Meeting the security requirements of electronic medical records in the ERA of high-speed computing
- PMID: 25481568
- DOI: 10.1007/s10916-014-0165-3
Meeting the security requirements of electronic medical records in the ERA of high-speed computing
Abstract
This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.
Similar articles
-
An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System.J Med Syst. 2016 Dec;40(12):258. doi: 10.1007/s10916-016-0609-z. Epub 2016 Oct 8. J Med Syst. 2016. PMID: 27722976
-
Securing electronic medical record in Near Field Communication using Advanced Encryption Standard (AES).Technol Health Care. 2018;26(2):357-362. doi: 10.3233/THC-171140. Technol Health Care. 2018. PMID: 29309046
-
An enhanced security solution for electronic medical records based on AES hybrid technique with SOAP/XML and SHA-1.J Med Syst. 2013 Oct;37(5):9971. doi: 10.1007/s10916-013-9971-2. Epub 2013 Sep 14. J Med Syst. 2013. PMID: 24037086
-
Securing electronic health records without impeding the flow of information.Int J Med Inform. 2007 May-Jun;76(5-6):471-9. doi: 10.1016/j.ijmedinf.2006.09.015. Epub 2007 Jan 3. Int J Med Inform. 2007. PMID: 17204451 Review.
-
Business process design. Securing computerized health information files.AAOHN J. 1998 Dec;46(12):581-6; quiz 587-8. AAOHN J. 1998. PMID: 10025251 Review.
Cited by
-
Systematic Review of an Automated Multiclass Detection and Classification System for Acute Leukaemia in Terms of Evaluation and Benchmarking, Open Challenges, Issues and Methodological Aspects.J Med Syst. 2018 Sep 19;42(11):204. doi: 10.1007/s10916-018-1064-9. J Med Syst. 2018. PMID: 30232632
-
Patient Expectations: Searching Websites on How to Apply to Access Medical Records.Int J Environ Res Public Health. 2022 May 26;19(11):6503. doi: 10.3390/ijerph19116503. Int J Environ Res Public Health. 2022. PMID: 35682088 Free PMC article.
-
Clinical Text Data Categorization and Feature Extraction Using Medical-Fissure Algorithm and Neg-Seq Algorithm.Comput Intell Neurosci. 2022 Mar 7;2022:5759521. doi: 10.1155/2022/5759521. eCollection 2022. Comput Intell Neurosci. 2022. PMID: 35295284 Free PMC article.
-
Mobile Patient Monitoring Systems from a Benchmarking Aspect: Challenges, Open Issues and Recommended Solutions.J Med Syst. 2019 May 29;43(7):207. doi: 10.1007/s10916-019-1336-z. J Med Syst. 2019. PMID: 31144129
-
Based Medical Systems for Patient's Authentication: Towards a New Verification Secure Framework Using CIA Standard.J Med Syst. 2019 May 22;43(7):192. doi: 10.1007/s10916-019-1264-y. J Med Syst. 2019. PMID: 31115768
References
Publication types
MeSH terms
LinkOut - more resources
Full Text Sources
Other Literature Sources