ArticlePDF Available

Privacy of Health Information in Telemedicine on Private Cloud

Authors:
  • Sri Jayachamarajendra College of Engineering, JSS Science and Technology University
  • Renalyx healthcare bangalore

Abstract and Figures

Telemedicine involves many people at many levels with potential access to health records or medical data or the health details of a particular person. Privacy and security have always been an issue in telemedicine. In order to overcome this problem, cloud has been adopted to store and securely access data. Cloud offers a way to allow medical data and images to be transferred from patient to medical clinicians providing security. But individual patient data is not provided with privacy when it is outsourced to public cloud. In this paper, using a case study of screening the masses for early detection of non-communicable diseases at Sri Kshetra Suttur, privacy is built into telemedicine or mobile health care system with the help of the private cloud. Efficient key generation, Encryption, Decryption and analysis of health data misuse by authenticating authorized Clinicians to access patient records using Paillier Cryptosystem and Searchable Symmetric Encryption are some of the salient features introduced in this paper.
Content may be subject to copyright.
Volume 4 • Issue 5 • 1000189
Fam Med Med Sci Res
ISSN: 2327-4972 FMMSR, an open access journal
F
a
m
i
l
y
M
e
d
i
c
i
n
e
&
M
e
d
i
c
a
l
S
c
i
e
n
c
e
R
e
s
e
a
r
c
h
ISSN: 2327-4972
Arun et al., Fam Med Med Sci Res 2015, 4:5
http://dx.doi.org/10.4172/2327-4972.1000189
Research Article Open Access
Family Medicine &
Medical Science Research
Privacy of Health Information in Telemedicine on Private Cloud
Vanishree Arun1*, Padma SK1 and Shyam V2
1Department of Information Science and Engineering, Sri Jayachamarajendra College of Engineering, Mysuru 570006, Karnataka, India
2Managing Director, Forus Health Pvt. Ltd, 2234, 23rd cross, BSK II stage, Bengaluru 560070, Karnataka, India
*Corresponding author: Dr.Vanishree Arun, Department of Information Science
and Engineering, Sri Jayachamarajendra College of Engineering, Mysuru 570006,
Karnataka, India, Tel:0094256348; E-mail: vanishriarun@gmail.com
Received October 08, 2015; Accepted November 24, 2015; Published November
30, 2015
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in
Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189. doi:10.4172/2327-
4972.1000189
Copyright: © 2015 Arun V, et al. This is an open-access article distributed under
the terms of the Creative Commons Attribution License, which permits unrestricted
use, distribution, and reproduction in any medium, provided the original author and
source are credited.
Keywords: Telemedicine; Cloud; Searchable Symmetric; Encryption;
Paillier cryptosystem; Privacy
Introduction
Telemedicine helps in bringing health care access to remote
locations. It enables the clinicians to evaluate, diagnose and treat patients
remotely using the Information and Communication technology [1]. In
order to make telemedicine eective, private cloud is used which oers
services to both the sender and the receiver two-way communication.
Since telemedicine relies on cloud for communication, it suers from
security and privacy issues. erefore in our system privacy into
mobile health care system with the help of the private cloud is built
with ecient key management, privacy-preserving data storage, and
retrieval, especially for retrieval at emergencies.
Relation between information society and surveillance society
is a driving force for social and technology development. Society is
becoming increasingly dependent on advanced technology in urban
areas. Telemedicine adoption in connecting rural areas with the
urban clinicians helps in generating of an open environment where
clinician intervention is immediate which saves time and money and
medical costs. ough existing telemedicine oers some safeguards
in providing security to patient records, it cannot stop people from
misappropriating medical records for various malicious reasons. is is
a threat to healthcare practice. Technical challenges are always an issue.
Eective bandwidth resources are essential to establish connectivity
which was a great challenge in remote areas. Now since most of the
rural places are well-networked, ecient telemedicine is ensured. In
this study an eort is made to integrate telemedicine and privacy of
individual patient record to ensure patient and clinician safety.
