Securing Patient Information in Medical Databases

In hospitals, medical details are kept in databases. These types of medical databases store anything from diagnoses to patient information.

Some of the data in a medical database is delicate and accessibility to this data must be restricted to approved persons. Furthermore, the integrity of the data needs to be guarded to avoid unauthorised individuals from making modifications. Presently, the medical database itself controls access to the data to avoid unauthorized disclosure of, and control alterations to, the data.

Having said that, this puts a lot of trust in the database. The database itself can easily access and modify the data and and so the database administration can as well. If the database server is susceptible to a successful hacking attempt, all data kept in the database can be viewed by the attacker.

We make an effort to decrease the risk of information leakage and we need to safeguard the integrity of the data, without relying on the database. Even if the database server is affected, the data stays private and any alterations to the data could be discovered effortlessly….

Report Contents: Securing Patient Information in Medical Databases

1 Introduction
2 Storing Electronic Medical Data
2.1 What is Medical Data?
2.2 Usage of Medical Data
2.2.1 Electronic Health Records
2.2.2 MeDIA
3 System Design
3.1 Topology
3.2 Alternative Topology
3.2.1 Why Outsource Data?
3.3 Security Requirements
3.3.1 De nitions
3.3.2 Entities
3.3.3 Adversary
3.3.4 Requirements
4 Building Blocks
4.1 Notations
4.1.1 Bilinear Pairing
4.2 Con dentiality
4.2.1 Attacking Con dentiality
4.2.2 Symmetric Cryptography
4.2.3 Asymmetric Cryptography
4.2.4 One-time-pad
4.2.5 Identity-Based Encryption
4.2.6 Attribute-Based Encryption
4.2.7 Type-Based Proxy Re-Encryption
4.3 Integrity
4.3.1 Threats to Integrity
4.3.2 Protecting Integrity of Data
4.3.3 Boneh-Lynn-Shacham Signature Scheme
4.3.4 Bilinear Aggregate Signature Scheme
4.4 Availability
5 Experimental Setup
5.1 Database Setup
5.1.1 Adding Con dentiality
5.1.2 Adding Integrity
5.2 Experiments
5.2.1 Dataset
5.2.2 Query Environments
5.2.3 Queries
5.2.4 System Specifications
5.3 Prototype
5.3.1 Running the Queries…

Source: University of Twente

Download URL 2: Visit Now

Leave a Comment