Towards Securing Medical Documents from Insider Attacks

被引:0
|
作者
Bin Ahmad, Maaz [1 ]
Khan, Abdul Wahab [1 ]
Fahad, Muhammad [1 ]
Asif, Muhammad [2 ]
机构
[1] PAF KIET, Dept COCIS, Karachi, Pakistan
[2] CUST, Dept Elect Engn, Islamabad, Pakistan
关键词
covert channels; misuse; insider; medical; documents;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this issue. But such methods can't be helpful in some of the misuse methods e.g. covert channels. As insiders may be the part of the team which developed such software, he may have deliberately inserted such channels in the source code of that software. The results may be catastrophic not only to that organization but for the patients too. This paper presents an application for securely exchange of documents in medical organizations of our country. The induction of water marking and hash protected documents enhances its security and make it fit to deploy in medical related organizations. The deployment is done in such a way that only higher management has access to the source code for reviewing. Results demonstrate its effectiveness in preventing and detecting majority of the information misuse channels.
引用
收藏
页码:357 / 360
页数:4
相关论文
共 50 条
  • [1] Towards Securing Cloud Computing from DDOS Attacks
    Ahmed, Ishtiaq
    Ahmed, Sheeraz
    Nawaz, Asif
    Jan, Sadeeq
    Najam, Zeeshan
    Saadat, Muneeb
    Khan, Rehan Ali
    Zaman, Khalid
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (08) : 615 - 622
  • [2] Towards securing cloud computing from DDOS attacks
    Ahmed I.
    Ahmed S.
    Nawaz A.
    Jan S.
    Najam Z.
    Saadat M.
    Khan R.A.
    Zaman K.
    1600, Science and Information Organization (11): : 615 - 622
  • [3] Evaluation of Hypervisor Stability towards Insider Attacks
    Roman Kulikov
    Svetlana Kolesnikova
    Journal of Electronic Science and Technology, 2016, (01) : 37 - 42
  • [4] Evaluation of hypervisor stability towards insider attacks
    Kulikov R.
    Kolesnikova S.
    Kulikov, Roman (rdkulikov@corp.ifmo.ru), 1600, Univ. of Electronic Science and Technology of China (14): : 37 - 42
  • [5] Evaluation of Hypervisor Stability towards Insider Attacks
    Roman Kulikov
    Svetlana Kolesnikova
    JournalofElectronicScienceandTechnology, 2016, 14 (01) : 37 - 42
  • [6] Securing Implantable Medical Devices against Cyberspace Attacks
    Rekhis, S.
    Boudriga, N.
    Ellouze, N.
    2017 2ND INTERNATIONAL CONFERENCE ON ANTI-CYBER CRIMES (ICACC), 2017, : 187 - 192
  • [7] Towards a Simplification of Medical Documents
    Nakhle, Farid
    Raheel, Saeed
    2018 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2018,
  • [8] Securing Hardware from Malicious Attacks
    Abdelgawad, Mohamed M.A.
    Azer, Marianne A.
    TechRxiv, 2022,
  • [9] SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks
    Chang, Sang-Yoon
    Hu, Yih-Chun
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (12) : 3527 - 3540
  • [10] Securing Processors Against Insider Attacks: A Circuit-Microarchitecture Co-Design Approach
    Rajendran, Jeyavijayan
    Kanuparthi, Arun Karthik
    Karri, Ramesh
    Zahran, Mohamed
    Addepalli, Sateesh K.
    Ormazabal, Gaston
    IEEE DESIGN & TEST, 2013, 30 (02) : 35 - 44