• Title/Summary/Keyword: Healthcare Security

Search Result 354, Processing Time 0.027 seconds

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

A Implementation of Oriental Medicine U-Healthcare Service Model Using CDSS (CDSS를 이용한 한방 U-Healthcare 서비스 모델 구현)

  • Eun, Sung-Jong;Do, Jun-Hyeong;Kim, Keun-Ho;WhangBo, Taeg-Keun
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.59-70
    • /
    • 2010
  • The Ubiquitous Healthcare business are growing recently by medical service development. According to this environment, many healthcare service model have been studying and suggested. At the same time, medical world market has been reorganized into a traditional medical science out of the west medical science. But in spite of this trend, domestic U-Healthcare market in traditional medical science is for lack of profit service model. So it is true that the presentation is demanded from oriental medicine U-Healthcare service model these days in oriental field. Thus, in this paper we propose the healthcare service model that can be applied to the oriental field efficiently. Our method is based on fuzzy rule method that analyze the patient data by CDSS processing. In experiment, proposed method is more profitable and efficient than west service model. For future works, we will research about the standardization and security of processed data.

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.

A review of big data analytics and healthcare (빅데이터 분석과 헬스케어에 대한 동향)

  • Moon, Seok-Jae;Lee, Namju
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.1
    • /
    • pp.76-82
    • /
    • 2020
  • Big data analysis in healthcare research seems to be a necessary strategy for the convergence of sports science and technology in the era of the Fourth Industrial Revolution. The purpose of this study is to provide the basic review to secure the diversity of big data and healthcare convergence by discussing the concept, analysis method, and application examples of big data and by exploring the application. Text mining, data mining, opinion mining, process mining, cluster analysis, and social network analysis is currently used. Identifying high-risk factor for a certain condition, determining specific health determinants for diseases, monitoring bio signals, predicting diseases, providing training and treatments, and analyzing healthcare measurements would be possible via big data analysis. As a further work, the big data characteristics provide very appropriate basis to use promising software platforms for development of applications that can handle big data in healthcare and even more in sports science.

Research Trends and Considerations for u-Healthcare Security in Wellness Services (웰니스 서비스의 u-Healthcare 보안 연구동향 및 고찰)

  • Oh, Hyun Seok;Joo, Jae Woong;Kang, Won Min;Yi, Gangman;Jeong, Hwa Young;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.457-459
    • /
    • 2014
  • 최근 Wellness 산업과 스마트 디바이스가 융합되면서 기존의 질병관리 체계보다 앞서 예방하는 건강관리 u-Healthcare 가 개발되고 있다. 하지만 u-Healthcare 에서 취급되는 개인정보 및 의료정보는 메시지 탈취/변조로 인해 공격자에게 악용되어 의료사고를 유발하고 환자의 생명까지 앗아갈 수 있으며 또한 프라이버시 침해로 인해 사용자의 신변을 보장 받을 수 없다. 본 논문에서는 웰니스 서비스의 u-Healthcare 보안의 고려사항과 연구동향에 대해 살펴보고 현재 u-Healthcare 분야에서 보안이 적용된 시스템에 대해 분석하고 취급되는 정보보호의 중요성에 대해 고찰한다.

A Study on the Smart Medical Equipment Management Program (Secure-MEMP) Method Considering Security (보안성을 고려한 스마트 의료기기 관리(Secure-MEMP) 방법에 관한 연구)

  • Kim, Dong-Won
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.63-72
    • /
    • 2021
  • The hospital biomedical engineering team is responsible for establishing and regulating the Medical Device Management Program (MEMP) to ensure that medical devices are safe and reliable. As technology advances, medical devices such as artificial intelligence and precision medicine are developing into a form that allows connection between objects anytime, anywhere, and as various technologies converge, internal and external security threats continue to increase. In this paper, we present a study of the Medical Device Management Program (Secure-MEMP) method, considering that the security threat of medical devices continues to increase due to advances in technology.

Features of the Implementation of Public Authority in the Context of Modern International Security Challenges: Information Component

  • Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.123-128
    • /
    • 2022
  • The main purpose of the study is to determine the features of the implementation of public authority in the context of modern international security challenges. The fact that public authority is a necessary regulator of the life of society ensures its development, unity, and manageability, which is an important factor in the organization and orderliness of society adds to the actualization of the research topic. The research methodology includes a set of theoretical methods of analysis. Based on the results of the study, key aspects of the implementation of public authority in the context of modern international security challenges were identified. The study has limitations, and they relate to the practical aspect of the implementation of public authority in the context of modern international security challenges.

A Study on the Patients' Behavior and Architectural Correspondence for the Multi-patient Room (다인설 환자의 심리행태와 건축적 대응에 관한 연구)

  • Choi, Young-Mi;Yang, Nae-Won
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.6 no.11
    • /
    • pp.71-78
    • /
    • 2000
  • This study indicates bed-transfer as the significant behavior of a ward and points out architecture that cannot meet the patient's need. It is examined that inpatient's behavior depends on visibility, psychological security, privacy & communication, control, support and this study applies them to analyze the selected cases. This study also emphasizes the supportive role of hospital architecture so that the function of a ward as a healing environment may be maintained.

  • PDF

A Study on Research on digital health care and information security (디지털 헬스케어와 정보보호에 관한 연구)

  • Kim, Ki-hwan;Kim, Il-Hwan;Shin, Yongtae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.219-220
    • /
    • 2021
  • 본 논문에서는 디지털헬스케어의 정의와 핵심기술, 그리고 정보보호 방안을 제안하고자 한다. 디지털 헬스케어 기기·서비스를 대상으로 하여 다양한 취약점에 대하여 사이버공격이 가능하다. 본제안의 경우 인프라공격에 대한 대응뿐만아니라 관리적인 정보보호체계수립을 통하여 보다 효과적이며, 지속적으로 대응할 수 있을 것으로 전망된다.

  • PDF

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.