Health Care Information Analysis

Improved Essays
Abstract: This paper to create Health Care Information’s (HCIs) that are efficient and secure. HCIs can be stored in a third party cloud. The patients, who have created their profiles in the system, make their own HCIs, mentioning their disease, symptoms and other sufficient details. The doctors who are also a part of the system attend to the queries of the patients that have been updated in the cloud. The doctors’ prescription is updated by the admin of the system, whereas the cloud admin has no access to the data. The level of encryption is considered before generating the encryption key. The record is then accessed using the key that the admin has generated. The health care services can look up to the user details. The details of the secured …show more content…
This involves privacy issues since the sensitive health information can become accessible to the cloud providers and at times, to unauthorized parties. This makes encryption mandate. The data should be encrypted by a trusted method that performs encryption before the data is outsourced and stored in the cloud. Encrypting data would raise issues such as risks like sensitive data being exposed, a large number of keys to be generated, differences in security level provided by the system and expected by the user and inability to access during emergency. In this paper, we propose a novel method to encrypt the data at different security levels, as the patient desires. Efficiency is achieved by dividing the users into two different domains. The domain containing doctors whom the patients send their queries to, can access the patient details. Whereas, the health care departments like insurance providers can access only the details that are insecure. Key revocation is used invalidate the existing key and generate a new one. This can be of great help in emergency scenarios when there is a demand for a new …show more content…
This made multi-authority scheme scalable and efficient [12]. The problems to be addressed in data sharing led to many proposals, each describing various ways to solve security issues. Most of them proposed to provide keys to effect security access. However, it led to another challenge of the key escrow problem. Authorities had to deal with a wide pool of users to provide their keys. Proposals to build a system without the key escrow problem were made [11].Identity based broadcast encryption was employed in sensor networks to reduce key size. This caused computation and storage overhead. Systems were proposed in later years, which reduced both computational times and storage overhead [15]. However, attribute based encryption is the suitable method of encrypting the health records. The attributes that require high security can only be encrypted and the key to decrypt the file is created by using the values of attributes.

3. Architecture

The architecture of the proposed HCI system is as follows. A new patient registers in the system. The profile the doctor then updates the prescription and comments for the patient. After this is updated in the cloud, the Admin of the health records encrypts the attributes that require high security. There are various security levels ranging from 0 to 4. Each level of security corresponds to different types of key generation. Health

Related Documents

  • Great Essays

    Your information is available in case there is an emergency and you can’t explain your health history at the time. The care provider can find your health records easier than trying to find out from you if you can’t talk. Your information is stored in an electronic form to keep it safe and protected in case of a disaster, like a hurricane or F5 tornado. When using electronic records you can see who accessed, when it was accessed, and why your record was accessed. Having this access to information on your health record helps enforce laws and regulations governing access.…

    • 1561 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    HIPAA Compliance

    • 1020 Words
    • 5 Pages

    Secured Health Information (PHI) must be encoded all the time. -Every remedial expert approved to get access to and convey PHI must have a "one of a kind User Identifier" so that it is…

    • 1020 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    HIPAA Violations

    • 355 Words
    • 2 Pages

    In order to achieve interoperability there are basic security standards that must be accounted for to ensure safe and secure exchange. Without adequate safe measures in place, personal health records cannot be safely transmitted electronically. Exchanging private health information electronically between medical partners comes with inherent risk however. Those risks include violation of HIPAA regulations and threats, vulnerabilities and malware that threaten electronic health records (EHR) or mainframe servers.…

    • 355 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Problem Statement: Patient data security is an ongoing and evolving problem in healthcare. According to the US Census Bureau, US Department of Health and Human Services, “143 million patients’ records have been compromised over the past five years…” (Zeadally, Isaac, & Baig, 2016). A patient’s medical record information is a highly sought after commodity among hackers, cyber criminals, and identity thieves because it contains “personal, insurance, and financial information”. They are able to sell this information for “up to $251 per record” as opposed to stolen credit card numbers, which they are only able to sell for “33 cents per number”.…

    • 1371 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Cost Benefit Analysis

