• Title/Summary/Keyword: Medical Information Technology

Search Result 2,190, Processing Time 0.025 seconds

Collaborative Secure Decision Tree Training for Heart Disease Diagnosis in Internet of Medical Things

  • Gang Cheng;Hanlin Zhang;Jie Lin;Fanyu Kong;Leyun Yu
    • Journal of Information Processing Systems
    • /
    • v.20 no.4
    • /
    • pp.514-523
    • /
    • 2024
  • In the Internet of Medical Things, due to the sensitivity of medical information, data typically need to be retained locally. The training model of heart disease data can predict patients' physical health status effectively, thereby providing reliable disease information. It is crucial to make full use of multiple data sources in the Internet of Medical Things applications to improve model accuracy. As network communication speeds and computational capabilities continue to evolve, parties are storing data locally, and using privacy protection technology to exchange data in the communication process to construct models is receiving increasing attention. This shift toward secure and efficient data collaboration is expected to revolutionize computer modeling in the healthcare field by ensuring accuracy and privacy in the analysis of critical medical information. In this paper, we train and test a multiparty decision tree model for the Internet of Medical Things on a heart disease dataset to address the challenges associated with developing a practical and usable model while ensuring the protection of heart disease data. Experimental results demonstrate that the accuracy of our privacy protection method is as high as 93.24%, representing a difference of only 0.3% compared with a conventional plaintext algorithm.

Development of Voice Guide Service for Pharmaceutical Information based on Ontology

  • Lee, Kyung Min;Kang, Min Soo;Jung, Yong Gyu
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.50-59
    • /
    • 2018
  • Generally, disabled people have a lot of bad health status at low income levels, the need for health care is higher than for non-disabled people. Although the number of persons with disabilities is increasing with each passing year, their medical services and support are still limited and limited. This problem is not so different from approach to medical information. Conventional medical information is usually printed and transmitted to the patient, but visually impaired people have difficulty accessing such printed information. In the case of the visually impaired, there are many cases where it is not possible to read not only the printed letter but also the braille because the acquired incidence is high. Therefore, this paper tried to solve this problem by transmitting the information of medicine by voice using RFID. In addition, ontology was used to select more accurate drug information. Currently, there are drug information sites provided by the Ministry of Health and Welfare. However, since duplicate information is scattered on these sites, the ontology was used to build up the database.

Implementing Rule-based Healthcare Edits

  • Abdullah, Umair;Shaheen, Muhammad;Ujager, Farhan Sabir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.116-132
    • /
    • 2022
  • Automated medical claims processing and billing is a popular application domain of information technology. Managing medical related data is a tedious job for healthcare professionals, which distracts them from their main job of healthcare. The technology used in data management has a sound impact on the quality of healthcare data. Most of Information Technology (IT) organizations use conventional software development technology for the implementation of healthcare systems. The objective of this experimental study is to devise a mechanism for use of rule-based expert systems in medical related edits and compare it with the conventional software development technology. A sample of 100 medical edits is selected as a dataset to be tested for implementation using both technologies. Besides empirical analysis, paired t-test is also used to validate the statistical significance of the difference between the two techniques. The conventional software development technology took 254.5 working hours, while rule-based technology took 81 hours to process these edits. Rule-based technology outperformed the conventional systems by increasing the confidence value to 95% and reliability measure to 0.462 (which is < 0.5) which is three times more efficient than conventional software development technology.

Study of Platform for Real-Time Medical Information Protection and Management (실시간 의료정보 보호 및 관리를 위한 플랫폼에 관한 연구)

  • Jeong, Chang Won;Lee, Sung Gwon;Joo, Su Chong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.245-250
    • /
    • 2014
  • In recent years, the developments of medical technology and emergency medical services have been changed to home from the hospital. In this regard, the researches for the prevention or early diagnosis have become actively. In particular, bio-signal monitoring is applied to a variety of u-healthcare application services. The proposed system in this paper is to provide a security technology to protect the medical information measured from the various sensors. Especially, bio-signal information is privacy-sensitive personal information that must be protected. We applied a two-dimensional code technology, QR code, for the protection and management. In the client side, it can analyze the QR code and confirm the results on devices. Finally, with this proposed platform, we show the results of application service to verify the creation and distribution of integrated image file between the bio-signal and medical image information.

Adaptive Situation of the wireless communication technology for the Medical Science Environment (무선정보통신기술의 의료과학 환경 적용현황 분석)

  • Hwang, Jin-Ok;Lee, Do-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2100-2106
    • /
    • 2015
  • Recently, we are increasing an interest of the health care from the developing elderly society. The need for the safety standardization is the High-tech industry that the technology of Medical science based on advanced nations with the wireless communication technology. It is urgent matter the chronic disease that is growing the total costs is everyday increased. We consider the standardization of the monitoring the medical examination based on the medical science environment with wireless communication technology. In addition, we make the environment of the powerful nation based on medical / patient care technology for the supporting of the high quality service. In this paper, we focus on description of the relationship that convergence of the medical / patient care science is need the component based on wireless communication technology.

Cryptanalysis of an 'Efficient-Strong Authentiction Protocol (E-SAP) for Healthcare Applications Using Wireless Medical Sensor Networks'

  • Khan, Muhammad Khurram;Kumari, Saru;Singh, Pitam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.967-979
    • /
    • 2013
  • Now a day, Wireless Sensor Networks (WSNs) are being widely used in different areas one of which is healthcare services. A wireless medical sensor network senses patient's vital physiological signs through medical sensor-nodes deployed on patient's body area; and transmits these signals to devices of registered medical professionals. These sensor-nodes have low computational power and limited storage capacity. Moreover, the wireless nature of technology attracts malicious minds. Thus, proper user authentication is a prime concern before granting access to patient's sensitive and private data. Recently, P. Kumar et al. claimed to propose a strong authentication protocol for healthcare using Wireless Medical Sensor Networks (WMSN). However, we find that P. Kumar et al.'s scheme is flawed with a number of security pitfalls. Information stored inside smart card, if extracted, is enough to deceive a valid user. Adversary can not only access patient's physiological data on behalf of a valid user without knowing actual password, can also send fake/irrelevant information about patient by playing role of medical sensor-node. Besides, adversary can guess a user's password and is able to compute the session key shared between user and medical sensor-nodes. Thus, the scheme looses message confidentiality. Additionally, the scheme fails to resist insider attack and lacks user anonymity.

An Efficient Personal Information Collection Model Design Using In-Hospital IoT System (병원내 구축된 IoT 시스템을 활용한 효율적인 개인 정보 수집 모델 설계)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.140-145
    • /
    • 2019
  • With the development of IT technology, many changes are taking place in the health service environment over the past. However, even if medical technology is converged with IT technology, the problem of medical costs and management of health services are still one of the things that needs to be addressed. In this paper, we propose a model for hospitals that have established the IoT system to efficiently analyze and manage the personal information of users who receive medical services. The proposed model aims to efficiently check and manage users' medical information through an in-house IoT system. The proposed model can be used in a variety of heterogeneous cloud environments, and users' medical information can be managed efficiently and quickly without additional human and physical resources. In particular, because users' medical information collected in the proposed model is stored on servers through the IoT gateway, medical staff can analyze users' medical information accurately regardless of time and place. As a result of performance evaluation, the proposed model achieved 19.6% improvement in the efficiency of health care services for occupational health care staff over traditional medical system models that did not use the IoT system, and 22.1% improvement in post-health care for users who received medical services. In addition, the burden on medical staff was 17.6 percent lower on average than the existing medical system models.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs