scholarly journals Research on E-healthcare Security Evaluation in Cloud-Based System

2019 ◽  
Vol 8 (2S11) ◽  
pp. 3054-3058

As healthcare adopts electronic methods of storing patient health records, cloud technology allows mining and analyzing this data and accessing the general public health information. Patient’s privacy and security of personal information is crucial when considering using electronic health records in the healthcare industry (E-Healthcare). The need of the hour is to be able to store and recover patient’s data efficiently. However, moving patient’s medical information to the Cloud involves major security risks and destructs robust data privacy of health records. The threat of data breaches and the need to manage huge amounts of data are issues that have affected the healthcare industry for years. The privacy issues and threats faced by E-healthcare systems include network attacks and threats to hosts and unsanctioned access to EHR records. The major EHR system functions such as appointment scheduling, dietary planning, admission and discharge, transfer radiology/lab orders and prescription order entry are vulnerable to security threats. Security issues need to be assessed thoroughly in order for hospitals and other such medical institutions to shift to electronic standards of maintaining patient's data. Before moving to a cloud-based architecture, health organizations should perform a risk assessment. This will help to identify the security measures required to mitigate these risks. This approach provides a valid assessment of the security risk management procedure approved by field experts. It not only identifies threats to E-healthcare but also allows for a structured flow in risk management. The risk management process is documented and reported in an efficient and easy way for concerned stakeholders of the E-healthcare to understand. It will compare existing solutions on how to protect the confidentiality of patient information. Some of these methods include implementation of a Role-Based Access Control (RBAC) model, digital encryption and signature for cloud security and EHR service continuity management. Moreover, it will consider security matters that CSP’s should look into while storing patient’s record. Ultimately, it will come up with the most suitable solution to make E-Healthcare systems more secure. In this paper, the focus will be on identifying security encounters that E-health systems face by discussing means in which these systems are susceptible to attacks.

2018 ◽  
Author(s):  
Mian Zhang ◽  
Yuhong Ji

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology that maintains the Bitcoin transaction ledger. Blockchain as a promising technology to manage the transactions has been gaining popularity in the domain of healthcare. Blockchain technology has the potential of securely, privately, and comprehensively manage patient health records. In this work, we discuss the latest status of blockchain technology and how it could solve the current issues in healthcare systems. We evaluate the blockchain technology from the multiple perspectives around healthcare data, including privacy, security, control, and storage. We review the current projects and researches of blockchain in the domain of healthcare records and provide the insight into the design and construction of next generations of blockchain-based healthcare systems.


CivilEng ◽  
2020 ◽  
Vol 1 (3) ◽  
pp. 275-290
Author(s):  
Rene Kudszus ◽  
Robert Klemencic ◽  
Panagiotis Spyridis

Fastenings are becoming increasingly important in modern building practice. A wide range of products cover for the great flexibility that they provide in a large variety of applications. In order to ensure the safe and economical use of the fastenings, a combined effort of manufacturing firms, practicing engineers and constructors, research organizations, and public authorities has led to the establishment of interrelated design standards, application guidance, and product approvals. It is however evident that failures, in fact even small defects, of fastenings can lead to disproportionate catastrophic events. In addition to these state-of-the-art documents, which reflect the most precise knowledge possible, a management of possible residual risks and hence causes of failure is also indispensable. Due to the great range of fastening systems with different dimensioning and assembly guidelines, load-bearing behaviour and areas of application, and the overall complexity of the subject, a coherent risk management procedure against structural risks can be very helpful in this respect. This article deals with the technical and load-bearing related risks of fastening technology in construction. The objective of the paper is to introduce fundamental concepts and significant risks met in the fastenings design specification and installation. Moreover, it provides a rating of the identified risks and it transfers recommendations for risk mitigation, based on semi-structured interviews with expert professionals who are active in the field. The results are accumulated in a dedicated risk register as a standard tool of the risk management process in civil engineering, which is the first of its kind in current scientific literature. The aim is to assist future practice and research by providing a basis for risk management considerations for fastenings, which moreover reflects actual risks indicated in the outcome of an industry survey.


Author(s):  
Sathiyabhama B. ◽  
Rajeswari K. C. ◽  
Reenadevi R. ◽  
Arul Murugan R.

