• 제목/요약/키워드: Medical Security

검색결과 808건 처리시간 0.028초

클라우드 기반 안전한 정밀의료 실현을 위한 보건의료정보 보호 적용 방안에 관한 연구 (A Study on Applications of Healthcare & Medicine Information Protection for Cloud-Based Precision Medicine)

  • 김동원
    • 융합보안논문지
    • /
    • 제22권3호
    • /
    • pp.69-77
    • /
    • 2022
  • 세계적으로 의료분야는 기술의 발전과 ICT 기술과의 융합으로 매우 빠르게 성장하고 있으며, 개인 건강정보, 유전자정보, 임상정보 등을 활용한 정밀의료(Precision Medicine)는 차세대 의료산업으로 성장하고 있다. 정밀의료는 개인의 건강과 생명을 다루기 때문에 개인정보보호 및 보건의료정보 보호 문제가 전면으로 대두되고 있다. 이에 따라, 본 논문에서는 클라우드 및 의료분야 국내·외 관련 표준, 법·제도 등의 기준에 맞추어 보안 개선사항을 제시하고 있으며, 이를 통해 안전한 정밀의료 실현을 위한 보건의료정보 보호 방안을 제안하고 있다.

코로나19 관련 사이버 공격 및 대응현황 분석 (An Analysis of Cyber Attacks and Response Cases Related to COVID-19)

  • 이용필;이동근
    • 한국IT서비스학회지
    • /
    • 제20권5호
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석 (Analyses of Security Issues for Internet of Things in Healthcare Application)

  • 신윤구;김한규;김수진;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • 제21권3호
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.

스마트 의료환경에서 보안체계 구축을 위한 이해관계자 역할 분석 (An Analysis on Role of Stakeholders for Security System in Smart Healthcare Environment)

  • 김양훈;정원후
    • 한국전자거래학회지
    • /
    • 제24권1호
    • /
    • pp.17-27
    • /
    • 2019
  • 4차 산업혁명의 몰입과 함께 산업의 전반적인 흐름이 ICT 기반의 비즈니스 환경으로 나아감에 따라 의료산업에도 환경변화가 일어나고 있다. 공공재 성격을 지닌 의료산업에서는 의료서비스의 신뢰성과 지속성을 요구하고 있으나, 스마트 환경으로 전환하기에 기존 시스템들의 호환성, 확장성 문제로 인하여 보안에 대한 도입이 늦춰지고 있다. 이에 따라, 본 연구에서는 신속하게 스마트 의료환경에서 보안체계를 구축하기 위하여, 필요로 하는 보안기술을 도출, 분석하고 도입하기 위한 이해관계자들이 관심을 가져야하는 부분과 역할에 대하여 설계하였다. 이를 통하여 의료보안체계를 구축하기 위한 이해관계자들의 다차원적인 노력에 대하여 확장성 있는 가능성을 제시하였다.

개인 의료정보 보호를 위한 블록체인 적용 방안: 프라이빗 블록 스킴을 중심으로 (A Blockchain Application for Personal health information: Focusing on Private Block Scheme)

  • 권혁준;김협;최재원
    • 지식경영연구
    • /
    • 제19권4호
    • /
    • pp.119-131
    • /
    • 2018
  • In this paper, I research the issue of information security for medical information system of each parties. The outflow of the Personal medical information can lead to problems of medical systems and disadvantage to an individual. In this paper, we research the information security based on a blockchain. In addition, I have analyzed blockchain. I suggest a medical information system framework that can help to keep the privacy of patients by using a blockchain network. Also, In this paper try to explain using private blockchain for medical system. Blockchain can keep the integrity and transparency of the medical records. This research, shows how can build the private blockchain for medical records and how to get the integrity of Data from Private Blockchain and Distuributed Ledger Technology.

의료정보보호를 위한 법률과 방안 (Security and Law for Medical Information)

  • 우성희
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.677-680
    • /
    • 2013
  • 최근 IT, BT, NT 등의 융합과 정보시스템의 비약적 발전으로 정보통신 서비스가 활성화되면서 SNS, 클라우드 서비스 등 신규서비스가 증가함에 따라 개인정보의 유출위험이 증대되고 있다. 특히 IT와 의료 분야는 지속적인 경제 발전과 고령화 사회 진입으로부터 발생되는 문제를 해결하고 삶의 질 향상에 대한 요구에 따라 IT 기술을 활용한 새로운 의료기기 및 유헬스 서비스의 새로운 시장을 형성을 기대할 수 있다. 하지만 이러한 IT 기술의 도입으로 대부분의 의료 정보 시스템이 전산화 되면서 의료기관간에도 의료정보정보의 교환 및 전송이 자주 발생함에 따라 의료 정보유출 및 보안에 대한 위험성이 커지고 있다. 따라서 본 연구에서는 개인 의료정보 보호와 관련 주요 법 제도와 관리적, 기술적 보호 방법을 검토 및 분석한다.

