Confidentiality Protection of Digital Health Records in Cloud Computing

被引:27
作者
Chen, Shyh-Wei [1 ]
Chiang, Dai Lun [1 ]
Liu, Chia-Hui [2 ]
Chen, Tzer-Shyong [3 ]
Lai, Feipei [1 ]
Wang, Huihui [4 ]
Wei, Wei [5 ]
机构
[1] Natl Taiwan Univ, Dept Biomed Elect & Bioinformat, Taipei 10764, Taiwan
[2] St Johns Univ, Dept Digital Literature & Arts, Taipei, Taiwan
[3] Tunghai Univ, Dept Informat Management, Taichung 40704, Taiwan
[4] Jacksonville Univ, Dept Engn, 2800 Univ Blvd N, Jacksonville, FL 32211 USA
[5] Xian Univ Technol, Sch Comp & Engn, Xian, Peoples R China
关键词
Personal health record; Secure transmission; Privacy preservation; Cloud computing; Oblivious transfer;
D O I
10.1007/s10916-016-0484-7
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Electronic medical records containing confidential information were uploaded to the cloud. The cloud allows medical crews to access and manage the data and integration of medical records easily. This data system provides relevant information to medical personnel and facilitates and improve electronic medical record management and data transmission. A structure of cloud-based and patient-centered personal health record (PHR) is proposed in this study. This technique helps patients to manage their health information, such as appointment date with doctor, health reports, and a completed understanding of their own health conditions. It will create patients a positive attitudes to maintain the health. The patients make decision on their own for thoese whom has access to their records over a specific span of time specified by the patients. Storing data in the cloud environment can reduce costs and enhance the share of information, but the potential threat of information security should be taken into consideration. This study is proposing the cloud-based secure transmission mechanism is suitable for multiple users (like nurse aides, patients, and family members).
引用
收藏
页数:12
相关论文
共 37 条
[1]  
AHIMA J, 2007, J AHIMA, V78, P22
[2]  
[Anonymous], 2003, PERS HLTH WORK GROUP
[3]  
[Anonymous], 2005, Journal of AHIMA, V76, P24
[4]  
Brassard G, 1997, P ADV CRYPTOLOGY EUR, P334
[5]   Robust t-out-of-n oblivious transfer mechanism based on CRT [J].
Chang, Chin-Chen ;
Lee, Jung-San .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2009, 32 (01) :226-235
[6]  
Chu CK, 2005, LECT NOTES COMPUT SC, V3386, P172
[7]  
Cohen J. T., 2009, HLTH REFORM WATCH
[8]  
Computer Science and Telecommunications Board National Research Council, 2000, NETW HLTH PRESCR INT
[9]  
Di Crescenzo G, 2000, LECT NOTES COMPUT SC, V1807, P122
[10]   A RANDOMIZED PROTOCOL FOR SIGNING CONTRACTS [J].
EVEN, S ;
GOLDREICH, O ;
LEMPEL, A .
COMMUNICATIONS OF THE ACM, 1985, 28 (06) :637-647