An Access Control Framework for Protecting Personal Electronic Health Records

Ambrose Atuheire Izaara, Richard Ssembatya, Fred Kaggwa
{"title":"An Access Control Framework for Protecting Personal Electronic Health Records","authors":"Ambrose Atuheire Izaara, Richard Ssembatya, Fred Kaggwa","doi":"10.1109/ICONIC.2018.8601287","DOIUrl":null,"url":null,"abstract":"The increasing expansion of wireless systems and the extensive popularity and usage of mobile devices such as mobile phones and wireless tablets represents a great opportunity to use mobile devices as widespread health data access tools. Unfortunately, some problems impeding the general acceptance of mhealth such as privacy protection, limitation of wireless networks and handheld devices are still common. Challenges such as unreliable data repositories and limited connection speeds in resource limited environments are also evident. The inadequate capabilities of hand-held devices and wireless systems make these Public Key Cryptography based frameworks unsuitable for mobile networks. Moreover, these protocols were designed to preserve customary flow of health data, which is vulnerable to attack and increase the user’s risk. This research drew its foundations from literature and theoretical review and used qualitative approaches. In this paper, the researchers build on existing concepts of Medical Information Systems and use of Symmetric Key Infrastructure to design a framework for secure access to personal electronic health records. The framework provides identity protection for a patient from all forms of unathorised data access. The framework not only reduces the computational operations between the engaging parties, but also achieves privacy protection for the user. Validation results from ICT experts demonstrate that the designed framework is applicable for secure access to personal medical health records in resource limited settings.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICONIC.2018.8601287","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

The increasing expansion of wireless systems and the extensive popularity and usage of mobile devices such as mobile phones and wireless tablets represents a great opportunity to use mobile devices as widespread health data access tools. Unfortunately, some problems impeding the general acceptance of mhealth such as privacy protection, limitation of wireless networks and handheld devices are still common. Challenges such as unreliable data repositories and limited connection speeds in resource limited environments are also evident. The inadequate capabilities of hand-held devices and wireless systems make these Public Key Cryptography based frameworks unsuitable for mobile networks. Moreover, these protocols were designed to preserve customary flow of health data, which is vulnerable to attack and increase the user’s risk. This research drew its foundations from literature and theoretical review and used qualitative approaches. In this paper, the researchers build on existing concepts of Medical Information Systems and use of Symmetric Key Infrastructure to design a framework for secure access to personal electronic health records. The framework provides identity protection for a patient from all forms of unathorised data access. The framework not only reduces the computational operations between the engaging parties, but also achieves privacy protection for the user. Validation results from ICT experts demonstrate that the designed framework is applicable for secure access to personal medical health records in resource limited settings.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
保护个人电子健康记录的访问控制框架
无线系统的不断扩展以及移动设备(如移动电话和无线平板电脑)的广泛普及和使用,为使用移动设备作为广泛的健康数据访问工具提供了一个很好的机会。不幸的是,一些阻碍人们普遍接受移动医疗的问题仍然很普遍,比如隐私保护、无线网络和手持设备的限制。在资源有限的环境中,诸如不可靠的数据存储库和有限的连接速度等挑战也很明显。手持设备和无线系统的能力不足使得这些基于公钥加密的框架不适合移动网络。此外,这些协议旨在保持健康数据的习惯流动,这些数据容易受到攻击,并增加用户的风险。本研究以文献和理论综述为基础,采用定性研究方法。在本文中,研究人员以现有的医疗信息系统概念和对称密钥基础设施的使用为基础,设计了一个安全访问个人电子健康记录的框架。该框架为患者提供身份保护,使其免受各种形式的未经授权的数据访问。该框架不仅减少了参与方之间的计算操作,而且实现了对用户隐私的保护。信通技术专家的验证结果表明,所设计的框架适用于在资源有限的情况下安全获取个人医疗健康记录。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
M-Government Adoption Framework for Least Developed Countries: The Case of Malawi Rule-based Control Strategy for a River-based Grid-connected Hydrokinetic System A Survey on Spectrum Handoff Algorithm for Continuous Connectivity Services and Applications Security in IoT Enabled Networks Cloud Robotic Architectures: Directions for Future Research from a Comparative Analysis
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1