    • 1774 Words
    • 7 Pages

    Two such companies providing PHR solutions are General Electric’s (GE), Patient Online 13 and Microsoft’s, HealthVault (Vecchione, 2012). Some qualities any selected PHR should possess include: • Security: information should be encrypted point to point and require trusted user authentication methods. This will not only comply with regulations but also allow patients a greater level of trust. • Usability…

    • 1774 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    The invention of PKI by Diffie and Hellman completely changed any kind of secure communications. The idea of cryptographically protected certificates binding user identifies to public keys. Based on the nature of the healthcare organization- Patient…

    • 680 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    There are many EHR vendors in the healthcare market. The massive presence of businesses that provide these services gives patients and healthcare providers a broad variety of EHRs to choose from. Each EHR vendor offers a system that is unique, which becomes challenging when there is need to share patient data. In some cases, such as earthquake emergencies, victims may receive emergency health care from a professional that does not have their patient records. It becomes difficult sharing information if the usual healthcare provider of the client uses a different EHR vendor from the emergency healthcare provider.…

    • 653 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    To maintain this security in the future nurse executives must maintain education related to security and privacy issues and bring it back to their organizations. Also it is important that the proper use of electronic and written information in regards to patient’s EHR be followed. It is imperative that health organizations having continual education on informatics and proper use of such. The avenue of nursing informatics is only going to expand in our time as nurses and it is our duty to ensure we are working on behalf of our promise to provide privacy to those we care for. According to Simpson (2013), It is time for nurse executives to enlist the help of academic leaders and regulators in the effort to build learning infrastructure capable of the competencies needed by nurse…

    • 1241 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    HIPAA Essay

    • 596 Words
    • 3 Pages

    This implemented method are meant to ensure the privacy and security of the patient health data. The electronic transmissions of administrative and financial information will reduce the number of forms and methods used in the past in the claims processing, as well as any fraudulent and nonproductive effort that goes into processing…

    • 596 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Technology is an important factor in today’s society especially in our healthcare system. The advancement in technology is on the rise and it is always changing and updating. The healthcare system is making their way to convert all their medical records electronically; although this can be a good transition, it can also pose a problem. Electronic health records have not been perfected and there are still risks for breaches and potentially a big possibility of disclosing patient’s important medical and personal records. On September 8, 2011, Nemours, a Children’s Health System reported missing three unencrypted computer backup tapes that were locked and stored in a cabinet in the Nemours Health System facility in Delaware.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Informatics Electronic Health records: A boon or privacy nightmare? Health records are supposed to be private and secure. This article shows how not all health records end up being private and secure. Health records were stored in different ways. People were trying to steal private information.…

    • 570 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Healthcare field is a large complex organization full of individuals whose duty is to provide the best health services possible. In order to provide patience’s with the best care possible these individuals have not only been trained in science and medicine but also in laws and ethics. Healthcare organization has always been interconnected with the government and law. Throughout the years there has been many laws set in place to protect all parties involved from state, organization, and individual employees and patients. A factor that has always been a concern in the healthcare system is that of privacy; individual patience’s tend to be concern for their private information and have the right to privacy and confidentiality.…

    • 805 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    HIPAA for Healthcare Providers When patients visit a physician’s office or other medical facility, they can always expect the quality care and confidentiality. However, in present, the number of people who have access to patient information has increased at a rapid rate because of the advent of modern technology, including the Internet, e-mail, fax machines, and computers. It becomes a challenge for medical providers to secure patients’ confidentiality. “In order to address the concern for patients’ privacy, Congress mandated that the Health Insurance Portability and Accountability Act of 1996 (HIPAA) enforce its privacy provision by April 14, 2003.”…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    According to Darzi (2014), the introduction of records sharing schemes is already transforming the medical landscape by reducing errors and improving care. Electronic health records are crucial because ACO’s mange the health of the patient, thus requiring patient care records on every patient in the system. Health information technology provides clinicians with accurate and complete information about a patient’s health and reduces the amount of paperwork for patient and physicians. Additionally, electronic records are an essential part of data recording for the physicians to see the past history of each patient. This would allow the health care staff to take data from all the sources and use it specifically to track and manage the patients.…

    • 976 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays