Security for Medical Records Using Private Key Encryption
Keywords:
PHR, DICOM, HTML5, MyPHRMachines, EHR, VMs, IaaSAbstract
Personal Health Records (PHRs) should remain the lifelong property of patients, who should be able to show them conveniently and securely to selected caregivers and institution. In contrast to previous approaches, our solution is designed to maintain EMR availability even when the network connectivity is not available. To validate our architecture, we have implemented a prototype system using attribute based encryption algorithm. Patients will be able to share their remote virtual machine session with selected caregivers, who will need internet and a Java enabled Web browser to PHR. We discuss a prototype that enables to generate a ciphered long key string and implement a Hypervisor which is a virtual machine to maintain the PHRs. Index Terms—Cloud computing, electronic medical record (EMR), personal health record (PHR), hypervisor.
References
[1] D. C. Kaelber, A. K. Jha, D. Johnston, B. Middleton, and D. W. Bates, “Viewpoint paper: A research agenda for personal health records (PHRs),†J. Amer. Med. Inform. Assoc., vol. 15, no. 6, pp. 729–736, 2008.
[2] A.
Rosenthal, P. Mork, J. Li, M.H. adn Stanford, D. Koester, and P. Reynolds,
“Cloud computing: A new business paradigm for biomedical information sharing,†J. Biomed. Inf., vol. 43, pp. 342–353,
2010.
[3] Accelarad.
(2012, Jul.). Seemyradiology – medical image sharing.[Online].Available:
http://www.seemyradiology.com/
[4] S.
Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A.
Ghalsasi,“Cloudcomputing—Thebusinessperspective,â€Decis.Supp.Syst.,vol.51, pp. 176–189, 2011.
[5] T.
J. Bittman, G. J. Weiss, M. A. Margevicius, and P. Dawson, “Magic quadrant for
x86 server virtualization infrastructure,†Gartner Inc., Stamford, CT, USA, RAS
Core Research Note G00205369, Jun. 2011.
[6] D.
T. Mon, J. Ritter, C. Spears, and P. Van Dyke, “PHR system functional model,â€
HL7 PHR Standard, May 2008.
[7] S.
Negrini, S. Atanasio, F. Zaina, and M. Romano, “Rehabilitation of adolescent
idiopathic scoliosis: Results of exercises and bracing from a series of
clinical studies. Europa medicophysica-SIMFER 2007 award winner,†Eur. J. Phys. Rehab. Med., vol. 44, no.
2, pp. 169–176, Jun. 2008.
[8] M.
L. Metzker, “Sequencing technologies—The next generation,†Nature Rev. Genet., vol. 11, no. 1, pp. 31–46, Jan. 2010.
[9] K.
Wetterstrand. (2012, Jan.). DNA sequencing costs—Data from the NHGRI
large-scale genome sequencing program. [Online]. Available: http://www.genome.gov/sequencingcosts/
[10] P.
Van Gorp and P. Grefen, “Supporting the internet-based evaluation of research
software with cloud infrastructure,†Softw.
Syst. Model., vol. 11, no. 1, pp. 11–28, 2012.
[11] Microsoft
Terminal Services Team. (2009 Mar.). Top 10 RDP protocol misconceptions.
[Online]. Available: http://blogs.msdn.com/b/
rds/archive/2009/03/03/top-10-rdp-protocol-misc onceptions-part-1.aspx
[12] Nucleics.
(2012). Reviews of dna sequencing service companies & facilities. [Online].
Available: http://www.nucleics.com/DNA_sequencing_support/sequencing-service-reviews.html
[13] K.
Nazi, “Veteran’s voices: Use of the American customer satisfaction index survey
to identify my healthevet personal health record users’ characteristics, needs,
and preferences,†J. Amer. Med. Inf. Assoc., vol. 17, pp. 203–211, 2010.
[14] D.
Detmer, M. Bloomrosen, B. Raymond, and P. Tang, “Integrated personal health
records: Transformative tools for consumer-centric care,†BMC Med. Inf. Decis.
Mak., vol. 8, 2008.
[15] J.
Halamka, K. Mandl, and P. C. Tang, “Early experiences with personal health
records,†J. Amer. Med. Inf. Assoc., vol. 15, no. 1, pp. 1–7, 2008.
[16] D.
C. Kaelber, S. Shah, A. Vincent, E. Pan, J. M. Hook, D. Johnston, D. W. Bates,
and B. Middleton, The Value of Personal Health Records. Healthcare Information
& Management Systems Society, 2008.
[17] B.
Adida, A. Sanyal, S. Zabak, I. S. Kohane, and K. D. Mandl, “Indivo X:
Developing a fully substitutable personally controlled health record platform,â€
in Proc. AMIA Symp., Nov. 2010, pp. 6–10.
[18] A.
Sunyaev, D. Chornyi, C. Mauro, and H. Kremar, “Evaluation framework for
personal health records: Microsoft healthvault vs. googlehealth,†in Proc. 43rd
Hawaii Int. Conf. Syst. Sci., Jan. 2010, pp. 1–10.
[19] N.
Archer, U. Fevrier-Thomas, C. Lokker, K. A. McKibbon, and S. E. Straus,
“Personal health records: A scoping review,†J. Amer. Med. Inform. Assoc., vol.
18, pp. 515–522, Jul. 2011.
[20] I.
Carrion, J. Fernandez Aleman, and A. Toval, “Personal health records: New means
to safely handle our health data?,†IEEE Comput., 2012, vol. pp, no. 99, p. 1,
2012.
[21] R.
Zhang and L. Liu, “Security models and requirements for healthcare application
clouds,†in Proc. IEEE 3rd Int. Conf. Cloud Comput., Jul. 2010, pp. 268–275.
[22] M.
Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of
personal health records in cloud computing using attribute-based encryption,†IEEE
Trans. Parall. Distrib. Syst., vol. 24, no. 1, pp. 131–143, Jan. 2013.
[23] C.
Wang, X. Liu, and W. Li, “Implementing a personal health record cloud platform
ciphertext-policy attribute-based encryption,†in Proc. 4th IEEE Int. Conf.
Intell. Network. Collaborat. Syst., Sep. 2012, pp. 8–14.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.