• Title/Summary/Keyword: Secure Healthcare

Search Result 136, Processing Time 0.024 seconds

Privacy and Security Model for RFID Healthcare System in Wireless Communication Network (무선센서네트워크 환경하에서 RFID 헬스 시스템을 위한 보안 모델)

  • Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1223-1228
    • /
    • 2012
  • The use of a mobile agent in hospital environment offers an opportunity to deliver better services for patients and staffs. Furthermore, medical errors will be reduced because M-health system helps to verify the medical process. Optimized security protocols and mechanisms are employed for the high performance and security. Finally, a challenge in the near future will be converge the integration of Ubiquitous Sensor Network (USN) with security protocols for applying the hospital environment. We proposed secure authentication and protocol with Mobile Agent for ubiquitous sensor network under healthcare system surroundings.

Presenting Direction for the Implementation of Personal Movement Trainer through Artificial Intelligence based Behavior Recognition (인공지능 기반의 행동인식을 통한 개인 운동 트레이너 구현의 방향성 제시)

  • Ha, Tae Yong;Lee, Hoojin
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.235-242
    • /
    • 2019
  • Recently, the use of artificial intelligence technology including deep learning has become active in various fields. In particular, several algorithms showing superior performance in object recognition and detection based on deep learning technology have been presented. In this paper, we propose the proper direction for the implementation of mobile healthcare application that user's convenience is effectively reflected. By effectively analyzing the current state of use satisfaction research for the existing fitness applications and the current status of mobile healthcare applications, we attempt to secure survival and superiority in the fitness application market, and, at the same time, to maintain and expand the existing user base.

A Review of Concepts, Advantages and Pitfalls of Healthcare Applications in Blockchain Technology

  • Al-asmari, Aisha M.;Aloufi, Rahaf I.;Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.199-210
    • /
    • 2021
  • Recently, research in blockchain technology has grown in popularity. Most of these researches have pointed out designing and improving conceptual structures to create digital systems that are more secure, accessible, and effective. Although blockchain offers a wide range of advantages, it also has some pitfalls. This research aims to present an understanding of the properties of blockchain, the advantages, pitfalls, and applications based on blockchain technology. To achieve the goal of understanding blockchain technology concepts, a systematic literature review approach was introduced. 93 papers were chosen and reviewed in total. Therefore, this research provides a summary of recent studies that have been published in the field of blockchain. Moreover, we have created concept maps and tables that aid in a deep understanding of blockchain technology concepts and exhibit some of the blockchain applications. In blockchain-based applications, we focused on two areas, namely the Internet of Things (IoT) and healthcare.

Security Analysis of Remote Healthcare System in Cloud-based IoT Environment (클라우드 기반 IoT 환경의 원격 헬스케어 시스템에 대한 보안성 분석)

  • Kwon Jaemin;Hong Sewoong;Choi Younsung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.31-42
    • /
    • 2023
  • As computer performance is leveled upward, the use of IoT systems is gradually expanding. Although IoT systems are used in many fields, it is true that it is difficult to build a safe system due to performance limitations. To overcome these limitations, many researchers have proposed numerous protocols to improve security issues. Among them, Azrour et al. except. We proposed a new efficient and secure authentication protocol for remote healthcare systems in a cloud-based IoT environment, and claimed that the new protocol could solve the security vulnerabilities of the existing protocols and was more efficient. However, in this paper, through the security analysis of the remote healthcare system in the cloud-based IoT environment proposed by Azrour et al., the protocol of this system was found to be vulnerable to Masquerade attack, Lack of Perfect Forward Secrecy, Off-line password guessing attack, and Replay attack.

Semi-trusted Collaborative Framework for Multi-party Computation

  • Wong, Kok-Seng;Kim, Myung-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.3
    • /
    • pp.411-427
    • /
    • 2010
  • Data sharing is an essential process for collaborative works particularly in the banking, finance and healthcare industries. These industries require many collaborative works with their internal and external parties such as branches, clients, and service providers. When data are shared among collaborators, security and privacy concerns becoming crucial issues and cannot be avoided. Privacy is an important issue that is frequently discussed during the development of collaborative systems. It is closely related with the security issues because each of them can affect the other. The tradeoff between privacy and security is an interesting topic that we are going to address in this paper. In view of the practical problems in the existing approaches, we propose a collaborative framework which can be used to facilitate concurrent operations, single point failure problem, and overcome constraints for two-party computation. Two secure computation protocols will be discussed to demonstrate our collaborative framework.

Secure Healthcare Management: Protecting Sensitive Information from Unauthorized Users

  • Ko, Hye-Kyeong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.82-89
    • /
    • 2021
  • Recently, applications are increasing the importance of security for published documents. This paper deals with data-publishing where the publishers must state sensitive information that they need to protect. If a document containing such sensitive information is accidentally posted, users can use common-sense reasoning to infer unauthorized information. In recent studied of peer-to-peer databases, studies on the security of data of various unique groups are conducted. In this paper, we propose a security framework that fundamentally blocks user inference about sensitive information that may be leaked by XML constraints and prevents sensitive information from leaking from general user. The proposed framework protects sensitive information disclosed through encryption technology. Moreover, the proposed framework is query view security without any three types of XML constraints. As a result of the experiment, the proposed framework has mathematically proved a way to prevent leakage of user information through data inference more than the existing method.

Collaborative Secure Decision Tree Training for Heart Disease Diagnosis in Internet of Medical Things

  • Gang Cheng;Hanlin Zhang;Jie Lin;Fanyu Kong;Leyun Yu
    • Journal of Information Processing Systems
    • /
    • v.20 no.4
    • /
    • pp.514-523
    • /
    • 2024
  • In the Internet of Medical Things, due to the sensitivity of medical information, data typically need to be retained locally. The training model of heart disease data can predict patients' physical health status effectively, thereby providing reliable disease information. It is crucial to make full use of multiple data sources in the Internet of Medical Things applications to improve model accuracy. As network communication speeds and computational capabilities continue to evolve, parties are storing data locally, and using privacy protection technology to exchange data in the communication process to construct models is receiving increasing attention. This shift toward secure and efficient data collaboration is expected to revolutionize computer modeling in the healthcare field by ensuring accuracy and privacy in the analysis of critical medical information. In this paper, we train and test a multiparty decision tree model for the Internet of Medical Things on a heart disease dataset to address the challenges associated with developing a practical and usable model while ensuring the protection of heart disease data. Experimental results demonstrate that the accuracy of our privacy protection method is as high as 93.24%, representing a difference of only 0.3% compared with a conventional plaintext algorithm.

Differences on Satisfaction of Healthcare Applications by Smartphone Users' Characteristics (스마트폰 사용자 특성에 따른 헬스케어 애플리케이션 만족도 차이)

  • Shim, Hun;Kim, Yu-Jeong;Park, Mijeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.410-419
    • /
    • 2016
  • This study examined the satisfaction difference in the aspects of awareness, information quality, and availability in healthcare applications according to smartphone user's characteristics. Data collection was conducted between September 17th and September 21st 2014 on the 193 people who had used healthcare applications, and the data collected were analyzed with descriptive statistics, t-test, One-way ANOVA, and Kruskal-Wallis test using SPSS WIN 20.0. Differences in satisfaction of healthcare application were observed according to the general characteristics, and according to age, education level, and income, as well as for healthcare application use characteristics, according to operation system, total use period, the number of installed healthcare applications, the sources of main information, use frequency, and reasons of no use. To establish strategies for the effective spread of mobile healthcare and development and distribution of healthcare applications, it will be necessary to confirm smartphone users' characteristics and it is important to reflect them in the strategies. In addition, it is necessary to develop and implement a range of strategies to ceaselessly induce the users' motives of use and to improve their degree of satisfaction to secure the constant use of developed health care applications.

An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital (병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.410-419
    • /
    • 2012
  • This paper proposes a secure and efficient anonymous authentication scheme for health information push service based on indoor location in hospital. The proposed scheme has the following benefits: (1)It is just based on a secure one-way hash function for avoiding complex computations for both health care operations users and health care centers. (2)It does not require sensitive verification table which may cause health care centers to become an attractive target for numerous attacks(e.g., insertion attacks and stolen-verifier attacks), (3)It provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As result, the proposed scheme is very suitable for various location-based medical information service environments using lightweight-device(e.g., smartphone) because of very low computation overload on the part of both health care operations users and health care centers.

Development of Secure Healthcare Protocol using RFID (RFID를 이용한 안전성 있는 헬스케어 프로토콜 개발)

  • Baek, Jang-Mi;Jeon, Byung-Chan;Choi, Gyoo-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.201-210
    • /
    • 2009
  • Studies on human-centered services are approaching their highest peak with the emergence of a new concept of the network environment, a ubiquitous environment. Among these ubiquitous service technologies, services related to health care are very closely related to the current social environment. In this paper, With social aging and changes in ubiquitous IT environment, studies on health care, which is among the essential application services and which has been defined as a key application technology, and studies related to it have been conducted. In addition, healthcare services, which are essentially applicable to the ubiquitous environment, were suggested by analyzing existing healthcare studies and drawing from them the requirements for such. This paper proposes management protocol for serious case except from health care research. This system is constructed database using RFID, it has location information. It provides procedures to consistently monitor the status of patients and process the outcome in real-time.

  • PDF