Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2015
dissemination of electronic healthcare records in distributed wireless environments
Studies in health technology and informatics, 2008
A new networking paradigm has emerged with the appearance of wireless computing. Among else ad-hoc networks, mobile and ubiquitous environments can boost the performance of systems in which they get applied. Among else, medical environments are a convenient example of their applicability. With the utilisation of wireless infrastructures, medical data may be accessible to healthcare practitioners, enabling continuous access to medical data. Due to the critical nature of medical information, the design and implementation of these infrastructures demands special treatment in order to meet specific requirements; among else, special care should be taken in order to manage interoperability, security, and in order to deal with bandwidth and hardware resource constraints that characterize the wireless topology. In this paper we present an architecture that attempts to deal with these issues; moreover, in order to prove the validity of our approach we have also evaluated the performance of o...
2009 16th International Conference on Systems, Signals and Image Processing, 2009
As mobile devices are enhanced continuously with more resources, wireless infrastructures provide support to a growing number of assistive environments. Among the potential domains which can suffice from their deployment, is the ehealthcare sector. The increased sensitivity requirements imposed by the US and EU legislation, urge towards the design and incorporation of strict security standards in the deployment process of wireless e-healthcare infrastructures. Even though mobile devices are characterized by an increase in processing and autonomy capacity, the necessity to encrypt all communications consists of a significant burden. In this paper we present W-EHR, a wireless architecture that enables authorized medical personnel to access medical records in a secure and transparent manner, utilizing an agent based architecture. Ubiquitous access to medical information -within the hospital range -is achieved using mobile devices; security management is achieved using a hierarchical policy based approach in compatibility with the IETF policy-based management model. In order to comply with the strict privacy requirements, all the transactions are encrypted using a hybrid approach that employs symmetric and asymmetric encryption techniques. We describe our experiments that prove the effective operation of our infrastructure (by means of device resources consumption and network bandwidth). In our calculations we consider the encryption overhead when transmitting medical records in a compatible with medical codification standards form.
2005
Pervasive environments introduce a technological paradigm shift, giving a new impetus to the functionality of applications, overcoming applicability barriers of legacy applications. Electronic healthcare records management can clearly benefit from the new challenges brought by this emerging technology, due to its low cost and high percentage of user adoption. Still, the sensitivity of medical data, poses new requirements in the design of a secure infrastructure based on the ad-hoc networking schema, which underlies pervasive environments. User authorization and controlled access to information is of outmost importance. This paper proposes a management system for electronic healthcare records satisfying the aforementioned security requirements.
2010
Information technology is expected to become an essential tool in providing reliable information for supporting the delivery of health care services. Nevertheless, incorporating such technologies to support the provision of healthcare raises concerns over the protection of patient"s information. The technological, social and legal implications regarding the access and release of medical data have to be considered carefully during the implementation of interconnected health information systems. Secure and effective data exchange along with the protection of patient"s confidentiality are two issues that electronic health records need to address to make them reliable and secure in a shared care environment. In this thesis, the author explores these issues by analysing several topics regarding electronic health records, communication, exchange of information and security. The result of this analysis provides an understanding of the framework required to support the exchange of EHRs in a shared care environment. The core of this contribution consists in the description of an approach which uses attribute-based encryption to protect the confidentiality of vi patients" information during the exchange of electronic health records among healthcare providers. Attribute-based encryption allows the reinforcing of access policies and reduces the risk of unauthorized access to sensitive information. A prototype version of a communication interface based on the proposed solution has been implemented and tested to evaluate its viability. The prototype has shown that attribute-based encryption provides an answer to restrictions presented by traditional approaches and facilitate the reinforcing of existing security policies over the transmitted data. vii
2006
