Towards Securing Medical Documents from Insider Attacks

被引:0
|
作者
Bin Ahmad, Maaz [1 ]
Khan, Abdul Wahab [1 ]
Fahad, Muhammad [1 ]
Asif, Muhammad [2 ]
机构
[1] PAF KIET, Dept COCIS, Karachi, Pakistan
[2] CUST, Dept Elect Engn, Islamabad, Pakistan
关键词
covert channels; misuse; insider; medical; documents;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this issue. But such methods can't be helpful in some of the misuse methods e.g. covert channels. As insiders may be the part of the team which developed such software, he may have deliberately inserted such channels in the source code of that software. The results may be catastrophic not only to that organization but for the patients too. This paper presents an application for securely exchange of documents in medical organizations of our country. The induction of water marking and hash protected documents enhances its security and make it fit to deploy in medical related organizations. The deployment is done in such a way that only higher management has access to the source code for reviewing. Results demonstrate its effectiveness in preventing and detecting majority of the information misuse channels.
引用
收藏
页码:357 / 360
页数:4
相关论文
共 50 条
  • [21] Securing XML documents
    Damiani, E
    di Vimercati, SD
    Paraboschi, S
    Samarati, P
    ADVANCES IN DATABSE TECHNOLOGY-EDBT 2000, PROCEEDINGS, 2000, 1777 : 121 - 135
  • [22] Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation
    Zhang, Nan
    Yu, Wei
    Fu, Xinwen
    Das, Sajal K.
    PROCEEDINGS OF THE 2008 14TH IEEE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, 2008, : 501 - +
  • [23] SECURING WIRELESS COPROCESSORS FROM ATTACKS IN THE INTERNET OF THINGS
    Staggs, Jason
    Shenoi, Sujeet
    CRITICAL INFRASTRUCTURE PROTECTION XIII, 2019, 570 : 159 - 178
  • [24] Complexity of Insider Attacks to Databases
    Kul, Gokhan
    Upadhyaya, Shambhu
    Hughes, Andrew
    PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, : 25 - 32
  • [25] Efficiently Securing Systems from Code Reuse Attacks
    Kayaalp, Mehmet
    Ozsoy, Meltem
    Abu Ghazaleh, Nael
    Ponomarev, Dmitry
    IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (05) : 1144 - 1156
  • [26] Preventing Insider Attacks in the Cloud
    Sundararajan, Sudharsan
    Narayanan, Hari
    Pavithran, Vipin
    Vorungati, Kaladhar
    Achuthan, Krishnashree
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I, 2011, 190 : 488 - +
  • [27] Securing Web servers against insider attack
    Jiang, S
    Smith, S
    Minami, K
    17TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2001, : 265 - 276
  • [28] Insider attacks: human-factors attacks and mitigation
    Abulencia J.
    Computer Fraud and Security, 2021, 2021 (05): : 14 - 17
  • [29] Securing and Recording Public Documents
    Shimer, Neltje T.
    LIBRARY JOURNAL, 1931, 56 (09) : 394 - 396
  • [30] Detecting insider attacks in medical cyber-physical networks based on behavioral profiling
    Meng, Weizhi
    Li, Wenjuan
    Wang, Yu
    Au, Man Ho
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 : 1258 - 1266