Towards Securing Medical Documents from Insider Attacks

被引:0
|
作者
Bin Ahmad, Maaz [1 ]
Khan, Abdul Wahab [1 ]
Fahad, Muhammad [1 ]
Asif, Muhammad [2 ]
机构
[1] PAF KIET, Dept COCIS, Karachi, Pakistan
[2] CUST, Dept Elect Engn, Islamabad, Pakistan
关键词
covert channels; misuse; insider; medical; documents;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this issue. But such methods can't be helpful in some of the misuse methods e.g. covert channels. As insiders may be the part of the team which developed such software, he may have deliberately inserted such channels in the source code of that software. The results may be catastrophic not only to that organization but for the patients too. This paper presents an application for securely exchange of documents in medical organizations of our country. The induction of water marking and hash protected documents enhances its security and make it fit to deploy in medical related organizations. The deployment is done in such a way that only higher management has access to the source code for reviewing. Results demonstrate its effectiveness in preventing and detecting majority of the information misuse channels.
引用
收藏
页码:357 / 360
页数:4
相关论文
共 50 条
  • [31] Securing MAODV: Attacks and countermeasures
    Roy, S
    Addada, VG
    Setia, S
    Jajodia, S
    2005 SECOND ANNUAL IEEE COMMUNICATIONS SOCIETY CONFERENCE ON SENSOR AND AD HOC COMMUNICATIONS AND NETWORKS, 2005, : 521 - 532
  • [32] Towards Securing Client-Server Connections against Man-in-the-Middle Attacks
    Ordean, Mihai
    Giurgiu, Mircea
    2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 127 - 130
  • [33] Securing Docker Containers from Denial of Service (DoS) Attacks
    Chelladhurai, Jeeva
    Chelliah, Pethuru Raj
    Kumar, Sathish Alampalayam
    PROCEEDINGS 2016 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2016), 2016, : 856 - 859
  • [34] 'Green on Blue': Insider Attacks in Afghanistan
    Long, Austin
    SURVIVAL, 2013, 55 (03) : 167 - 182
  • [35] The SEC Attacks "Shadow Insider Trading"
    Barron, Robert A.
    SECURITIES REGULATION LAW JOURNAL, 2022, 50 (01):
  • [36] A New Approach for Detection of Insider Attacks
    Sen, Sevil
    2013 21ST SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2013,
  • [37] An overview of insider attacks in cloud computing
    Duncan, Adrian
    Creese, Sadie
    Goldsmith, Michael
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (12): : 2964 - 2981
  • [38] Characterizing Social Insider Attacks on Facebook
    Ahmed Usmani, Wali
    Marques, Diogo
    Beschastnikh, Ivan
    Beznosov, Konstantin
    Guerreiro, Tiago
    Carrico, Luis
    PROCEEDINGS OF THE 2017 ACM SIGCHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'17), 2017, : 3810 - 3820
  • [39] An Analysis of Complexity of Insider Attacks to Databases
    Kul, Gokhan
    Upadhyaya, Shambhu
    Hughes, Andrew
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2021, 12 (01)
  • [40] FBI data open to 'insider attacks'
    不详
    NEW SCIENTIST, 2007, 194 (2606) : 29 - 29