scholarly journals Medical Sports Data Privacy Protection Method Based on Legal Risk Control

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Liqiang Jia ◽  
Wei Fan

With the continuous development of computer and network technology, the amount of information storage in medical information system is more and more large, which is prone to the problem of privacy information leakage, resulting in irreparable harm. In order to solve the problem of privacy leakage in the medical environment, a new privacy rating method is proposed according to the actual situation of the medical environment. The big data technology is used to effectively mine, analyze, integrate, and reuse medical data, and a new improved model is proposed. At the same time, the medical information system applying the improved model is designed according to the complex actual needs. The purpose of this paper is to correctly understand the positive role of medical sports big data (BD) research in the medical field and standardize the behavior of medical staff. On the one hand, it can improve the safety awareness of patients and enhance the standardization of medical treatment environment. This paper will analyze the meaning and research status of medical data from the perspective of legal risk control, focus on the status quo and existing problems of medical sports data privacy protection, and put forward positive countermeasures and some practical solutions. The results show that the medical sports information data has certain regularity and particularity, ease to spread, and mining. Hospitals and medical staff should make the areas and items restricted by law clear, standardize their own behaviors, constantly sum up experience, and actively improve and modify relevant measures.

1970 ◽  
Vol 09 (03) ◽  
pp. 149-160 ◽  
Author(s):  
E. Van Brunt ◽  
L. S. Davis ◽  
J. F. Terdiman ◽  
S. Singer ◽  
E. Besag ◽  
...  

A pilot medical information system is being implemented and currently is providing services for limited categories of patient data. In one year, physicians’ diagnoses for 500,000 office visits, 300,000 drug prescriptions for outpatients, one million clinical laboratory tests, and 60,000 multiphasic screening examinations are being stored in and retrieved from integrated, direct access, patient computer medical records.This medical information system is a part of a long-term research and development program. Its major objective is the development of a multifacility computer-based system which will support eventually the medical data requirements of a population of one million persons and one thousand physicians. The strategy employed provides for modular development. The central system, the computer-stored medical records which are therein maintained, and a satellite pilot medical data system in one medical facility are described.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Roseline Oluwaseun Ogundokun ◽  
Oluwakemi Christiana Abikoye

Safe conveyance of medical data across unsecured networks nowadays is an essential issue in telemedicine. With the exponential growth of multimedia technologies and connected networks, modern healthcare is a huge step ahead. Authentication of a diagnostic image obtained from a specialist at a remote location which is from the sender is one of the most challenging tasks in an automated healthcare setup. Intruders were found to be able to efficiently exploit securely transmitted messages from previous literature since the algorithms were not efficient enough leading to distortion of information. Therefore, this study proposed a modified least significant bit (LSB) technique capable of protecting and hiding medical data to solve the crucial authentication issue. The application was executed and established by utilizing MATLAB 2018a, and it used a logical bit shift operation for execution. The investigational outcomes established that the proposed technique can entrench medical information without leaving a perceptible falsification in the stego image. The result of this implementation shows that the modified LSB image steganography outperformed the standard LSB technique with a higher PSNR value and lower MSE value when compared with previous research works. The number of shifts was added as a new performance metric for the proposed system. The study concluded that the proposed secured medical information system was evidenced to be proficient in secreting medical information and creating undetectable stego images with slight entrenching falsifications when likened to other prevailing approaches.


