Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing

被引:0
|
作者
H. O. Alanazi
A. A. Zaidan
B. B. Zaidan
M. L. Mat Kiah
S. H. Al-Bakri
机构
[1] University of Malaya,Faculty of Computer Science and Information Technology
[2] Universiti Pendidikan Sultan Idris,Department of Computing, Faculty of Arts, Computing and Creative Industry
[3] University of Technology Malaysia,Faculty of Computer Science and Information System
来源
关键词
Electronic medical records; Security; Confidentiality; Privacy; Cryptography;
D O I
暂无
中图分类号
学科分类号
摘要
This study has two objectives. First, it aims to develop a system with a highly secured approach to transmitting electronic medical records (EMRs), and second, it aims to identify entities that transmit private patient information without permission. The NTRU and the Advanced Encryption Standard (AES) cryptosystems are secured encryption methods. The AES is a tested technology that has already been utilized in several systems to secure sensitive data. The United States government has been using AES since June 2003 to protect sensitive and essential information. Meanwhile, NTRU protects sensitive data against attacks through the use of quantum computers, which can break the RSA cryptosystem and elliptic curve cryptography algorithms. A hybrid of AES and NTRU is developed in this work to improve EMR security. The proposed hybrid cryptography technique is implemented to secure the data transmission process of EMRs. The proposed security solution can provide protection for over 40 years and is resistant to quantum computers. Moreover, the technique provides the necessary evidence required by law to identify disclosure or misuse of patient records. The proposed solution can effectively secure EMR transmission and protect patient rights. It also identifies the source responsible for disclosing confidential patient records. The proposed hybrid technique for securing data managed by institutional websites must be improved in the future.
引用
收藏
相关论文
共 50 条
  • [21] OPTICAL INTERCONNECTS FOR HIGH-SPEED COMPUTING
    HAUGEN, PR
    RYCHNOVSKY, S
    HUSAIN, A
    HUTCHESON, LD
    OPTICAL ENGINEERING, 1986, 25 (10) : 1076 - 1085
  • [22] VERY HIGH-SPEED COMPUTING SYSTEMS
    FLYNN, MJ
    PROCEEDINGS OF THE INSTITUTE OF ELECTRICAL AND ELECTRONICS ENGINEERS, 1966, 54 (12): : 1901 - &
  • [23] A FLEXIBLE ENVIRONMENT FOR HIGH-SPEED COMPUTING
    MCALPINE, GL
    FELDKAMP, GB
    COMPUTER DESIGN, 1983, 22 (08): : 125 - &
  • [24] High-Speed High-Security Signatures
    Bernstein, Daniel J.
    Duif, Niels
    Lange, Tanja
    Schwabe, Peter
    Yang, Bo-Yin
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011, 2011, 6917 : 124 - +
  • [25] Security research of blockchain technology in electronic medical records
    Qu, Jia
    MEDICINE, 2022, 101 (35) : E30507
  • [26] High-speed high-security signatures
    Bernstein, Daniel J.
    Duif, Niels
    Lange, Tanja
    Schwabe, Peter
    Yang, Bo-Yin
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2012, 2 (02) : 77 - 89
  • [27] Security for High-Speed MANs/WANs
    Lamba, C. S.
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 75 - 82
  • [28] Issues in high-speed internet security
    Jungck, P
    Shim, SSY
    COMPUTER, 2004, 37 (07) : 36 - +
  • [29] Prediction of power requirements for high-speed circuits
    Corno, F
    Rebaudengo, M
    Reorda, MS
    Violante, M
    REAL-WORLD APPLICATIONS OF EVOLUTIONARY COMPUTING, PROCEEDINGS, 2000, 1803 : 247 - 254
  • [30] Mould powder requirements for high-speed casting
    Kromhout, J. A.
    Melzer, S.
    Zinngrebe, E. W.
    Kamperman, A. A.
    Boom, R.
    STEEL RESEARCH INTERNATIONAL, 2008, 79 (02) : 143 - 148