To provide aordable healthcare to the rural masses and to
connect rural health data to the urban clinicians for immediate
intervention, a project called “For Care” was launched at Srikshetra
Suttur, Nanjangud Taluk, Mysuru to screen the masses for early
detection of non-communicable diseases like Diabetes, Hypertension
and Obesity. A Tablet was given to the rural health workers to record
patient demographics using an app. Screening for Vitals like BP, Sugar,
etc, was done by the health workers and eye screening was done by
a technician at the primary healthcare centre, Suttur, using a hand
held device called 3-Nethra. ese values were recorded on the tab. A
database repository is maintained on the cloud with security. Once the
patient records are entered onto the tab, they are synced with the cloud
to update the database. e anterior and posterior fundus images of
eyes from 3-Nethra are also forwarded to the cloud. Simultaneously the
record or image is forwarded by the health worker by selecting one of
the disease-related clinicians at JSS Hospital, Mysuru, for intervention.
e diagnosis of the clinician is sent back to health worker who alerts
the patients about Physician Intervention or Secondary care referral.
is is triggered from observed parameters in the screening phase by
the clinician.
Here both Private cloud and Public cloud are used. When the
patient record is synchronized with the cloud, medical details are
stored in the private cloud. e stored data can be accessed and the
results can be retrieved from public cloud. So it is understood that the
storage, retrieval and computation tasks are performed by the cloud
and light weight tasks for example uploading the data are done by the
users and clinicians.
Paillier Cryptosystem algorithm is used to encrypt and decrypt
patient records, where it allows the data to be stored on the remote
server. Searchable Symmetric Encryption (SSE) allows to search the
encrypted documents.
Related work
Most of works on privacy protection for mobile health data
emphasize on the formation plan [2-7].Identity-Based Encryption
(IBE) has particularly been used in simple role-based cryptographic
access control [8]. Medical Information Privacy Assurance (MIPA) has
given importance to e-health and medical information privacy, and the
privacy violation facts that resulted from technology [5]. MIPA was
used to develop health information system, in which individuals can
protect their personal information.
Shruthishree et al propose encrypted cloud data search by
securing conjunctive keyword ranked search [9-12]. Patient-
Controlled Encryption (PCE) was proposed by J. Benaloh et al. where
Abstract
Telemedicine involves many people at many levels with potential access to health records or medical data or
the health details of a particular person. Privacy and security have always been an issue in telemedicine. In order to
overcome this problem, cloud has been adopted to store and securely access data. Cloud offers a way to allow medical
data and images to be transferred from patient to medical clinicians providing security. But individual patient data is not
provided with privacy when it is outsourced to public cloud. In this paper, using a case study of screening the masses
for early detection of non-communicable diseases at Sri Kshetra Suttur, privacy is built into telemedicine or mobile
health care system with the help of the private cloud. Efcient key generation, Encryption, Decryption and analysis of
health data misuse by authenticating authorized Clinicians to access patient records using Paillier Cryptosystem and
Searchable Symmetric Encryption are some of the salient features introduced in this paper.
Volume 4 • Issue 5 • 1000189
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189.
doi:10.4172/2327-4972.1000189
Page 2 of 7
Fam Med Med Sci Res
ISSN: 2327-4972 FMMSR, an open access journal
Algorithms for key generation, encryption and decryption
Searchable symmetric encryption (SSE): when the patient records
are synced with the cloud, SSE allows these encrypted records to be
stored on remote server providing privacy. SSE also helps in searching
the encrypted records [12].
SSE consists of the following steps with corresponding algorithms:
• Step1: Generationofsecret key.Wheneachpatientrecord is
synced with the private cloud, the record is stored in a le and
a key is generated to initialize the system.
• Step 2: Building records and Indexing. For a set of patient
records, indexes are built, through which records can be
searched.
• Step3:Generationofcorrespondingtrapdoorforthekeywords
of interest given by the clinician as an input search query.
• Step4:Whenthecliniciansendsaqueryrequesttothecloud,a
search for the le is performed on the index built in Step 2 with
health-related data are fragmented into a ladder of smaller pieces of
information which are encrypted using the key which the patient
will have control [10]. Ruj et al. proposes verication of authenticity
of the user by the cloud by concealing the identity of the user and by
allowing only authenticated users to decrypt the uploaded information
thus preventing replay attacks [13-15]. Melissa Chase et al. proposed
a solution by using Attribute based encryption to protect the users’
privacy and by deleting the central authority [16].
e previous research works failed to address the challenges in data
privacy, we aim to tackle in this paper cryptographic mechanisms for
privacy-preserving on cloud.
Existing system
In the existing system of telemedicine incorporated in the project
the records are transferred directly from health worker to clinician and
back from clinician to health worker from private cloud with security.
Individual records on the public cloud do not have privacy.