  • PDF

의료정보 보안을 위한 블록 암호 알고리즘의 설계 (Design of Block Cipher Algorithm for Medical Information Security)

  • 정혜명;전문석
    • 정보처리학회논문지C
    • /
    • 제8C권3호
    • /
    • pp.253-262
    • /
    • 2001
  • 이 논문에서 제안한 MIT(Medical Information Transmission) 암호 알고리즘은 의료정보 전송을 위한 PACS의 표준 프로토콜인 DICOM표준을 위하여 설계되었다. 또한, 암호화에 민감한 영항을 미치는 요소 중에 사나인 서브키를 생성하기 위해 키 생성 일고리즘을 보다 복잡하게 설계함으로써 계산 복잡도의 증가와 확률 계산의 증가를 도모하였다.

  • PDF

개인키 위탁관리 서버를 이용한 전자의무기록 지문인증 모델 (An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server)

  • 이용준;전태열
    • 한국산학기술학회논문지
    • /
    • 제20권6호
    • /
    • pp.1-8
    • /
    • 2019
  • 의료정보는 환자에게 중요한 개인정보로써 반드시 보호되어야 하는 중요 정보이다. EMR((Electronic Medical Records) 시스템은 개인정보와 의료정보가 유출될 경우, 환자의 사생활 침해 등 매우 심각한 피해를 초래할 수 있어 EMR 시스템의 의료정보는 사용자 접근에 관한 제어 및 통제 강화 등 높은 보안성이 요구되는 시스템이다. 특히 의료인이 전자의무기록에 접근할 때, 보안이 강화된 신원확인에 대한 인증방식이 반드시 필요하다. 그러나 기존의 공인인증서 기반의 인증모델은 개인키 관리, 권한위임 등의 문제로 인해 전자의무기록의 보안 특성을 반영하지 못하였다. 본 연구에서는 기존의 전자의무기록(EMR) 시스템 접근 시 문제점을 해결할 수 있는 보안이 강화된 지문인식 기반 인증 모델을 제안한다. 제안한 인증 모델은 PEMS(Private-key Escrow Management Server)를 이용한 EMR 지문인증 모델로서, 개인키 위탁 프로토콜과 개인키 인출 프로토콜을 적용하여, 개인키 관리와 권한위임 문제를 해결할 수 있도록 하였다. 제안한 인증 모델은 성능 실험을 통해 기존의 공인인증서 기반 인증에 비해 수행시간 단축된 것을 확인할 수 있었고, 기존 전자서명 비밀번호 방식을 대체 가능하며, 사용자의 편의성이 증가된 장점이 있다.

Inner and Outer Resources of Coping in Newly Diagnosed Breast Cancer Patients : Attachment Security and Social Support

  • Woo, Jungmin;Rim, Hyo-Deog
    • 생물정신의학
    • /
    • 제21권4호
    • /
    • pp.141-150
    • /
    • 2014
  • Objectives The purpose of this study is to evaluate the effects of attachment security, social support and health-related burden in the prediction of psychological distress and the mediation effects of social support and health-related burden in relationship between attachment security and psychological distress. Methods Finally, 161 patients were included for the analysis. Chi-square test and independent samples t-test were used for comparing differences between depressive/anxious group and non-depressive/non-anxious group. For evaluating the relationship among attachment security, social support, psychological distress and health-related burden, structural equation modeling analysis were performed. Results 40.7% and 32.0% of the patients have significant depressive symptoms and anxiety symptoms, respectively. In the analysis for testing the differences between groups who have psychological distress and who have not, there were no significant differences of sociodemographic factors and medical characteristics between groups, except for association between depressive symptoms and type of surgery (p = 0.01). Contrary to sociodemographic and medical characteristics, there were significant differences of health-related burden and two coping resources (attachment security and social support) between groups (all p < 0.01), except for the support from medical team in between anxious group and non-anxious group (p = 0.20). In the structural equation model analysis (Model fit : chi-square/df ratio = 0.8, root mean square error of approximation = 0.000, comparative fit index = 1.000, non-normed fit index =0.991), attachment security and social support emerged as an important predictor of psychopathology. Conclusions Attachment security and social support are important factors affecting the psychological distress. We suggest that individual attachment style and the social support state must be considered to approach the newly diagnosed breast cancer patients with psychological distress.