Your browser doesn't support javascript.
loading
Show: 20 | 50 | 100
Results 1 - 13 de 13
Filter
1.
Braz. arch. biol. technol ; 63: e20180473, 2020. tab, graf
Article in English | LILACS | ID: biblio-1132223

ABSTRACT

Abstract Evolution of digital Health-care Information System established Medical Image Security as the new contemporary research area. Most of the researchers used either image watermarking or image encryption to address medical image security. However, very few proposals focused on both issues. This paper has implemented a Fast Medial Image Security algorithm for color images that uses both watermarking and encryption of each color channel. The proposed method starts with embedding of a smoothened key image (K) and patient information over the original image (I) to generate a watermarked image (W). Then, each color channel of the watermarked image (W) is encrypted separately to produce an encrypted image (E) using the same smoothened key image (K). This image can be transmitted over the public network and the original image (I) can be achieved using decryption algorithm followed by de-watermarking using the same key image (K) at the receiver. Qualitative and quantitative results of the proposed method show good performance when compared with the existing method with high Mean, PSNR and Entropy.


Subject(s)
Humans , Medical Informatics/standards , Diagnostic Imaging/standards , Computer Security , Algorithms
2.
Article | IMSEAR | ID: sea-203037

ABSTRACT

Cloud Computing is the emerging trend to process different types of data and provide different services, and Big data is thehuge source of such data. In this paper we proposed a framework in which we encrypt data with clock timing and then provideaccess according to task and role of the user. By this we can achieve a full secured and authorized access to cloud user withsecure big data user

3.
Chinese Critical Care Medicine ; (12): 225-227, 2019.
Article in Chinese | WPRIM | ID: wpr-744702

ABSTRACT

On?the?premise?of?fully?studying?the?disaster?medical?rescue?monitoring?mechanism?in?emergencies?at?home?and?abroad,?the?functional?requirements?of?the?domestic?disaster?medical?rescue?monitoring?system?was?analyzed?in?this?paper,?the?logical?framework?and?data?structure?of?disaster?medical?rescue?monitoring?system?with?privacy?protection?mechanism?was?designed?by?department?of?emergency?in?Chinese?PLA?General?Hospital,?department?of?information?management?in?School?of?Economics?and?Management?of?Beijing?Jiaotong?University,?the?School?of?Information?Management?of?Nanjing?University.?Three?major?functional?modules?were?realized?in?the?system:?reporter?information?management,?disaster?medical?rescue?data?upload,?and?disaster?medical?rescue?data?search.?Android?client?and?Web?client?were?developed?for?easy?access?to?the?system.?The?system?also?had?the?function?of?privacy?protection.?Based?on?symmetric?searchable?encryption?algorithm,?the?system?realized?the?encryption?storage?of?untrusted?servers?and?ensured?the?security?of?medical?and?health?data.?It?is?beneficial?for?the?further?development?and?improvement?of?disaster?medical?rescue?data?collection?in?China.

4.
Braz. arch. biol. technol ; 61: e17160609, 2018. tab, graf
Article in English | LILACS | ID: biblio-951509

ABSTRACT

ABSTRACT The digital data stored in the cloud requires much space due to copy of the same data. It can be reduced by dedupilcation, eliminating the copy of the repeated data in the cloud provided services. Identifying common checkoff data both files storing them only once. Deduplication can yield cost savings by increasing the utility of a given amount of storage. Unfortunately, deduplication has many security problems so more than one encryption is required to authenticate data. We have developed a solution that provides both data security and space efficiency in server storage and distributed content checksum storage systems. Here we adopt a method called interactive Message-Locked Encryption with Convergent Encryption (iMLEwCE). In this iMLEwCE the data is encrypted firstly then the cipher text is again encrypted. Block-level deduplication is used to reduce the storage space. Encryption keys are generated in a consistent configuration of data dependency from the chunk data. The identical chunks will always encrypt to the same cipher text. The keys configuration cannot be deduced by the hacker from the encrypted chunk data. So the information is protected from cloud server. This paper focuses on reducing the storage space and providing security in online cloud deduplication.