Proposed system
A Cloud is created as a repository and maintained at Forus Health
Pvt. Ltd., Bengaluru, which is used for private cloud services which
intern uses the infrastructure of the public cloud providers (e.g.,
Amazon, Google). When the health worker synchronizes patient
records with the cloud, they are stored on the private cloud. When
a particular clinician is chosen by the health worker, the record is
searched and stored on the public cloud.
e activity starts once the registered user uploads the patient le.
e le will be stored in the private cloud. e le includes medical
data and images of various tests conducted of the patients related to
their health conditions. Now the health data once uploaded, the data
has to reach the clinician. To make it possible, next process is to view
the data being uploaded, aer viewing the data, a data key will be
provided. e data key is generated in a sequential order. e data key
is a secret key that is provided so that the data is secured. SSE algorithm
is provided to generate the key so as to protect the data. Once this is
done the nal step that is performed by the user is to search for the
specialized clinician requesting for treatment, the request will be sent
to the clinician who has been requested for the treatment. Now the
clinician will look into the data which is possible only when the data
key is also shared by the user. Hence the clinician can view the data
that is uploaded by the patient. All the information are stored in the
private cloud.
When the patient record is entered onto the tab, and when it is
synchronized with the cloud, each record in the form of a le will be
encrypted and forwarded to the selected clinician. When the clinician
downloads the le using the key provided, the le is decrypted. e
encryption and decryption of the patient le are done using Paillier
Cryptosystem.
e clinician writes the remarks in the eld provided in the app and
send the diagnosis and treatment back to the user as shown in Figure 1.
e Admin who logs in to the public cloud will have the ability to
check only the auditing details of the users, and the basic details of the
clinician. If the admin tries to access the medical data of the patients, a
data key will have to be present to view. But, when the admin requests
for a data key, a data key will not be provided instead a message will
be displayed saying that the medical data can be viewed only by the
clinicians. Figure 1: Flowchart of the system.
Volume 4 • Issue 5 • 1000189
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189.
doi:10.4172/2327-4972.1000189
Page 3 of 7
Fam Med Med Sci Res
ISSN: 2327-4972 FMMSR, an open access journal
the help of trapdoor in the remote server. e output will be the
list of les with similar keywords.
Algorithm to setup symmetric search encryption
• Begin
• Input : Upload patient le P using the app on tab ; K =
KeyGen(a);
Securityparametera;SecretkeyKisgenerated;I=BuildIdx(P,K);
RecordsaresearchedbasedonI;Tw=Trapdoor(K,w);
Compute trapdoor for keyword w; Search(I,Tw);
Search for records with Index I and Trapdoor Tw;
Output: List of les with keyword w.
End
Paillier cryptosystem: To securely share a patient record or
an image between patient and clinician an additive homomorphic
property of public key cryptosystem such as Paillier Cryptosystem is
used. Asymmetric cryptosystem of Paillier is applied for encryption
of patient records/ images. Due to additive homomorphic property
of Paillier, addition operation over the plain text will give same result
as multiplication over ciphered text. Extraction of record/image is
possible only if the individual records/images are available [11].
Paillier cryptosystem algorithm
1: Select two large primes, p and q.
2:Calculatetheproductn=pxq,suchthatgcd(n,Φ(n))=1,where
Φ(n)isEulerFunction.
3: Choose a random number g, where g has order multiple of n
orgcd(L(gλmodn2), n)= 1,where L(t)=(t-1) /nandλ(n)=lcm(p-
1,q-1).
4: e public key is composed of (g, n), while the private key is
composed of (p,q,λ).
5:eEncryptionofamessagem<nisgivenby:c=gmrnmodn2
6: e Decryption of ciphertext c is given by: m=(L(gλ mod n2
)/L(gλ mod n2 ) )mod n
Homomorphic encryption:
( ) () ()⊗= ⊕Ex y Ex E y
e generalized additive homomorphic property of Paillier
encryption [13] is
11
()
==


Π=




l
l
ii
ii
Em E m
Encryption: Figure 2 depicts the Encryption method where
encryption of image is considered. e original image is encrypted
and a scrambled image is obtained aer the implementation of Paillier
algorithm.
Decryption: Figure 3 depicts the Decryption method where
scrambled image is decrypted back to the original image implementing
Paillier algorithm onto Tablet. Patient prole and measurements are
enteredontotheTabletbyMobileHealthworkerasinFigure4.
B.3-Nethra screening: Eye screening is done using a hand-held
device called 3-Nethra. Posterior and anterior Fundus images are
captured and forwarded to cloud to store. e Clinician/doctor accesses
and send diagnosis to the user as depicted in Figure 5.
Telemedicine with privacy: e input provided for this project is based
on the roles present in the system, the roles are the users/health workers,
the clinicians and the admin. e input at the time of log in provided by
the user is that the basic demographic details at the time of registration
and the username and the password, clinicians provide username and
password whereas admin provides username and password. Inputs which
are provided by the users and the clinicians are stored in the private cloud
and the input provided by the admin is stored under the public cloud as
in Figure 6.
Implementation
App Development: An app with elds for patient prole (Historical,
Behavioral, Environmental) has been developed and loaded the processing
starts from the user where the user uploads the patient record/ image as in
Figure 7. A data key will be generated for the uploaded record.
e patients records/images and the clinicians log are on the private
cloud. Aer the registration User will log on to the private cloud,
Figure 2: Encryption method.
Figure 3: Decryption method.
Volume 4 • Issue 5 • 1000189
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189.
doi:10.4172/2327-4972.1000189
Page 4 of 7
Fam Med Med Sci Res
ISSN: 2327-4972 FMMSR, an open access journal
Figure 4: App from which medical details are entered onto tab.
Figure 5: For Care Project : Pre-screening using 3-Nethra.
Figure 6: User registration screen.
Volume 4 • Issue 5 • 1000189
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189.
doi:10.4172/2327-4972.1000189
Page 5 of 7
Fam Med Med Sci Res
ISSN: 2327-4972 FMMSR, an open access journal
upload the patient record/image, the user is provided with a secret data
key for privacy, the data key is provided for maintaining the privacy of
the medical data that has been uploaded as in Figure 8.
Once the clinician is selected, the clinician will view the data that
has been uploaded using the key provided by the user as in Figure 10.
Not every clinician in the telemedicine group can view the data of every
other user.
e uploaded data is been viewed by the user. Hence, aer this
process the user will have an option to search for the clinicians for
diagnosis as in Figure 9. e clinician enters the secret key and accesses
the patient record/image and writes action to be taken and forwards
back to the user as in Figure 11.
e admin who logs in to the public cloud can only see as well as
check the details of the users required for auditing but will not be able
Figure 7: The user uploading the data.
Figure 8: After uploading the data the data key is been provided for the user.
Figure 9: The 3 options present for the user, uploading, viewing the data and searching for specialized clinician.
Volume 4 • Issue 5 • 1000189
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189.
doi:10.4172/2327-4972.1000189
Page 6 of 7
Fam Med Med Sci Res
ISSN: 2327-4972 FMMSR, an open access journal
to see the patient records/images. e admin will also able to check the
details of the clinicians.
Performance discussion
Some of the test results of existing and proposed model are shown
in the Table 1. e existing system failed in authentication which was
overcome by our proposed system. us our system resulted in an
eective telemedicine with security as well as privacy to patient records
and images.
Conclusion
By encryption and decryption of patient record/image applying
Paillier cryptosystem and Searchable symmetric algorithm, the records/
images are encrypted and indices are stored on the cloud. e clinician
can access data by using the key provided by the user and decrypt. An
analysis of health data misuse by authenticating authorized Clinicians
to access patient records is done. If anyone who is not an authorized
user tries to access or modify the patient records / images on cloud, an
alert message is sent to the authorized user. Since privacy and analysis
for misuse of data are provided to patient records and images, the
eciency of the overall system is increased.
Acknowledgment
We would like to thank Doctors from the Departments of Community Medicine
and Ophthalmology, JSS Hospital, Mysuru, Karnataka, and Staff of Primary
healthcare centre, Suttur, Karnataka for their constant support in the execution of
this project and for their valuable comments and helpful suggestions.
Figure 10: The data key is provided to the clinician.
Figure 11: The clinician views the patient’s data and enters the remarks in the Actions eld.
Sl.No Test cases Test data Results in
existing model
Results in proposed model
1. Sign_up screen for
user
Same user
with
different
username
and
password
Fail- no authentication
for
demographic details
Pass, cloud
provides authentication for
demographic details
2.
Login
screen
Different user with
same username
and
password
Fail-no authentication
for
demographic details
Pass, cloud
provides authentication for
demographic details
3.
File upload
No specic
clinician,
any random
clinician
view
the
health data
Fail-no
authentication
for patient
record / image
Pass, cloud
provides authentication for patient
record / image
4.
File view Random
user can
view the le
uploaded
Fail- no authentication Pass, cloud
provides authentication
5. Basic
details and
patient record / image
Any user and any
clinician can see, other
basic
details and patient
record /
image
Fail- no
authentication
Pass, cloud
provides authentication
,where as
clinician views patient record /
image and
admin
will view
basic details
Table 1: Test results of existing and proposed model.
Volume 4 • Issue 5 • 1000189
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189.
doi:10.4172/2327-4972.1000189
Page 7 of 7
Fam Med Med Sci Res
ISSN: 2327-4972 FMMSR, an open access journal
References
1. www.globalmed.com/additional-resources/what-is-telemedicine.php
2. U.S. Department of Health & Human Service, Breaches Affecting 500 or More
Individuals (2001) [Online].Available:http://www.hhs.gov/ocr/privacy/hipaa/
administrative/breachnoticationr ule/breachtool.html
3. Ray P, Wimalasiri J (2006) The need for technical solutions for maintaining the
privacy of EHR. Conf Proc IEEE Eng Med Biol Soc 1: 4686-4689.
4. Mont MC, Bramhall P, Harrison K (2003) A exible role-based secure messaging
service: Exploiting IBE technology for privacy in health care. presented at the
14th Int. Workshop Database Expert Syst. Appl, Prague, Czech Republic.
5. Ateniese G, Curtmola R, de Medeiros B, Davis D (2002) Medical information
privacy assurance: Cryptographic and system aspects. presented at the 3rd
Conf. Security Commun.
6. Zhang L, Ahn G J, Chu BT (2002) A role-based delegation Frame work for
healthcare information systems. in 7th ACM Symp. Access Control Models
Technol, Monterey, CA, USA 2: 125–134.
7. Zhang L, Ahn G J, Chu BT (2003) A rule-based framework for Role based
delegation and revocation. ACM Trans. Inf. Syst. Security 6: 404–441.
8. Boneh D, Franklin M (2003) Identity-based encryption from the Weil pairing.
Extended abstract in CRYPTO 2001. SIAM J. Comput, 32: 586–615,
9. Sun J, Zhu X, Fang Y (2010) Preserving privacy in emergency response based
on wireless body sensor networks. in Proc. IEEE Global Telecommun. Conf
3: 1–6.
10. Benaloh J, Chase M, Horvitz E, Lauter K (2009) Patient controlled encryption:
Ensuring privacy of electronic medical records. in Proc. ACM Workshop Cloud
Comput. Security 6: 103–114.
11. Naveed ISLAM, William PUECH, Robert BROUZET (2003) How to Secretly
Share the Treasure Map of the Captain?
12. Shruthishree MK, Prasanna Kumar RS (2015) Secure Conjunctive Keyword
Ranked Search over Encrypted Cloud Data. International Journal of Computer
Science and Information Technology Research.
13. Michael Johnstone (2012) Cloud security: A case study in telemedicine.
Australian eHealth Informatics and Security Conference.
14. Tobias Volkhausen (2006) Paillier Cryptosystem: A Mathematical Introduction.
15. Neame R1 (2013) Effective sharing of health records, maintaining privacy: a
practical schema.Online J Public Health Inform 5: 217.
16. Melissa Chase, Sherman S, Chow M (2009) Improving privacy and security in
multi-authority attribute-based encryption. 16th ACM Conference on Computer
and Communications Security.
Citation: Arun V, Padma SK, Shyam V (2015) Privacy of Health Information in
Telemedicine on Private Cloud. Fam Med Med Sci Res 4: 189. doi:10.4172/2327-
4972.1000189
OMICS International: Publication Benefits & Features
Unique features:
• Increasedglobalvisibilityofarticlesthroughworldwidedistributionandindexing
• Showcasingrecentresearchoutputinatimelyandupdatedmanner
• Specialissuesonthecurrenttrendsofscienticresearch
Special features:
• 700OpenAccessJournals
• 50,000Editorialteam
• Rapidreviewprocess
• Qualityandquickeditorial,reviewandpublicationprocessing
• IndexingatPubMed(partial),Scopus,EBSCO,IndexCopernicus,GoogleScholaretc.
• SharingOption:SocialNetworkingEnabled
• Authors,ReviewersandEditorsrewardedwithonlineScienticCredits
• Betterdiscountforyoursubsequentarticles
Submityourmanuscriptat:http://www.omicsonline.org/submission/
... He suggested that Pregnancy anemia can be aggravated by various conditions such as uterine or placental bleedings, gastrointestinal bleedings, and peripartum blood loss. [3] [Gupta.P, et al.], described in his work that, Iron deficiency and anemia are associated with impaired neurocognitive development and immune function in young children. In his work he analyzed and described the prevalence of iron deficiency (ID), anemia, and iron deficiency anemia (IDA) among children 1-5 years using data from the 2007-2010 National Health and Nutrition Examination Survey (NHANES). ...
