Security for Medical Records Using Private Key Encryption

Authors

  • Devika P.  Department of Information Technology Dhanalakshmi College Of Engineering, Anna University, Chennai, India
  • Divya S.  Department of Information Technology Dhanalakshmi College Of Engineering, Anna University, Chennai, India
  • Harinipriya V S.   Department of Information Technology Dhanalakshmi College Of Engineering, Anna University, Chennai, India

Keywords:

PHR, DICOM, HTML5, MyPHRMachines, EHR, VMs, IaaS

Abstract

Personal Health Records (PHRs) should remain the lifelong property of patients, who should be able to show them conveniently and securely to selected caregivers and institution. In contrast to previous approaches, our solution is designed to maintain EMR availability even when the network connectivity is not available. To validate our architecture, we have implemented a prototype system using attribute based encryption algorithm. Patients will be able to share their remote virtual machine session with selected caregivers, who will need internet and a Java enabled Web browser to PHR. We discuss a prototype that enables to generate a ciphered long key string and implement a Hypervisor which is a virtual machine to maintain the PHRs. Index Terms—Cloud computing, electronic medical record (EMR), personal health record (PHR), hypervisor.

References

 [1] D. C. Kaelber, A. K. Jha, D. Johnston, B. Middleton, and D. W. Bates, “Viewpoint paper: A research agenda for personal health records (PHRs),” J. Amer. Med. Inform. Assoc., vol. 15, no. 6, pp. 729–736, 2008.

[2] A. Rosenthal, P. Mork, J. Li, M.H. adn Stanford, D. Koester, and P. Reynolds, “Cloud computing: A new business paradigm for biomedical information sharing,” J. Biomed. Inf., vol. 43, pp. 342–353, 2010.

[3] Accelarad. (2012, Jul.). Seemyradiology – medical image sharing.[Online].Available: http://www.seemyradiology.com/

[4] S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi,“Cloudcomputing—Thebusinessperspective,”Decis.Supp.Syst.,vol.51, pp. 176–189, 2011.

[5] T. J. Bittman, G. J. Weiss, M. A. Margevicius, and P. Dawson, “Magic quadrant for x86 server virtualization infrastructure,” Gartner Inc., Stamford, CT, USA, RAS Core Research Note G00205369, Jun. 2011.

[6] D. T. Mon, J. Ritter, C. Spears, and P. Van Dyke, “PHR system functional model,” HL7 PHR Standard, May 2008.

[7] S. Negrini, S. Atanasio, F. Zaina, and M. Romano, “Rehabilitation of adolescent idiopathic scoliosis: Results of exercises and bracing from a series of clinical studies. Europa medicophysica-SIMFER 2007 award winner,” Eur. J. Phys. Rehab. Med., vol. 44, no. 2, pp. 169–176, Jun. 2008.

[8] M. L. Metzker, “Sequencing technologies—The next generation,” Nature Rev. Genet., vol. 11, no. 1, pp. 31–46, Jan. 2010.

[9] K. Wetterstrand. (2012, Jan.). DNA sequencing costs—Data from the NHGRI large-scale genome sequencing program. [Online]. Available: http://www.genome.gov/sequencingcosts/

[10] P. Van Gorp and P. Grefen, “Supporting the internet-based evaluation of research software with cloud infrastructure,” Softw. Syst. Model., vol. 11, no. 1, pp. 11–28, 2012.

[11] Microsoft Terminal Services Team. (2009 Mar.). Top 10 RDP protocol misconceptions. [Online]. Available: http://blogs.msdn.com/b/ rds/archive/2009/03/03/top-10-rdp-protocol-misc onceptions-part-1.aspx

[12] Nucleics. (2012). Reviews of dna sequencing service companies & facilities. [Online]. Available: http://www.nucleics.com/DNA_sequencing_support/sequencing-service-reviews.html

[13] K. Nazi, “Veteran’s voices: Use of the American customer satisfaction index survey to identify my healthevet personal health record users’ characteristics, needs, and preferences,” J. Amer. Med. Inf. Assoc., vol. 17, pp. 203–211, 2010.

[14] D. Detmer, M. Bloomrosen, B. Raymond, and P. Tang, “Integrated personal health records: Transformative tools for consumer-centric care,” BMC Med. Inf. Decis. Mak., vol. 8, 2008.

[15] J. Halamka, K. Mandl, and P. C. Tang, “Early experiences with personal health records,” J. Amer. Med. Inf. Assoc., vol. 15, no. 1, pp. 1–7, 2008.

[16] D. C. Kaelber, S. Shah, A. Vincent, E. Pan, J. M. Hook, D. Johnston, D. W. Bates, and B. Middleton, The Value of Personal Health Records. Healthcare Information & Management Systems Society, 2008.

[17] B. Adida, A. Sanyal, S. Zabak, I. S. Kohane, and K. D. Mandl, “Indivo X: Developing a fully substitutable personally controlled health record platform,” in Proc. AMIA Symp., Nov. 2010, pp. 6–10.

[18] A. Sunyaev, D. Chornyi, C. Mauro, and H. Kremar, “Evaluation framework for personal health records: Microsoft healthvault vs. googlehealth,” in Proc. 43rd Hawaii Int. Conf. Syst. Sci., Jan. 2010, pp. 1–10.

[19] N. Archer, U. Fevrier-Thomas, C. Lokker, K. A. McKibbon, and S. E. Straus, “Personal health records: A scoping review,” J. Amer. Med. Inform. Assoc., vol. 18, pp. 515–522, Jul. 2011.

[20] I. Carrion, J. Fernandez Aleman, and A. Toval, “Personal health records: New means to safely handle our health data?,” IEEE Comput., 2012, vol. pp, no. 99, p. 1, 2012.

[21] R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” in Proc. IEEE 3rd Int. Conf. Cloud Comput., Jul. 2010, pp. 268–275.

[22] M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Trans. Parall. Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.

[23] C. Wang, X. Liu, and W. Li, “Implementing a personal health record cloud platform ciphertext-policy attribute-based encryption,” in Proc. 4th IEEE Int. Conf. Intell. Network. Collaborat. Syst., Sep. 2012, pp. 8–14.


Downloads

Published

2015-02-25

Issue

Section

Research Articles

How to Cite

[1]
Devika P., Divya S., Harinipriya V S. "Security for Medical Records Using Private Key Encryption" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.358-363, January-February-2015.