Virtual electronic patient records (VEPR) enable the integration and sharing of healthcare information within large and heterogeneous organizations. The use of wireless technology can improve and fasten healthcare treatment because it brings information to the point of decision allowing also for users' mobility. This has to be done conforming to security requirements as the wireless technology can introduce some specific security problems. The main objective of this work is to model and develop a proposal for a secure wireless architecture in order to access a VEPR. This VEPR is being used within a university hospital by more than 500 doctors, on a daily basis. Its users would greatly benefit if this service would be extended to a wider part of the hospital and not only to their workplace. They would achieve faster and greater mobility in the treatment of their patients. The wireless architecture includes the latest wireless security standards and protocols, and models security requirements according to users and organizations' needs. It provides an extra security layer to the wired system. In this paper we also present an evaluation of the proposed solutions against network attacks and its efficiency in terms of complexity and impact within the network.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
In medical management, more and more information technology is applied to improve work efficiency. For example, the hospital information management system is used for basic information and medical management of patients, and the onedimensional and two-dimensional codes on the wrist are used for quick reading or inputting patient identification (ID), etc. Although computerization is more convenient, due to immature technology or management flaws, there are certain security risks in various typical scenarios, such as disclosure of user privacy through reporting transparency, lack of strict control over the consultation of confidential medical records, the absence of technical verification for the confirmation of the infusion, etc. Identity is easy to fake, payment is inconvenient, etc. Security issues are discussed in more detail below. Healthcare applications are considered a promising area for wireless sensor networks, where patients can be monitored using wireless medical networks (WMN). Current trends in WMN healthcare research focus on reliable patient communication, patient mobility, and energy-efficient delivery.
Regular issue, 2021
In such an unfortunate situation of a medical emergency, a lot of people tend to lose their lives which can be a result of misplaced/delayed paperwork. Thus it is essential to have the patient’s medical record history before going into major surgery and it is often unavailable at the required time due to the chain of communication between different hospitals. As a possible solution to this problem we propose a central chain of all medical records of a patients in an electronic format. The electronic health records (EHRs) are patient-centered, real-time records that make information available to authorized users and help doctors diagnose cases more quickly, reduce medical errors, and deliver safer care. EHRs improve the communication gap and make the process of getting medical attention quicker. Our methodology includes an easy to use 2 module approach (doctor portal and patient portal) with multiple sub modules all linked to a common database. We create a secure and centralized data...
Since their early adoption Electronic Health Records (EHR) have been evolving to cope with increasing requirements from institutions, professionals and, more recently, from patients. Citizens became more involved demanding successively more control over their records and an active role on their content. Mobility brought also new requirements, data become scattered over heterogeneous systems and formats, with increasing di culties on data sharing between distinct providers. To cope with these challenges several solutions appeared, mostly based on service level agreements between entities, regions and countries. They usually required de ning complex federated scenarios and left the patient outside the process. More recent approaches, such as personal health records (PHR), enable patient control although raises clinical integrity doubts to other actors, such as physicians. Also, information security risk increase as data travels outside controlled networks and systems. To overcome this...
Wireless Local Area Networks (WLANs) offer the organizations and users many benefits such as mobility, increased productivity and low cost of installation. This paper presents a proposal of deploying WLAN technology in hospitals. It starts with a brief review of the Health Level 7 (HL7), which is used to transfer medical records and data. In addition, a proposal of hospital network that makes use of a new Wi-Fi protocol, called Wi-Fi Protected Setup (WPS). The WPS is used to setup WLAN in easy and secure manner that meets the different requirements of hospitals, and the HL7 standard security requirements.
2020
E-health appears to be a highly interesting field expanding nowadays, as an indispensable utility for doctors to facilitate the process of tracing electronic healthcare records. The increased use of Wireless Sensor Networks (WSN) for healthcare applications has improved the life quality of patients and has increased the physician-patient efficiency. A main concern regarding WSN for e-health applications is related to security issues, dedicated to the sensitiveness and criticism of patient related data, tending to become even more serious as wireless networks are involved. The majority of these applications rely on the use of wireless sensor networks, interacting with a database, transferring the data collected from patients in distributed locations. The distributive nature of these systems represents a greater challenge in securing data, by making the individualization of security solutions a field of interest and further research. In this paper will be given a brief insight of secu...
Concepts and Solutions, 2011
Protecting the confidentiality of a patient's information in a shared care environment could become a complex task. Correct identification of users, assigning of access permissions, and resolution of conflict rise as main points of interest in providing solutions for data exchange among health care providers. Traditional approaches such as Mandatory Access Control, Discretionary Access control and Role-Based Access Control policies do not always provide a suitable solution for health care settings, especially for shared care environments. The core of this contribution consists in the description of an approach which uses attributebased encryption to protect the confidentiality of patients' information during the exchange of electronic health records among healthcare providers. Attribute-based encryption allows the reinforcing of access policies and reduces the risk of unauthorized access to sensitive information; it also provides a set of functionalities which are described using a case study. Attribute-based encryption provides an answer to restrictions presented by traditional approaches and facilitate the reinforcing of existing security policies over the transmitted data.
In this paper implemented in Ad hoc On-Demand Distance Vector (AODV) Routing is a routing protocol for WSN. Here it can deploy nodes in the network formation module. Sensor Nodes named as ECG, EEG, Thermal, BP etc., Then the Euclidean distance is used to find the Node position, and distance of the nodes in the network. Then the Relay node is deployed it is used to forward the sensor communication to the Doctor. The registration Phase is used to allow the Authentication process for sending Process. If it is authenticated means it will allow for uplink and downlink handoff Phase, the uplink handoff Phase Modules is used to search the available channel to destination and Downlink handoff Phase is used to verification process for broadcast Acknowledgement message. Finally it can calculate the proposed method results like Packet delivery ratio, Delay, Energy Consumption, Throughput and Network life time done by Network Simulator version2.
2006
Abstract Medical applications have already been integrated into mobile devices (eg Tablet PCs, PDAs and smart phones) and are being used by medical personnel in treatment centers, for retrieving and examining patient's Electronic Health Records (EHR). In such mobile healthcare applications, specific attention is drawn towards the security requirements since the transmission of sensitive medical data through a public network renders the problem of communication privacy.
South African Journal of …, 2011
The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient's data are key factors to be considered in the transmission of medical information for use by authorised health-care personnel. Mobile communication has enabled medical consultancy, treatment, drug administration and the provision of laboratory results to take place outside the hospital. With the implementation of electronic patient records and the Internet and Intranets, medical information sharing amongst relevant health-care providers was made possible. But the vital issue in this method of information sharing is security: the patient's privacy, as well as the confidentiality and integrity of the health-care information system, should not be compromised. We examine various ways of ensuring the security and privacy of a patient's electronic medical information in order to ensure the integrity and confidentiality of the information.
2021
Information and communication technology have caused a drastic change in the manner patients are treated in this digital world. Wireless Body Area Network (WBAN) is a type of wireless sensor network consisting of medical sensor devices placed inside and outside the body of a human being. These sensors are used to collect and transfer health-related information from the human body to caretakers. WBAN can be used in the e-health care system. The sensitive data collected by wearable sensor nodes during storage and transmission suffer from security and privacy-related issues. The proposed scheme provides a framework to establish secure end-to-end data transmission in the e-health monitoring system. Further, the mechanism followed in the proposed scheme provides an access control mechanism to prevent the direct access of the patient healthrelated data by a third party. The results show that the proposed scheme guarantees strong security while transferring health-related data within and o...