... An intelligent system using Naive Bayes technique has been developed to retrieve hidden data from the stored database and compare the user values with trained data set [6]. The methodology used in telemedicine for early detection of non-communicable diseases and analysis of healthcare data and integration of operational data to abate the prevalence incidence of non-communicable diseases have been demonstrated [7,8]. Patient examination data sets with a variable distribution have been clustered to measure the relevance of specific examinations for a given disease complication [9]. ...
... However, since 2015 and 2019, the primary studies reveal that the predominant target problem is privacy. Without minimizing the other target problems, contexts such as Mobile [47], Big Data [18], Cloud Computing [34] and The Internet of Medical Things (IoMT) [49] have made an effort to investigate how to manage privacy in the Telehealth system. Figure 5 also reveals challenges that Software Engineering must face regarding security in the Telehealth system. ...
Conference Paper
Full-text available
Telehealth systems (TS's) provide remote health-based services to improve the quality of service of patient treatment. Most healthcare professionals have access to standard telecommunications technology (such as Wireless Body Area Network (WBAN), biosensors, remote medical robots, and others) to offer remote care of elderly and physically less able patients as well as remote surgeries, treatments, and diagnoses. In order to ensure the functionality of TS's, several systemic properties must be satisfied, including security. Although there are studies that discuss different security approaches in TS's, it is difficult to have a clear view of existing security issues and solutions for these systems. In this article, a systematic mapping study was performed to detect, organize and characterize security issues in TS's. We identified 41 studies which were classified according to their research strategy, target problem, security issue addressed, and proposals. Results reveal that (i) 4 security issues were identified; (ii) 3 strategies were distinguished to handle security issues; (iii) patient and wireless medical data are the most affected medical supplies. Security in TS's reveals diverse challenges that concern Software Engineering. Areas such as requirements, software architecture, and security patterns play an important role in order to handle security issues.
... Data mining is the process of combining the different data source and deriving new patterns from the collection. Healthcare data are being used to predict epidemics, cure disease, improve quality of life and avoid preventable deaths [1]. ...
Conference Paper
Full-text available
Due to the growing population and reduced mortality rate, models of treatment delivery are rapidly changing and many decisions behind these changes are being driven by data. It is now important to understand as much about a patient as possible, in order to pick up warning signs of serious illness at an early stage. In this study, naïve Bayes approach which is a data mining classification technique is used to model the prediction of Non-Communicable Diseases (NCD) and to give systematic treatment. The project brings about technology-based non-pharmacological and lifestyle modification measures blended together for the NCD control among rural subjects. The benefits of an automated disease prediction system are decreased healthcare costs via early prediction of disease, reduced time consumption and accurate. This provides evidence-based technological approach and can serve as a model for the upcoming national programs for the policy makers in management of NCDs.
... For such decision making it is essential to mine the clinical data. Various Data mining techniques are available to derive new patterns from the dataset by combining different data sources Clinical data are useful to predict various diseases, provide proper treatment to cure disease, reduce mortality rate and help the government to formulate national programs to improve quality of life and avoid preventable deaths [1]. Our study discusses about usage of Principal Component Analysis (PCA) to find the relevant features of the data sets and ensemble framework for disease classification and prediction with three layered approach. ...
Conference Paper
Full-text available
The healthcare industry gathers enormous amount of clinical data which has a large set of diagnostic features and recorded details of patients for certain diseases. These data have to be mined to discover hidden information for effective decision making. Clinical data classification through data mining helps in finding out hidden information from large research datasets and also helps in visualizing the results to predict diseases and treatment rather than a clinical environment where a clinician reaches a treatment decision based on his theoretical knowledge, information attained from patients and the clinical reports of patient. Principal Component Analysis (PCA) has been used in this paper to find the minimum number of attributes to enhance the classifiers for faster execution, cost-effectiveness and accuracy. Using PCA we intend to find the relevant features of the data sets. An ensemble classification framework is used which consists of three modules, namely data acquisition and preprocessing, classifier training and Hierarchical Majority Voting (HMV) ensemble model for disease classification and prediction.