2014 ◽  
Vol 8 (1) ◽  
pp. 13-21 ◽  
Author(s):  
ARKADIUSZ LIBER

Introduction: Medical documentation must be protected against damage or loss, in compliance with its integrity and credibility and the opportunity to a permanent access by the authorized staff and, finally, protected against the access of unauthorized persons. Anonymization is one of the methods to safeguard the data against the disclosure.Aim of the study: The study aims at the analysis of methods of anonymization, the analysis of methods of the protection of anonymized data and the study of a new security type of privacy enabling to control sensitive data by the entity which the data concerns.Material and methods: The analytical and algebraic methods were used.Results: The study ought to deliver the materials supporting the choice and analysis of the ways of the anonymization of medical data, and develop a new privacy protection solution enabling the control of sensitive data by entities whom this data concerns.Conclusions: In the paper, the analysis of solutions of data anonymizing used for medical data privacy protection was con-ducted. The methods, such as k-Anonymity, (X,y)- Anonymity, (a,k)- Anonymity, (k,e)-Anonymity, (X,y)-Privacy, LKC-Privacy, l-Diversity, (X,y)-Linkability, t-Closeness, Confidence Bounding and Personalized Privacy were described, explained and analyzed. The analysis of solutions to control sensitive data by their owners was also conducted. Apart from the existing methods of the anonymization, the analysis of methods of the anonimized data protection was conducted, in particular the methods of: d-Presence, e-Differential Privacy, (d,g)-Privacy, (a,b)-Distributing Privacy and protections against (c,t)-Isolation were analyzed. The author introduced a new solution of the controlled protection of privacy. The solution is based on marking a protected field and multi-key encryption of the sensitive value. The suggested way of fields marking is in accordance to the XML standard. For the encryption (n,p) different key cipher was selected. To decipher the content the p keys of n is used. The proposed solution enables to apply brand new methods for the control of privacy of disclosing sensitive data.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Xunbao Wang ◽  
Fulong Chen ◽  
Heping Ye ◽  
Jie Yang ◽  
Junru Zhu ◽  
...  

On the basis of Internet of Things (IoT) technologies, Community Medical Internet of Things (CMIoT) is a new medical information system and generates massive multiple types of medical data which contain all kinds of user identity data, various types of medical data, and other sensitive information. To effectively protect users’ privacy, we propose a secure privacy data protection scheme including transmission protection and access control. For the uplink transmission data protection, bidirectional identity authentication and fragmented multipath data transmission are used, and for the downlink data protection, fine grained access control and dynamic authorization are used. Through theoretical analysis and experiment evaluation, it is proved that the community medical data can be effectively protected in the transmission and access process without high performance loss.


2021 ◽  
Vol 11 (5) ◽  
pp. 2072
Author(s):  
Shamil Magomedov ◽  
Artem Lebedev

The problem of consistency of medical data in Hospital Data Management Systems is considered in the context of correctness of medical images stored in a PACS (Picture Archiving and Communication System) and legality of actions authorized users perform when accessing MIS (Medical Information System) facilities via web interfaces. The purpose of the study is to develop a SIEM-like (Security Information and Event Management) architecture for offline analysis of DICOM (Digital Imaging and Communications in Medicine) archive integrity and users’ activity. To achieve amenable accuracy when validating DICOM archive integrity, two aspects are taken into account: correctness of periodicity of the incoming data stream and correctness of the image data (time series) itself for the considered modality. Validation of users’ activity assumes application of model-driven approaches using state-of-the-art machine learning methods. This paper proposes a network architecture with guard clusters to protect sensitive components like the DICOM archive and application server of the MIS. New server roles were designed to perform traffic interception, data analysis and alert management without reconfiguration of production software components. The cluster architecture allows the analysis of incoming big data streams with high availability, providing horizontal scalability and fault tolerance. To minimize possible harm from spurious DICOM files the approach should be considered as an addition to other securing techniques like watermarking, encrypting and testing data conformance with a standard.


1977 ◽  
Vol 16 (04) ◽  
pp. 234-240 ◽  
Author(s):  
Joann Gustafson ◽  
J. Nelson ◽  
Ann Buller

The contribution of a special library project to a computerized problem-oriented medical information system (PROMIS) is discussed. Medical information displays developed by the PROMIS medical staff are accessible to the health care provider via touch screen cathode terminals. Under PROMIS, members of the library project developed two information services, one concerned with the initial building of the medical displays and the other with the updating of this information. Information from 88 medical journals is disseminated to physicians involved in the building of the medical displays. Articles meeting predetermined selection criteria are abstracted and the abstracts are made available by direct selective dissemination or via a problem-oriented abstract file. The updating service involves comparing the information contained in the selected articles with the computerized medical displays on the given topic. Discrepancies are brought to the attention of PROMIS medical staff members who evaluate the information and make appropriate changes in the displays. Thus a feedback loop is maintained which assures the completeness, accuracy, and currency of the computerized medical information. The development of this library project and its interface with the computerized health care system thus attempts to deal with the problems in the generation, validation, dissemination, and application of medical literature.


2015 ◽  
Vol 11 (12) ◽  
pp. 73-79
Author(s):  
I.D. Duzhyi ◽  
◽  
V.V. Gorokh ◽  
O.V. Trubilko ◽  
S.V. Kharchenko ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document