5.
Chinese Journal of Medical Instrumentation ; (6): 180-181, 2018.
Article in Chinese | WPRIM | ID: wpr-689838

ABSTRACT

A wireless blood pressure measurement system was designed to facilitate the measurement of the patient's blood pressure and to transmit the measured data safely and reliably. Through PDA, radio frequency identification technology (RFID) and bluetooth technology, the function of reading patients' information and statistics and analysis of blood pressure, heart rate data was realized. The IDEA and RSA joint algorithms were used to encrypt the patients' data and the key of the IDEA algorithm to ensure the security of the patient' data. The test results showed that the system had high accuracy of measurement data, safe and reliable transmission, and improved the nurses' work efficiency.


Subject(s)
Humans , Algorithms , Blood Pressure Determination , Blood Pressure Monitors , Computer Security , Radio Frequency Identification Device , Wireless Technology
6.
Chinese Medical Equipment Journal ; (6): 11-15, 2017.
Article in Chinese | WPRIM | ID: wpr-699887

ABSTRACT

Objective To propose a hybrid encryption algorithm involving in elliptic curve cryptography (ECC) and advanced encryption standard (AES) to solve the problems of wiretapping and tampering of medical data in wireless channel transmission.Methods The sender used AES session key for medical data encryption and ECC public key for AES session key,and applied SHA-1 to obtaining the information summary of medical data and ECC public key to gaining information summary signature.The recipient employed ECC private key to verify the signature and then to decrypt AES session key,and finally decrypt medical data with AES session key.Results The proposed security solution gained advantages over the conventional ECC algorithm and hybrid cryptographic algorithm of RSA and AES in encryption and decryption time,safety strength and energy consumption,so that the confidentiality and integrity of medical data could be ensured during transmission.Conclusion The hybrid encryption scheme can meet the requirement of wireless medical sensor network in low time complexity,and realizes the protection of the patient data and privacy.

7.
International Journal of Biomedical Engineering ; (6): 46-49, 2012.
Article in Chinese | WPRIM | ID: wpr-424851

ABSTRACT

ObjectiveAn input system was designed to solve the current problems of slow creation of electronic health record caused by the difficulty of resident information input.MethodsThe system,based on the Android platform,was designed to collect and save information by using PDA devices,and to send the information to the remote receiver over the wireless network with the hybrid encryption of DES and RSA.The receiver saved the information into the relational database after decryption.ResultsThe system saved acquisition time greatly compared to the traditional method.The transmission speed,security and reception rate of the system could well satisfy the requirements of information collection.ConclusionThe system provides a better way to solving the problems of heavy workload,low efficiency and high error rate in information collection,and will play an important role in practical life.

8.
Healthcare Informatics Research ; : 22-29, 2010.
Article in English | WPRIM | ID: wpr-152073

ABSTRACT

OBJECTIVES: The transmission of medical information is currently a daily routine. Medical information needs efficient, robust and secure encryption modes, but cryptography is primarily a computationally intensive process. Towards this direction, we design a selective encryption scheme for critical data transmission. METHODS: We expand the advandced encrytion stanard (AES)-Rijndael with five criteria: the first is the compression of plain data, the second is the variable size of the block, the third is the selectable round, the fourth is the optimization of software implementation and the fifth is the selective function of the whole routine. We have tested our selective encryption scheme by C++ and it was compiled with Code::Blocks using a MinGW GCC compiler. RESULTS: The experimental results showed that our selective encryption scheme achieves a faster execution speed of encryption/decryption. In future work, we intend to use resource optimization to enhance the round operations, such as SubByte/InvSubByte, by exploiting similarities between encryption and decryption. CONCLUSIONS: As encryption schemes become more widely used, the concept of hardware and software co-design is also a growing new area of interest.