Article
Full-text available
Anemia is a state of poor health where there is presence of low amount of red blood cell in blood stream. This research aims to design a model for prediction of Anemia in children under 5 years of age using Complete Blood Count reports. Data are collected from Kanti Children Hospital which consist of 700 data records. Then they are preprocessed, normalized, balanced and selected machine learning algorithms were applied. It is followed by verification, validation along with result analysis. Random Forest is the best performer which showed accuracy of 98.4%. Finally, Feature Selection as well as Ensemble Learning methods, Voting, Stacking, Bagging and Boosting were applied to improve the performance of algorithms. Selecting the best performer algorithm, stacking with other algorithms, bagging it, boosting it are very much crucial to improve accuracy despite of any time issue for prediction of anemia in children below 5 years of age.
Chapter
Due to the growing population and reduced mortality rate, models of treatment delivery are rapidly changing and many decisions behind these changes are being driven by data. It is now important to understand as much about a patient as possible, in order to pick up warning signs of serious illness at an early stage. In this study, Naïve Bayes approach which is a data mining classification technique is used to model the prediction of Non-Communicable Diseases (NCD) and to give systematic treatment. The project brings about technology-based non-pharmacological and lifestyle modification measures blended together for the NCD control among rural subjects. The benefits of an automated disease prediction system are decreased healthcare costs via early prediction of disease, reduced time consumption and accurate. This provides evidence-based technological approach and can serve as a model for the upcoming national programs for the policy makers in management of NCDs.
Conference Paper
Full-text available
E-healthcare is becoming a vital part of our living environment and exhibits advantages over paper-based legacy systems. Wireless body sensor networks are indispensable in one application of e-healthcare, the remote monitoring or remote care services. However, privacy is the foremost concern of the patients and the biggest impediment of the deployment of e-healthcare systems. In addressing privacy issues, conflicts from the functional requirements must be taken into account. One such requirement is the efficient and effective response to medical emergencies. In this paper, we propose to solve these conflicting goals based on suitable cryptographic schemes. In addition, security enhancements are proposed which satisfy other fundamental security goals besides the privacy requirements.
Conference Paper
Full-text available
We explore the challenge of preserving patients' privacy in electronic health record systems. We argue that security in such systems should be enforced via encryption as well as access control. Furthermore, we argue for approaches that enable patients to generate and store encryption keys, so that the patients' privacy is protected should the host data center be compromised. The standard argument against such an approach is that encryption would interfere with the functionality of the system. However, we show that we can build an efficient system that allows patients both to share partial access rights with others, and to perform searches over their records. We formalize the requirements of a Patient Controlled Encryption scheme, and give several instantiations, based on existing cryptographic primitives and protocols, each achieving a different set of properties.
Conference Paper
Full-text available
It may be argued that medical information systems are subject to the same type of threats and compromises that plague general information systems, and that it does not require special attention from a research viewpoint. The rsthand experience of experts in information security and assurance who studied or worked with health applications has been of a dieren t sort: While general principles of security still apply in the medical information eld, a number of unique characteristics of the health care business environment suggest a more tailored approach. In this paper we describe some recent results of an on-going research on medical information privacy carried out at the Johns Hopkins University under the support of the National Science Foundation (NSF).
Article
A principal goal of computerisation of medical records is to join up care services for patients, so that their records can follow them wherever they go and thereby reduce delays, duplications, risks and errors, and costs. Healthcare records are increasingly being stored electronically, which has created the necessary conditions for them to be readily sharable. However simply driving the implementation of electronic medical records is not sufficient, as recent developments have demonstrated (1): there remain significant obstacles. The three main obstacles relate to (a) record accessibility (knowing where event records are and being able to access them), (b) maintaining privacy (ensuring that only those authorised by the patient can access and extract meaning from the records) and (c) assuring the functionality of the shared information (ensuring that the records can be shared non-proprietorially across platforms without loss of meaning, and that their authenticity and trustworthiness are demonstrable). These constitute a set of issues that need new thinking, since existing systems are struggling to deliver them. The solution to this puzzle lies in three main parts. Clearly there is only one environment suited to such widespread sharing, which is the World Wide Web, so this is the communications basis. Part one requires that a sharable synoptic record is created for each care event and stored in standard web-format and in readily accessible locations, on 'the web' or in 'the cloud'. To maintain privacy these publicly-accessible records must be suitably protected either stripped of identifiers (names, addresses, dates, places etc.) and/or encrypted: either way the record must be tagged with a tag that means nothing to anyone, but serves to identify and authenticate a specific record when retrieved. For ease of retrieval patients must hold an index of care events, records and web locations (plus any associated information for each such as encryption keys, context etc.). For added security, as well as for trustworthiness, a method of verifying authenticity, integrity and authorship is required, which can be provided using a public key infrastructure (PKI) for cryptography (2). The second part of the solution is to give control over record access and sharing to the patient (or their identified representative), enabling them to authorise access by providing the index and access keys to their records. This can be done using a token (fe.g. smart card) or a secure online index which holds these details: this serves to relieve the formal record keeper of responsibility for external access control and privacy (internal access control and privacy can remain an institutional responsibility). The third part of the solution is to process the content of the stored records such that there is a 'plain English' copy, as well as an electronic copy which is coded and marked up using XML tags for each data element to signify 'type' (e.g. administrative, financial, operational, clinical etc.) and sub-types (e.g. diagnosis, medication, procedure, investigation result etc.). This ensures that the recipient can always read the data using a basic browser, but can readily manipulate and re-arrange the data for display and storage if they have a more sophisticated installation.
