A conceptual framework of personally controlled electronic health record (PCEHR) system to enhance security and privacy

Research output: Book chapter/Published conference paperConference paperpeer-review

2 Citations (Scopus)

Abstract

In recent years, the electronic health record (eHR) system is regarded as one of the biggest developments in healthcare domains. A personally controlled electronic health record (PCEHR) system, offered by the Australian government makes the health system more agile, reliable, and sustainable. Although the existing PCEHR system is proposed to be fully controlled by the patients, however there are ways for healthcare professionals and database/system operators to reveal the records for corruption as system operators are assumed to be trusted by default. Moreover, as a consequence of increased threats to security of electronic health records, an actual need for a strong and effective authentication and access control methods has raised. Furthermore, due to the sensitive nature of eHRs, the most important challenges towards fine-grained, cryptographically implemented access control schemes which guarantee data privacy and reliability, verifying that only authorized people can access the corresponding health records. Moreover, an uninterrupted application of the security principle of electronic data files necessitates encrypted databases. In this paper we concentrates the above limitations together by proposing a robust authentication scheme and a hybrid access control model to enhance the security and privacy of eHRs. Homomorphic encryption technique is applied in storing and working with the eHRs in the proposed cloud-based PCEHR framework. The proposed model ensures the control of both security and privacy of eHRs accumulated in the cloud database.
Original languageEnglish
Title of host publicationInternational Conference on applications and Techniques in Cyber Security and Intelligence
Subtitle of host publicationApplications and techniques in Cyber security and intelligence
EditorsJemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam
PublisherSpringer-Verlag London Ltd.
Pages304-314
Number of pages11
Volume580
ISBN (Electronic)9783319670713
ISBN (Print)9783319670706
DOIs
Publication statusPublished - 01 Jan 2018
Event2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI) - Zhejiang Business Technology Institute, Ningbo, China
Duration: 16 Jun 201718 Jun 2017
https://web.archive.org/web/20170228045429/http://aibd.us/ (Conference site)
https://link.springer.com/book/10.1007/978-3-319-67071-3#bibliographic-information (Conference proceedings)

Publication series

NameAdvances in Intelligent Systems and Computing
Volume580
ISSN (Print)2194-5357

Conference

Conference2017 International Conference on Applications and Techniques in Cyber Intelligence (ATCI)
Country/TerritoryChina
CityNingbo
Period16/06/1718/06/17
OtherThe 2017 International Conference on Applications and Techniques in Cyber Security and Intelligence focuses on all aspects on techniques and applications in cyber and electronics security and intelligence research. The purpose of ATCI 2017 is to provide a forum for presentation and discussion of innovative ideas, cutting edge research results, and novel techniques, methods and applications on all aspects of cyber and electronics security and intelligence.
As in previous years, the conference intends to attract the cyber security and cyber intelligence (e.g. big data) research community from around the world. Each submission will be reviewed by at least three independent experts, and the acceptance rate will be below 30%. We will invite three internationally renowned keynote speakers for this conference.
Internet address

Fingerprint

Dive into the research topics of 'A conceptual framework of personally controlled electronic health record (PCEHR) system to enhance security and privacy'. Together they form a unique fingerprint.

Cite this