Medical Information Access Control Method Based on Weighted Information Entropy

被引:0
作者
Zheng, Lijuan [1 ,2 ]
Zhang, Linhao [2 ]
Cui, Meng [2 ]
Chen, Jianyou [3 ]
Yang, Shaobo [4 ]
Li, Zhaoxuan [2 ]
机构
[1] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Trans, Beijing 100044, Peoples R China
[2] ShiJiaZhuang TieDao Univ, Sch Informat Sci & Technol, Shijiazhuang 050043, Hebei, Peoples R China
[3] Hebei Coal Safety Secur Training Ctr, Qinhuangdao 066100, Hebei, Peoples R China
[4] Sunzhuang Min Co Handan City, Handan 056200, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT III | 2018年 / 11065卷
关键词
Medical information; Information entropy; Access control;
D O I
10.1007/978-3-030-00012-7_11
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid popularization of the Internet and the Information Office of medical institutions, a large amount of electronic medical information has been generated. Medical information involves the privacy of the patient. At present, many lawless use various means to obtain the patient's privacy information and take advantage of it for benefits. At present, there are many research methods of medical data access control, but the structure of medical data is complex, and the amount of data is huge. The contradiction between privacy protection and data utilization is still difficult to balance. A method of medical information access control based on weighted information entropy is proposed for the privacy protection and data utilization of electronic medical information. This method uses information entropy to measure the amount of information that a medical information visitor possesses, and sets different weights for different kinds of privacy information to assist in computing information contents. Method sets the tolerance of information and compares the amount of information the visitor has with the tolerance. The access strategy decides whether to feed back the requested medical information according to comparison result. After security analysis and comparison, this method can effectively protect the patient's privacy information and meet the needs of the legitimate visitors.
引用
收藏
页码:113 / 122
页数:10
相关论文
共 17 条
[1]  
Bi D, 2017, BIG DATA TIME, V4, P6
[2]  
Cai J. H, 2013, CHINESE J HLTH INFOR, V10, P292
[3]  
Chen B, 2015, CHINA ENG CONSUL, V2, P37
[4]  
Hu J., 2009, COMPUTER STANDARDS I, V32, P274
[5]   Risk-adaptive access control model for big data in healthcare [J].
Hui, Zhen ;
Li, Hao ;
Zhang, Min ;
Feng, Deng-Guo .
Tongxin Xuebao/Journal on Communications, 2015, 36 (12)
[6]  
[霍成义 Huo Chengyi], 2014, [计算机应用与软件, Computer Applications and Software], V31, P75
[7]   Privacy-centric Access Control for Distributed Heterogeneous Medical Information Systems [J].
Khan, Atif ;
McKillop, Ian .
2013 IEEE INTERNATIONAL CONFERENCE ON HEALTHCARE INFORMATICS (ICHI 2013), 2013, :297-306
[8]   Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption [J].
Li, Ming ;
Yu, Shucheng ;
Zheng, Yao ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (01) :131-143
[9]  
Peng Chang-Gen, 2016, Journal of Software, V27, P1891, DOI 10.13328/j.cnki.jos.005096
[10]  
[渠世艳 Qu Shiyan], 2011, [计算机应用与软件, Computer Applications and Software], V28, P74