Article
In this paper we present a new approach for sharing a secret image between l users exploiting additive homomorphic property of Paillier algorithm. With a traditional approach, when a dealer wants to share an image between l players, the secret image must be sequentially encrypted l + 1 times using l + 1 keys (secret or public keys). When the dealer and the l players want to extract the secret image, they must decrypt sequentially, keeping the same order of the encryption step, by using l + 1 keys (secret or private). With the proposed approach, during the encryption step, each player encrypts his own secret image using the same public key given by the dealer, the dealer encrypts the secret image to be shared with the same key and then the l secret encrypted images plus the encrypted image to be shared are multiplied between them to get a scrambled image. After this step, the dealer can securely use the private key to decrypt this scrambled image to get a new scrambled image which corresponds to the addition of the l + 1 original images because of the additive homomorphic property of Paillier algorithm. When the l players want to extract the secret image, they do not need the dealer and to use keys. Indeed, with our approach, to extract the secret image, the l players need only to subtract their own secret image from the scrambled image. In this paper we illustrate our approach with an example of a captain who wants to share a secret treasure map between l pirates. Experimental results and security analysis show the effectiveness of the proposed scheme.
Article
The management of confidential and sensitive information is a major problem for people and organisations. Dynamic organisations require secure solutions to protect confidential documents against unauthorised access and to cope with changes to people's roles and permissions. Solutions based on traditional cryptographic systems and PKI show their limitations, in terms of flexibility and manageability. This paper describes an innovative technical solution in the area of role-based secure messaging that exploits Identifier-based Encryption (IBE) technology. It illustrates the advantages over a similar approach based on traditional cryptography and PKI. It discusses a few open issues. A secure messaging system based on our technology has been fully implemented and it is currently used in a trial with a major European health service organization.
Conference Paper
ABSTRACT Attribute based encryption (ABE) [13] determines decryp- tion ability based on a user’s attributes. In a multi-authority ABE scheme, multiple attribute-authorities monitor differ- ent sets of attributes and issue corresponding decryption keys to users, and encryptors can require that a user ob- tain keys for appropriate attributes from each authority be- fore decrypting a message. Chase [5] gave a multi-authority ABE scheme using the concepts of a trusted central author- ity (CA) and global identifiers (GID). However, the CA in that construction has the power to decrypt every ciphertext, which seems somehow,contradictory to the original goal of distributing control over many,potentially untrusted author- ities. Moreover, in that construction, the use of a consistent GID allowed the authorities to combine their information to build a full profile with all of a user’s attributes, which unnecessarily compromises,the privacy of the user. In this paper, we propose a solution which removes the trusted cen- tral authority, and protects the users’ privacy by preventing the authorities from pooling their information on particular users, thus making ABE more usable in practice. Categories and Subject Descriptors E.3 [Data Encryption]: Public key cryptosystems General Terms
Conference Paper
As organizations implement information strategies that call for sharing access to resources in the networked environment, mechanisms must be provided to protect the resources from adversaries. The proposed delegation framework addresses the issue of how to advocate selective information sharing in role-based systems while minimizing the risks of unauthorized access. We introduce a systematic approach to specify delegation and revocation policies using a set of rules. We demonstrate the feasibility of our framework through policy specification, enforcement, and a proof-of-concept implementation on specific domains, e.g. the healthcare environment. We believe that our work can be applied to organizations that rely heavily on collaborative tasks.