scholarly journals Confidential Health Care Data Exchange Between Multiple Entities in Cloud using Block Chain

Data in the cloud is leading to the more interest for cyber attackers. These days’ attackers are concentrating more on Health care data. Through data mining performed on health care data Industries are making Business out of it. These changes are affecting the treatment process for many people so careful data processing is required. Breaking these data security leads to many consequences for health care organizations. After braking security computation of private data can be performed. By data storing and running of computation on a sensitive data can be possible by decentralization through peer to peer network. Instead of using the centralized architecture by decentralization the attacks can be reduced. Different security algorithms have been considered. For decentralization we are using block chain technology. Privacy, security and integrity can be achieved by this block chain technology. Many solutions have been discussed to assure the privacy and security for Health care organizations somehow failed to address this problem. Many cryptographic functions can be used for attaining privacy of data. Pseudonymity is the main concept we can use to preserve the health care means preserving data by disclosing true identity legally.

Electronic Medical Records are now widely used by medical organizations as a replacement for physical manual records of the patients. These Electronic Medical Records (EMR) were effectively adopted as a result of the evolution in the field of Information technology supported by more innovative computer science engineering feats, as the EMR systems became more advanced it still had a drawback of being vulnerable to cyber attacks, which will eventually compromise the integrity and confidentiality. Hence the same EMR system is built along with the use of Block-chain technology on a cloud storage platform, this system will be integrated with various features compatible for the interoperability between the patients and medical service providers. The main objective of this project is to leverage maximum cyber protection to the EMR system.


Healthcare ◽  
2020 ◽  
Vol 8 (4) ◽  
pp. 517
Author(s):  
Cristian Lieneck ◽  
Joseph Garvey ◽  
Courtney Collins ◽  
Danielle Graham ◽  
Corein Loving ◽  
...  

The implementation and continued expansion of telehealth services assists a variety of health care organizations in the delivery of care during the current COVID-19 global pandemic. However, limited research has been conducted on recent, rapid telehealth implementation and expansion initiatives regarding facilitators and barriers surrounding the provision of quality patient care. Our rapid review evaluated the literature specific to rapid telehealth implementation during the current COVID-19 pandemic from three research databases between January 2020 and May 2020 and reported using preferred reporting items for systematic reviews and meta-analyses (PRISMA). The results indicate the rapid implementation and enhanced use of telehealth during the COVID-19 pandemic in the United States surrounding the facilitators and barriers to the provision of patient care, which are categorized into three identified themes: (1) descriptive process-oriented implementations, (2) the interpretation and infusion of the CARES Act of 2020 telehealth exemptions related to the relaxation of patient privacy and security (HIPAA) protocols, and (3) the standard of care protocols and experiences addressing organizational liability and the standard of care. While the study limitation of sample size exists (n = 21), an identification of rapid telehealth implementation advancements and challenges during the current pandemic may assist health care organizations in the delivery of ongoing quality care during the COVID-19 pandemic.


Author(s):  
Pascal Maniriho ◽  
Leki Jovial Mahoro ◽  
Zephanie Bizimana ◽  
Ephrem Niyigaba ◽  
Tohari Ahmad

Maintaining the privacy and security of confidential information in data communication has always been a major concern. It is because the advancement of information technology is likely to be followed by an increase in cybercrime, such as illegal access to sensitive data. Several techniques were proposed to overcome that issue, for example, by hiding data in digital images. Reversible data hiding is an excellent approach for concealing private data due to its ability to be applied in various fields. However, it yields a limited payload and the quality of the image holding data (Stego image), and consequently, these two factors may not be addressed simultaneously. This paper addresses this problem by introducing a new non-complexity difference expansion (DE) and block-based reversible multi-layer data hiding technique constructed by exploring DE. Sensitive data are embedded into the difference values calculated between the original pixels in each block with relatively low complexity. To improve the payload capacity, confidential data are embedded in multiple layers of grayscale medical images while preserving their quality. The experiment results prove that the proposed technique has increased the payload with an average of 369999 bits and kept the peak signal to noise ratio (PSNR) to the average of 36.506 dB using medical images' adequate security the embedded private data. This proposed method has improved the performance, especially the secret size, without reducing much the quality. Therefore, it is suitable to use for relatively big payloads.


2012 ◽  
Vol 3 ◽  
pp. S71
Author(s):  
E. Devriendt ◽  
N. Wellens ◽  
L. Vesentini ◽  
L. Van Eenoo ◽  
A. Declercq ◽  
...  

2020 ◽  
Vol 9 (1) ◽  
pp. 1906-1910

The rapid growth development of the Internet of Things (IoT) has supported communication between various smart devices and it helps to exchange data between them. IoT is very highly demand topics between the researchers. The main goal of IoT in health care is to provide real time monitoring of the patient. But these new challenges also introduced the privacy and security to the health care data. Security is a major concern of the data. A system requires with authentic protocol for maintaining privacy of health care data. After going through all methodologies of the protocol encryption will be carried out of data of the health care with “two fish” encryption technique. At server side, it will automatically get decrypted after applying key. Two fish encryption algorithm is a block cipher algorithm of 128 bit. The key length vary until 256 bit. Key is divided in two parts as the first half of the key will encrypt the plain text and second half of the key will modify the encryption algorithm.


2016 ◽  
Vol 9 (1) ◽  
pp. 81-100
Author(s):  
Eduardo Fernandes ◽  
Marcio Aparecido Silva ◽  
Maria Istela Cagnin

In Brazil, information systems have been used to support government activities, such as public social and health care. For instance, SIGS is a web information system for management of social programs. Another example of information system is e-SUS for health care data management. Considering that crossing data from social and health care may be useful in decision-making for both areas, the SIGS-S project was proposed. It consists of a web appli- cation and a mobile application for social and health care data management. SIGS-S Web is a web application composed by two subsystems, SIGS-S Web So- cial, resulting of the reengineering of SIGS, and SIGS-S Web Saúde, inspired by data forms from e-SUS. SIGS-S Mobile Saúde is a mobile application to support health data collection. Processes ProFap and ProFap-R were used during their development. As a result, both web and mobile applications, as well as web services to support cross-application data exchange, were developed. Furthermore, it was prepared the documentation for both applications to help future software maintenance. Both applications were developed and validated with participation of stakeholders (health users and government managers).


Author(s):  
Caspar C. Berghout ◽  
Jolien Zevalkink ◽  
Abraham N. J. Pieters ◽  
Gregory J. Meyer

In this study we used a quasiexperimental, cross-sectional design with six cohorts differing in phase of treatment (pretreatment, posttreatment, 2-year posttreatment) and treatment type (psychoanalysis and psychoanalytic psychotherapy) and investigated scores on 39 Rorschach-CS variables. The total sample consisted of 176 participants from four mental health care organizations in The Netherlands. We first examined pretreatment differences between patients entering psychoanalysis and patients entering psychoanalytic psychotherapy. The two treatment groups did not seem to differ substantially before treatment, with the exception of the level of ideational problems. Next, we studied the outcome of psychoanalysis and psychoanalytic psychotherapy by comparing the Rorschach-CS scores of the six groups of patients. In general, we found significant differences between pretreatment and posttreatment on a relatively small number of Rorschach-CS variables. More pre/post differences were found between the psychoanalytic psychotherapy groups than between the psychoanalysis groups. More research is needed to examine whether analyzing clusters of variables might reveal other results.


Sign in / Sign up

Export Citation Format

Share Document