» Articles » PMID: 25481568

Meeting the Security Requirements of Electronic Medical Records in the ERA of High-speed Computing

Overview
Journal J Med Syst
Date 2014 Dec 8
PMID 25481568
Citations 20
Authors
Affiliations
Soon will be listed here.
Abstract

This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.

Citing Articles

Does public health policy quality foster state innovation capacity? Evidence from a global panel data.

Ji X, Gao L, Liu H, He S, Zhu B, Chow C Front Public Health. 2022; 10:952842.

PMID: 36438285 PMC: 9686444. DOI: 10.3389/fpubh.2022.952842.


Patient Expectations: Searching Websites on How to Apply to Access Medical Records.

Nicol K, Lehman K, Carlini J, Tori K, Butler-Henderson K Int J Environ Res Public Health. 2022; 19(11).

PMID: 35682088 PMC: 9180414. DOI: 10.3390/ijerph19116503.


Clinical Text Data Categorization and Feature Extraction Using Medical-Fissure Algorithm and Neg-Seq Algorithm.

Pagad N, N P, Almuzaini K, Maheshwari M, Gangodkar D, Shukla P Comput Intell Neurosci. 2022; 2022:5759521.

PMID: 35295284 PMC: 8920702. DOI: 10.1155/2022/5759521.


Brain Tumor Analysis Empowered with Deep Learning: A Review, Taxonomy, and Future Challenges.

Nadeem M, Al Ghamdi M, Hussain M, Khan M, Khan K, Almotiri S Brain Sci. 2020; 10(2).

PMID: 32098333 PMC: 7071415. DOI: 10.3390/brainsci10020118.


A Systematic Review for Enabling of Develop a Blockchain Technology in Healthcare Application: Taxonomy, Substantially Analysis, Motivations, Challenges, Recommendations and Future Direction.

Hussien H, Yasin S, Udzir S, Zaidan A, Zaidan B J Med Syst. 2019; 43(10):320.

PMID: 31522262 DOI: 10.1007/s10916-019-1445-8.


References
1.
Blobel B . A systematic approach for analysis and design of secure health information systems. Int J Med Inform. 2001; 62(1):51-78. DOI: 10.1016/s1386-5056(01)00147-2. View

2.
Ullah S, Alamri A . A secure RFID-based WBAN for healthcare applications. J Med Syst. 2013; 37(5):9961. DOI: 10.1007/s10916-013-9961-4. View

3.
Smith J . Authentication of digital medical images with digital signature technology. Radiology. 1995; 194(3):771-4. DOI: 10.1148/radiology.194.3.7862977. View

4.
Kiah M, Zaidan B, Zaidan A, Nabi M, Ibraheem R . MIRASS: medical informatics research activity support system using information mashup network. J Med Syst. 2014; 38(4):37. DOI: 10.1007/s10916-014-0037-x. View

5.
Yan X, Li W, Li P, Wang J, Hao X, Gong P . A secure biometrics-based authentication scheme for telecare medicine information systems. J Med Syst. 2013; 37(5):9972. DOI: 10.1007/s10916-013-9972-1. View