IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Preserving the Privacy of Patient Records in Health Monitoring Systems

Preserving the Privacy of Patient Records in Health Monitoring Systems
View Sample PDF
Author(s): Mahmoud Elkhodr (University of Western Sydney, Australia), Seyed Shahrestani (University of Western Sydney, Australia)and Hon Cheung (University of Western Sydney, Australia)
Copyright: 2013
Pages: 31
Source title: Theory and Practice of Cryptography Solutions for Secure Information Systems
Source Author(s)/Editor(s): Atilla Elçi (Hasan Kalyoncu University, Turkey), Josef Pieprzyk (Macquarie University, Australia), Alexander G. Chefranov (Eastern Mediterranean University, North Cyprus), Mehmet A. Orgun (Macquarie University, Australia), Huaxiong Wang (Nanyang Technological University, Singapore)and Rajan Shankaran (Macquarie University, Australia)
DOI: 10.4018/978-1-4666-4030-6.ch019

Purchase

View Preserving the Privacy of Patient Records in Health Monitoring Systems on the publisher's website for pricing and purchasing information.

Abstract

The goal of this chapter is to discuss the challenges of generic security protocols and platforms for securing Electronic Health Records (EHR) in general and for their adoption in shared care environments in particular. The chapter introduces various methods and security solutions based on existing protocols, discusses their potentials, and describes some experiences with their implementations. Amongst the main challenges that e-health technology faces, security is considered as one of the major obstacles to its deployment. The chapter proposes an authentication approach, referred to as Ubiquitous Health Trust Protocol (UHTP), which aims at minimizing the security risk associated with the remote access of EHRs using portable devices. In particular, the proposed approach has been used to create ways for secure collaboration providing a set of generic services such as read/write, authentication, and trust management, as well as advanced functionality for mobile access. The experience in adopting the approach using Java on the Android platform is described.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom