Malware intrusion in Electronic Health Record


Malware intrusion in Electronic Health Record

Sowmya, Dhina Suresh

Sowmya, Dhina Suresh "Malware intrusion in Electronic Health Record" Published in International Journal of Trend in Research and Development (IJTRD), ISSN: 2394-9333, Special Issue | NCPCIT-18 , September 2018, URL: http://www.ijtrd.com/papers/IJTRD18020.pdf

The overall purpose of this research is to overcome the propagation of malware activities in several aspects. EHR - Electronic Health Records which is the real-time, patient – centred record system that make information available to the authorized users which includes doctors, patients and the other nursing and clinical for accessing or updating the information and maintain them frequently for patient care. Health record management is an important and challenging task. Utilization of technologies in health care, particularly the use of Electronic Health Records (EHR) offers a wide variety of benefits. Better healthcare is provided by EHR by improving all aspects of health care. Several authentications are involved in safeguarding the records for sensitive and actual data to the patients. In spite of many safeguarding technique, still there is malware function taking place in affecting the whole process. Global impact from WannaCry malware is one of the transitory issues where the maximum data are encrypted. This leads to abusing of SMB. The main aim is to overcome the malware activities by using backdoor implant tools. One of the tool called as a kill switch proved highly effective in stopping the threat. We propose a novel ABE-based framework for patient-centric secure sharing of EHRs in cloud computing environments, under the multi-owner settings. To address the key management challenges, we conceptually divide the users in the system into two types of domains, namely public and personal domains. In particular, the majority professional users are managed distributive by attribute authorities in the former, while each owner only needs to manage the keys of a small number of users in her personal domain. In the public domain, we use multi-authority ABE (MA-ABE) to improve the security and avoid key escrow problem. Each attribute authority (AA) in it governs a disjoint subset of user role attributes, while none of them alone is able to control the security of the whole system. We propose mechanisms for key distribution and encryption so that EHR owners can specify personalized fine-grained role-based access policies during file encryption. In the personal domain, owners directly assign access privileges for personal users and encrypt a PHR file under its data attributes.

Attribute based encryption, Multi-authority, semi trusted servers


Special Issue | NCPCIT-18 , September 2018

2394-9333

IJTRD18020
pompy wtryskowe|cheap huarache shoes| cheap jordans|cheap jordans|cheap air max| cheap sneaker cheap nfl jerseys|cheap air jordanscheap jordan shoes
cheap wholesale jordans