• Title/Summary/Keyword: Secure Healthcare

Search Result 133, Processing Time 0.021 seconds

Encryption-based Image Steganography Technique for Secure Medical Image Transmission During the COVID-19 Pandemic

  • Alkhliwi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.83-93
    • /
    • 2021
  • COVID-19 poses a major risk to global health, highlighting the importance of faster and proper diagnosis. To handle the rise in the number of patients and eliminate redundant tests, healthcare information exchange and medical data are transmitted between healthcare centres. Medical data sharing helps speed up patient treatment; consequently, exchanging healthcare data is the requirement of the present era. Since healthcare professionals share data through the internet, security remains a critical challenge, which needs to be addressed. During the COVID-19 pandemic, computed tomography (CT) and X-ray images play a vital part in the diagnosis process, constituting information that needs to be shared among hospitals. Encryption and image steganography techniques can be employed to achieve secure data transmission of COVID-19 images. This study presents a new encryption with the image steganography model for secure data transmission (EIS-SDT) for COVID-19 diagnosis. The EIS-SDT model uses a multilevel discrete wavelet transform for image decomposition and Manta Ray Foraging Optimization algorithm for optimal pixel selection. The EIS-SDT method uses a double logistic chaotic map (DLCM) is employed for secret image encryption. The application of the DLCM-based encryption procedure provides an additional level of security to the image steganography technique. An extensive simulation results analysis ensures the effective performance of the EIS-SDT model and the results are investigated under several evaluation parameters. The outcome indicates that the EIS-SDT model has outperformed the existing methods considerably.

Analyses of Enhancement of Authentication Mechanism for Security and Privacy Under Healthcare System With RFID Application (RFID를 이용한 헬스시스템에서의 정보보안 향상을 인증 메카니즘 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.154-156
    • /
    • 2012
  • This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks, where wireless medical sensors are used for patients monitoring. These medical sensors' sense the patient body data and transmit it to the professionals (e.g., doctors, nurses, and surgeons). Since, the data of an individual are highly vulnerable; it must ensures that patients medical vital signs are secure, and are not exposed to an unauthorized person. In this regards, we have proposed a user1 authentication scheme for healthcare application using medical sensor networks. The proposed scheme includes: a novel two-factor professionals authentication (user authentication), where the healthcare professionals are authenticated before access the patient's body data; a secure session key is establish between the patient sensor node and the professional at the end of user authentication. Furthermore, the analysis shows that the proposed scheme is safeguard to various practical attacks and achieves efficiency at low computation cost.

  • PDF

Cryptanalysis and Solution on Secure Communication Scheme for Healthcare System using Wearable Devices (웨어러블 장치를 이용한 헬스케어시스템을 위한 안전한 통신 기법에 대한 분석 및 해결책)

  • Choi, Hae-Won;Kim, Sangjin;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.187-194
    • /
    • 2019
  • A security company has been proposed for various healthcare systems. However, there are improvements in order to achieve better efficiency and stability in the various protocols presented. The purpose of this paper is to provide cryptanalysis and solution on Vijayakumar et al.'s secure communication scheme for healthcare system using wearable devices. Especially, it is weak against denial of service attack and it does not provide integrity of the transmitted messages. Thereby, this paper proposes a new secure communication scheme to cope from the problems in Vijayakumar et al.'s scheme. It provides authentication and integrity, which could be the security solution against Vijayakumar et al.'s scheme. Furthermore, it also provides a good computational overhead compared to Vijayakumar et al.'s scheme.

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

Prevent Illegal Access Control for Secure Healthcare System (불법적인 접근 제어 방지를 위한 안전한 헬스케어 시스템)

  • Seo, Dae-Hee;Baek, Jang-Mi;Moon, Yong-Hyuk;Cho, Dong-Sub
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.59 no.3
    • /
    • pp.657-663
    • /
    • 2010
  • Today, rapid evolution of Internet makes various types of services in ubiquitous environment are intelligent and active. As a result, user's demand on high quality of life increases and health care service based on ubiquitous environment draws a lot of attention. However, user's private information used for health care service is illegally distributed and exposed, causing serious individual and social problems. Therefore, this thesis is intended to suggest a secure health care service to prevent unauthorized third party's access and to protect user's privacy in health care systems. The proposed scheme establishes a session key through communication channel between health care system and user based on explicit mutual authentication and provides secure communication and access control, improving security as one of the leading health care systems.

Healthcare Security based on Blockchain

  • Almalki, Taghreed;Alzahrani, Shahad;Alhakami, Wajdi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.149-160
    • /
    • 2021
  • One of the most important inventions and developments in the digital world today is the healthcare system based on blockchain technology. Healthcare is an important field that requires the application of security mechanisms due to the sensitivity of patient data. The association of blockchain with healthcare contributed to achieving better security mechanisms than the traditional approach. The new approach operates in a decentralized system, which in turn, improves security in the healthcare environment. Consequently, blockchain technology has emerged as one of the most crucial solutions to security violations and challenges in the healthcare industry. This paper provides a comprehensive review of several experts' recent protection and detection approaches in this domain. It is also imperative to note that the paper focuses only on the recent techniques that have been published during 2017-2020. The sophisticated procedures have been investigated and discussed in terms of similarities and differences to highlight the significance of the protection needed to secure the healthcare environment.

Direction of Healthcare Expenditure on Research and Development (보건의료 연구개발비 현황과 발전방향)

  • Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.28 no.4
    • /
    • pp.327-328
    • /
    • 2018
  • The quality of healthcare in Korea is very good, especially in life threatening disease. However, the level of healthcare research in Korea is not good relative to that of engineering. International university rankings also were showed that engineering was generally higher ranking than medicine. The reason of this phenomenon was deeply related to expenditure on research and development (R&D). Although Korea had a lot of gross domestic expenditure on R&D (GERD), 75% of GERD was from business enterprise that was related to engineering. Healthcare expenditure of R&D from business enterprise is small. Healthcare expenditure from government budget allocation on R&D (GBARD) was smaller than engineering. Higher education expenditure on R&D of GERD was also small and the quantity and quality of researcher in higher education was not enough. For Korea's healthcare to become the growth engine for future, GBARD should be invested heavily in the healthcare, a large part of the increased GBARD must be invested in higher education, and the higher education should invest to secure the higher quality researcher stably.

Process of the Encryption key using a Physical Information in the U-Healthcare Service (원격의료서비스에서 생체정보를 이용한 암호화키 생성방법 연구)

  • Song, Chung-Geon;Lee, Keun-Ho;Ryu, Gab-Sang
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.573-578
    • /
    • 2014
  • Recently as we enter into the world of an aging society, the U-Healthcare service is newly spotlighted. In order to secure this U-Healthcare, a development of security solution that is suitable for the U-Healthcare environment is required. But the U-Healthcare environment is difficult to apply the existing security solution with the lack of standards, a security solution with high completeness was not developed. At this point, in order to structure the safe U-Healthcare environment, a generating method of an encryption key using the body information that helps the effective key management and ensuring the confidentiality of the data is proposed.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • v.10 no.4
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.