Subject(s)
Medical Informatics
9.
Journal of Korean Society of Medical Informatics ; : 113-129, 2004.
Article in Korean | WPRIM | ID: wpr-153299

ABSTRACT

With the emergence of networked computing and the Internet, this paper addresses the changed medical privacy environment, in which medical data protection now has to be reassessed. It is mainly based on the Korea situation as a country without an omnibus medical data protection law. It touches also on data security, as medical data privacy cannot be effectively protected without strict regimes for data security. The contemporary state of the medical records in Korea stood to gain from the growth of informatics and the spread of trans-institutions data flows. It is in this context that there appears to be a need to review the recent medical records protection acts which are already showing signs of this age both the public sector and private sector. Some recommendations will be adopted to establish baseline principles and goals and to provide guidance on the future work of the medical data privacy act. One of these, the protection of privacy on electronic medical records, recognizes the ubiquitous nature of digital computer and network technologies today. Medical information should be acquired, disclosed and used only in ways that respect an individual's privacy. It should not be improperly altered or destroyed. And medical information should be accurate, timely, complete and relevant to the purpose for which it is provided and used. And it upholds and protects medical data security. For example a right to encrypt personal information effectively, a right to fair treatment in key public infrastructures so that no person is unfairly excluded in a way that would prejudice that person's ability to protect their privacy, a right to human checking of adverse automated decisions and a right to understand such decisions, a right, going beyond the aspiration of the 'openness principle', of disclosure of the collections to which others will have access and which might affect the projection of the profile of the individual concerned.


Subject(s)
Humans , Computer Security , Computers , Disclosure , Electronic Health Records , Informatics , Internet , Jurisprudence , Korea , Medical Records , Prejudice , Privacy , Private Sector , Public Sector
10.
Chinese Medical Equipment Journal ; (6)2003.
Article in Chinese | WPRIM | ID: wpr-592742

ABSTRACT

Objective To recover laboratory data and software function in machine-number-based encryption. Methods Database and cryptograph files were replaced respectively by the corresponding files backuped previously after the operating software of Tecan SunRise setting up in new system,and set essential configuration. Results Laboratory data and software function were recovered entirely,and apparatus ran normally. Conclusion Besides database files,the cryptograph files were also essential data, which must be preserved in machine number based encryption.

11.
Chinese Medical Equipment Journal ; (6)1993.
Article in Chinese | WPRIM | ID: wpr-591848

ABSTRACT

Objective To solve the conflict between data security and sharing in hospital so that patients can get their clinical data through result query service system.Methods Advanced secure data-exchange technology was used to realize network isolation.Integrated result query service system adopted the embedded system as hardware and the embedded LINUX operation system as software.Results Through LAN query module,internet query module and the secure data-exchange module,the design of HIS multimedia query system was realized.Conclusion Via the application of HIS integrated query platform,the design of the hospital secure data exchange is proved to be feasible,reliable and practical.

12.
Chinese Medical Equipment Journal ; (6)1993.
Article in Chinese | WPRIM | ID: wpr-591588

ABSTRACT

Objective To backup data stored in Oracle database in No.1 Military Medical Project.Methods Oracle encryption features,such as encrypting table columns,encrypting Rman backupset,encrytpting datapump export data were utilized,to encrypt sensitive data stored in HIS of No.1 Military Medical Project.Results The encryption features effectively protected Oracle online data and backup data.Conclusion These methods are secure and feasible in practice.Optimum method can be selected to encrypt data in database according system security requirements.

13.
Chinese Medical Equipment Journal ; (6)1989.
Article in Chinese | WPRIM | ID: wpr-590894

ABSTRACT

Objective To apply the techniques of network isolation and secure data exchange network to hospital information system.Methods Network isolation and secure data exchange were used to do data exchange and synchronization between two networks.Results A LIS result query system was designed and realized based on this technology.Conclusion Secure data exchange in HIS can be realized effectively by using the techniques of network isolation and secure data exchange and it has good foreground in hospital information system.[Chinese Medical Equipment Journal,2008,29(2):45-47]

SELECTION OF CITATIONS
SEARCH DETAIL