengerti dan disetujui oleh pasien. Pencatatan rekam medis juga mengalami guncngan karena belum siapnya sistem pengamanan data yang ada di Indonesia memungkinkan adanya kebocoran terhadap informasi rahasia terkait dengan pasien. Telemedicine juga tidak mudah untuk dilakukan pasalnya tidak adanyanya pemeriksaan fisik yang dapat membantu dokter dalam mendiagnosa suatu penyakit, serta tidak menutup kemungkinan bahwa pasien tidak jujur dalam memberikan informasi terkait dengan keadannya. Maka penelitian ini berfokus pada bagaimana cara penyampaian informed consent dalam proses telemedicine dan upaya yang dapat dilakukan untuk menjaga kerahasiaan rekam medik. Pemerintah, Ikatan Dokter Indonesia dan Majelis Kehormatan Etik Kedokteran diharapkan dapat mendukung upaya-upaya agar layanan telemedicine di Indonesia menjadi lebih aman dan tertata.</p><p> </p>


Author(s):  
Nurhayati ◽  
Yunita Wisda Tumarta Arif ◽  
Ahmad Yusron Yunizar

Electronic medical records record electronic medical records which contain personal data, demographic data, social data, clinical / medical data. Processing of medical record documents at doctor's practice health facilities is still done manually, starting from patient registration, writing examination history, and storing medical record documents. One of the efforts to overcome these obstacles is by building an Electronic Medical Record website. The website development method uses the development life cycle system. Medical records are processed from input patient data, diagnostic data, action data, drug data, officer data, registration data, examination data. Then the data is processed to produce reports, including patient data, and examination data. The electronic medical record website used can simplify the processing of medical record data.


10.2196/13592 ◽  
2019 ◽  
Vol 21 (8) ◽  
pp. e13592 ◽  
Author(s):  
Ray Hales Hylock ◽  
Xiaoming Zeng

Background Blockchain has the potential to disrupt the current modes of patient data access, accumulation, contribution, exchange, and control. Using interoperability standards, smart contracts, and cryptographic identities, patients can securely exchange data with providers and regulate access. The resulting comprehensive, longitudinal medical records can significantly improve the cost and quality of patient care for individuals and populations alike. Objective This work presents HealthChain, a novel patient-centered blockchain framework. The intent is to bolster patient engagement, data curation, and regulated dissemination of accumulated information in a secure, interoperable environment. A mixed-block blockchain is proposed to support immutable logging and redactable patient blocks. Patient data are generated and exchanged through Health Level-7 Fast Healthcare Interoperability Resources, allowing seamless transfer with compliant systems. In addition, patients receive cryptographic identities in the form of public and private key pairs. Public keys are stored in the blockchain and are suitable for securing and verifying transactions. Furthermore, the envisaged system uses proxy re-encryption (PRE) to share information through revocable, smart contracts, ensuring the preservation of privacy and confidentiality. Finally, several PRE improvements are offered to enhance performance and security. Methods The framework was formulated to address key barriers to blockchain adoption in health care, namely, information security, interoperability, data integrity, identity validation, and scalability. It supports 16 configurations through the manipulation of 4 modes. An open-source, proof-of-concept tool was developed to evaluate the performance of the novel patient block components and system configurations. To demonstrate the utility of the proposed framework and evaluate resource consumption, extensive testing was performed on each of the 16 configurations over a variety of scenarios involving a variable number of existing and imported records. Results The results indicate several clear high-performing, low-bandwidth configurations, although they are not the strongest cryptographically. Of the strongest models, one’s anticipated cumulative record size is shown to influence the selection. Although the most efficient algorithm is ultimately user specific, Advanced Encryption Standard–encrypted data with static keys, incremental server storage, and no additional server-side encryption are the fastest and least bandwidth intensive, whereas proxy re-encrypted data with dynamic keys, incremental server storage, and additional server-side encryption are the best performing of the strongest configurations. Conclusions Blockchain is a potent and viable technology for patient-centered access to and exchange of health information. By integrating a structured, interoperable design with patient-accumulated and generated data shared through smart contracts into a universally accessible blockchain, HealthChain presents patients and providers with access to consistent and comprehensive medical records. Challenges addressed include data security, interoperability, block storage, and patient-administered data access, with several configurations emerging for further consideration regarding speed and security.


Author(s):  
V. Z. Stetsiuk ◽  
N. H. Horovenko ◽  
A. Y. Savytskyi ◽  
N. A. Pichkur ◽  
K. K. Kytaiev

This article describes the complexity of managing medical records of patients with MPS and monitoring them throughout their live. A general solution of these problems is produced by implementing an automated clinical database for monitoring the patients with mucopolysacharidosis. This application is designed to record and store information about patients with six types of MPS . The user can create, edit, store patient records , which include such data as the patients passport information, visits, test results, method of treatment , objective status . Also, the application has such functions such as : patient data search using a variety of filters, tracking patients visits on current week, estimation of the total requirement of drugs and the cost of these drugs.


2021 ◽  
Vol 4 (2) ◽  
pp. 89
Author(s):  
Lintang Bagas Adrianto ◽  
Mohammad Iwan Wahyuddin ◽  
Winarsih Winarsih

The development of technology in security systems combined with facial recognition, of course, makes every protected data safe. Many methods can be combined with a security system, one of which is the eigenface method, which is part of facial recognition. In this study, a personal data security system was built using Android-based deep learning. Based on the results of tests carried out on three devices with different Android versions, it is known, if on Android 8.1 (Oreo) the maximum distance is ± 40 cm, on Android 9.0 (Pie) the maximum distance is ± 50 cm, and on the Android version, 10.0 (Q) the maximum distance for facial object recognition is ± 60 cm. From the test results, it is known that by using the eigenface method, the farther the face is from the camera, the face cannot be detected. The implementation of this system is expected to protect personal data safely.Keywords:Face recognition, Deep Learning, Android, Eigenface.


Sign in / Sign up

Export Citation Format

Share Document