Wireless Sensor Networks (WSN) have attracted much interest in the last decade. It opened a new range of applications such as large area monitoring including environmental monitoring, wildlife exploration, and real time patient medical data which is collected by using wireless sensors. The WSN provides the options of flexibilities and cost saving for patients and healthcare industries. At the same time, there is a growing concern about the hospitals’ ability to provide effective care during disaster events. For these reasons, tools that automate patient monitoring have the potential to greatly improve efficiency and quality of health care. In hospitals, medical data sensors which monitor patients produce an increasingly large volume of real-time data. The transmission of this data through wireless networks in a hospital becomes a crucial problem because the medical information of an individual is highly sensitive. It must be kept private and secure. The purpose of this paper is to present our initial effort in building a flexible strategy to achieve secure data transmission in medical wireless sensor networks.
Springer eBooks, 1997
The healthcare systems in all developed countries are changing to labour-shared structures as Shared Care. Such structures require an extended communication and co-operation. Medical information systems integrated into the care processes must be able to support that communication and co-operation adequately, representing an active and distributed Electronic Health Record (EHR) system. Distributed health record systems must meet high demands for data protection and data security, which concern integrity, availability, confidentiality including access management, and accountability. Communication and cooperation in information systems can be provided by middleware architectures. For the different middleware architectures used in healthcare as EDI (HL7, EDIFACT), CORBA or DHE, the architectural principles and security solutions are shortly described in the paper. Supporting open information systems, these security solutions are independent of applications and transparent to the user. For trusted communication and cooperation, application-related and user-related security mechanisms are required. Such mechanisms have to fulfil the security policy of the application domain. They are using the basic security mechanisms of the underlying communication-and cooperation-supporting systems. The discussed policy, threats, and countermeasures are referred to the first German regional distributed medical record, which is developed and step by step refined in the Clinical Cancer Registry Magdeburg/Saxony-Anhalt.
The wireless body area network (WBAN) has emerged as a new technology for ehealthcare that allows the data of a patient's vital body parameters and movements to be collected by small wearable or implantable sensors and communicated using short-range wireless communication techniques. WBAN has shown great potential in improving healthcare quality, and thus has found a wide range of applications. However, the security and privacy protection of the data collected from a WBAN, either while stored inside the WBAN or during their transmission outside of the WBAN, is a major unsolved concern. Challenges are mainly coming from stringent resource constraints of WBAN devices. The aim of this work is to achieve secure and dependable distributed data storage in the WBAN. At the first part of the paper, we will survey the most recent research directions in the field.Significant recent papers are discussed and compared to each other to identify the advantages and disadvantages of each technique. Then, our proposed strategy will be devoted based on that survey. The proposal is mainly based on the techniques of erasure coding, secret sharing and an algebraic signature to simultaneously achieve data confidentiality, dependability, and dynamic integrity.
The expeditious growth of the wearable and implantable body sensors and wireless communication technologies have provided both inspiration and motivation for increasingly development of m-healthcare information systems as a promising next generation e-health system. In m-healthcare systems, the authorized mobile patients with the same disease symptoms can constitute a social group to share their health condition and medical experience. The privacy of social communication transferred over open wireless channels is an essential system requirement. Furthermore, the m-healthcare system on contrary to the traditional e-Health system allows mobile patients to move across distinguished location domains during different time periods. The mobility of patients considerably increases the cost of key management in terms of communication overhead if it is addressed with a naïve solution such as treating as a leave in the old location and a new join in the visited location. This paper proposes a ...
Studies in Health Technology and Informatics, 2020
Current technologies provide the ability to healthcare practitioners and citizens, to share and analyse healthcare information, thus improving the patient care quality. Nevertheless, European Union (EU) citizens have very limited control over their own health data, despite that several countries are using national or regional Electronic Health Records (EHRs) for realizing virtual or centralized national repositories of citizens’ health records. Health Information Exchange (HIE) can greatly improve the completeness of patients’ records. However, most of the current researches deal with exchanging health information among healthcare organizations, without giving the ability to the citizens on accessing, managing or exchanging healthcare data with healthcare organizations and thus being able to handle their own data, mainly due to lack of standardization and security protocols. Towards this challenge, in this paper a secure Device-to-Device (D2D) protocol is specified that can be used ...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.