Technology is a boon to mankind in this fast-growing era. The advancement in technology is the predominant factor for the sophisticated way of living of the people. In spite of technology, revolution happens across the world, and mankind still suffers due to various health issues. Healthcare industries take immense measures to improve the quality of life. An enormous volume of digital data is being handled every day in the healthcare industry. There arises a need for the intervention of technology in the healthcare industry to be taken to a greater extent. The prime duty of any healthcare industry is to store and maintain those data in the form of electronic health records (EHR) in a secured manner.


2020 ◽  
Author(s):  
Junghwan Lee ◽  
Casey Ta ◽  
Jae Hyun Kim ◽  
Cong Liu ◽  
Chunhua Weng

The novel coronavirus disease-2019 (COVID-19) pandemic has threatened the health of tens of millions of people worldwide and posed enormous burden on global healthcare systems. In this paper, we propose a model to predict whether a patient infected with COVID-19 will develop severe outcomes based only on the patient's historical electronic health records (EHR) using recurrent neural networks (RNN). The predicted severity risk score represents the probability for a person to progress into severe status (mechanical ventilation, tracheostomy, or death) after being infected with COVID-19. While many of the existing models use features obtained after diagnosis of COVID-19, our proposed model only utilizes a patient's historical EHR to enable proactive risk management at the time of hospital admission


Author(s):  
Sathiyabhama B. ◽  
Rajeswari K. C. ◽  
Reenadevi R. ◽  
Arul Murugan R.

Technology is a boon to mankind in this fast-growing era. The advancement in technology is the predominant factor for the sophisticated way of living of the people. In spite of technology, revolution happens across the world, and mankind still suffers due to various health issues. Healthcare industries take immense measures to improve the quality of life. An enormous volume of digital data is being handled every day in the healthcare industry. There arises a need for the intervention of technology in the healthcare industry to be taken to a greater extent. The prime duty of any healthcare industry is to store and maintain those data in the form of electronic health records (EHR) in a secured manner.


2020 ◽  
pp. 5-15
Author(s):  
Abhishek P. Patil ◽  
◽  
◽  
Neelika Chakrabarti

The Health Insurance Portability and Accountability Act of 1996 was brought in to serve as a legislation that could essentially assist in reorganizing the flow of healthcare information, prescribing how sensitive medical data stored with healthcare/insurance firms should be protected from stealing and tampering. It has served as a pioneer in the world of privacy in healthcare and set one of the earliest benchmarks for any legal instruments regarding the storing and dissemination of medical information in the form of electronic health records. The HITECH act of 2009 and the HIPAA omnibus rule of 2013 further cemented the use of standardized frameworks which can help control, reduce and track any possible breaches of confidentiality and integrity of such personal information. This paper explores the content, reasoning, and timeline of the HIPAA act and the impact it creates on the health information technology sector. It also explains the challenges that are faced in the implementation of the policy and gives a holistic perspective of the rights and responsibilities of each stakeholder involved.


Author(s):  
Mian Zhang ◽  
Yuhong Ji

A problem facing healthcare record systems throughout the world is how to share the medical data with more stakeholders for various purposes without sacrificing data privacy and integrity. Blockchain, operating in a state of consensus, is the underpinning technology that maintains the Bitcoin transaction ledger. Blockchain as a promising technology to manage the transactions has been gaining popularity in the domain of healthcare. Blockchain technology has the potential of securely, privately, and comprehensively manage patient health records. In this work, we discuss the latest status of blockchain technology and how it could solve the current issues in healthcare systems. We evaluate the blockchain technology from the multiple perspectives around healthcare data, including privacy, security, control, and storage. We review the current projects and researches of blockchain in the domain of healthcare records and provide the insight into the design and construction of next generations of blockchain-based healthcare systems.


2019 ◽  
Author(s):  
Sudhanshu Joshi

BACKGROUND Blockchain provides a digital platform that keeps the digital history of all transactions across different levels of users. With its emerging presence, no industry is excluded from the benefits that BC can bring into it. BC has disrupted the business processes by enabling ‘Trust-based’ transactions without third party involvement with high level of success(Firdaus et al., 2019; Pan et al., 2019; Queiroz and Wamba, 2019).The intrinsic uniqueness of blockchain design ensures vital features including transparency, robustness, audit-ability, and security(Casino, Dasaklis and Patsakis, 2018; Grover, Kar and Janssen, 2019).Since its inception, BC has expanded its applications and continuously revolutionizing the markets and the society(Nakamoto, 2008; Christidis and Devetsikiotis, 2016; Antonucci et al., 2019; Hsieh and Wu, 2019;Ozdemir, Ar and Erol, 2019; Xie et al., 2019). It is inclusive of variety of technologies that aims to exchange information and digital assets, across distributed e-networks (Ahram et al., 2017; Subramanian, 2018). Thus,the presence of BC is virtually transforming various industries, ranging from service entities (viz., Hospital, Healthcare, Tourism, Event Management, Banking etc.) to operations and supply chain management(Dabbagh, 2019).It is estimated that by 2022, more than 1B people will have data stored on a BC(Forbes,2018), and by 2030, BC will create $3.1 trillion in business value(Gartner, 2019) andit is quite predictable that the number shall further goes up over the coming years(Deloitte, 2018).Both practitioners and academic researchers have confirmed the array of capabilities that BC encapsulates across variety of sectors(Antonucci et al.,2019; Morkunas et al.,2019;Ozdemir et al., 2019; Wamba and Queiroz, 2019; Wang and Qu, 2019; Xu et al., 2019). OBJECTIVE The aim of the paper is to identify the barriers towards the adoption of blockchain in Indian healthcare industry and also examines the most pertinent issues related to Blockchain applications in healthcare industry. METHODS This study has applied hybrid method (Interpretative Structural Modeling (ISM) and Fuzzy MICMAC) to identify the existing relationship among various Block chain adoption barriers RESULTS Our study brings exciting insights for BC and healthcare professionals. First, the study presents the different dimensions those can impact the block chain implementation in healthcare industry and are acting as barriers in the adoption on the basis of literature and experts confirmation. 2nd our results indicate the legal framework and top level management involvement are independent and have maximum impact in the journey of BC adoption. Top management needs to be aware first about the BCT, its architecture and how it is going to benefit the firm overall. For ensuring the top management involvement, they need to understand how they can minimize the transaction delays of their healthcare processes. Also top management need to understand the cost of adoption versus the benefits in terms of increase in productivity, effectiveness and improving the performance of their entire healthcare system. Next major problem is legal issues in BCs. It is challenging to set the rules and regulations for a decentralized environment of BCs. In the case of healthcare systems, the patient is one of the important stakeholders as information provider. Few questions arise such as who will be having the authority to correct or delete the information and who will be responsible for any unintentional incidents that may happen in healthcare systems. Additionally the concerns related to storage capability, trust issues, data ownership, scalability, high maintenance and development cost along with risk of patient data hacking are dependent variables on number of factors and need to be given a fair attention while designing the architecture for BC adoption in healthcare setting. Firms also need pay attention with high driving power and highly dependent variables such as ‘availability of trained people those have skills of handling the complex technology’, ‘provision of adequate infrastructure for the adoption of BCT’, ‘assurance of data privacy and security’ and ‘tools and techniques for data standardization’. CONCLUSIONS In this paper, we intended to spot the barriers in adoption of BCT in healthcare setting and the relationship between the identified barriers in terms of their driving and dependence power. Our proposal of identification of these barriers was a combination of ISM and Fuzzy-MICMAC. CLINICALTRIAL NA


A breach of data is a reported occurrence where private, sensitive, or covered records have been compromised and/or released unlawfully mostly due to cyber attacks or theft. Breach of data can include personal health records, personal information, travel information, trade secrets, intellectual property, or information you provided to or is stored on a platform. Data revealed to breaches pose a security and privacy risk to Users around the world. Despite these, guidelines on how organizations can react to breaches, or how to manage information securely once it has leaked, still haveto be established. More than 3 billion people suffered and became victims of data breaches and cyber attacks in the last two decades leading to loss of personal data as well as monetary loss. This research paper conducts real time research about awareness of data privacy, kind of data/information that needs to be protected, basic protocols for staying safe online, and some of the biggest corporate data breaches that happened in this century. We bring people from different cities of India in this study through a survey and use the data provided by these 150 participants to examine their understanding of data privacy, their concern regarding their online data and the practices they follow in their daily life to keep their online data safe in this age of computers and internet.


2012 ◽  
Vol 3 (2) ◽  
pp. 125-134 ◽  
Author(s):  
Mirza B. Murtaza

The challenge of securing large amounts of electronic medical records stored in a variety of forms and in many locations, while still making it available to authorized users, is huge. Pressure to maintain privacy and protection of personal information is a strong motivating force in the development of security policies. It is essential for health care organizations to analyze, assess and ensure security policies to meet these challenges and to develop the necessary policies to ensure the security of medical information.


Sign in / Sign up

Export Citation Format

Share Document