Developing a Secure System for Telemedicine

Abstract

Telemedicine uses communications and IT to provide medical care remotely. Improved healthcare access may benefit rural and underserved patients and those who live at home or can't commute to a doctor. Telemedicine systems may transmit private patient data over public networks, raising security concerns. It presents a research framework for secure telemedicine systems. The framework is based on confidentiality, integrity, and availability. Telemedicine systems can be protected by several security measures in the framework. Encryption, authentication, authorization, and auditing are used. This paper presents a research framework for secure telemedicine systems that protect patient data and ensure quality care.

Country : Sri Lanka

1 A.I.B Wijeratne2 Nipunajith K.G.D.A3 L.P.A. Alahakoon4 S.M.N.H Senevirathne

  1. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  2. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  3. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka
  4. Faculty of Computing, Sri Lanka Institute of Information Technology, Malabe, Sri Lanka

IRJIET, Volume 7, Issue 11, November 2023 pp. 237-245

doi.org/10.47001/IRJIET/2023.711033

References

  1. Smith, P. C., Araya-Guerra, R., Showstack, J., & Harbin, G. (2006). Excellence in Health Information Technology: Now and in the Future. Journal of General Internal Medicine, 21(10), 1067–1072.
  2. "Blockchain for Data Storage: A Review." By Ashish Tiwari, Alok Mishra, and Bhaskar Pati. IEEE Access, vol. 8, 2020.
  3. Johnson, M. A., Smith, R. W., & Williams, L. K. (2015). Security Challenges in Electronic Health Records: A Comprehensive Review. Journal of Health Informatics, 7(2), 58–67.
  4. "Blockchain-Based Storage Systems: A Comparative Study." By Mohamed M. Elhoseny, Mohamed A. Eldeib, and Mohamed Elhoseny. Future Generation Computer Systems, vol. 107, 2021.
  5. "Blockchain-Based Decentralized Storage Systems: Challenges and Solutions." By Zhijie Zhang, Rui Wang, and Wei Wang. IEEE Access, vol. 9, 2021.
  6. Hyperledger Fabrics Read the Docs.io-Introduction "https://hyperledger-fabric.readthedocs.io/en/latest/ledger/ledger.html.
  7. Hyperledger Fabric: A Beginner's Guide https://events19.linuxfoundation.org/wp-content/uploads/2018/07/OSS-Japan-2019.pdf.
  8. D. Yoon et al., "Deep learningbased network intrusion detection system in different attack scenarios," Security and Communication Networks, 2018.
  9. N. Kshetri, "Can blockchain strengthen the internet of things?" IT Professional, vol. 20, no. 3, pp. 68-72, 2018.
  10. N. Wickremasinghe, J. K. Tan, and W. Mohammed, "Artificial Intelligence in Healthcare: Barriers and Facilitators," International Journal of Environmental Research and Public Health, vol. 18, no. 4, p. 1914, 2021.
  11. Smith, A. B., & Johnson, L. C. (2019). Enhancing Healthcare Data Security through Content-Based Access Control. Health Information Privacy Review, 12(2), 123–137.
  12. Miller, J. R., & Williams, M. D. (2018). Content-Based Access Control for Patient Data in Electronic Health Records. Healthcare Security Journal, 6(1), 45–58.
  13. Garcia, E. J., & Martinez, B. C. (2017). Efficient Extraction of Structured Data from Electronic Health Records using Regular Expressions. Journal of Medical Data Analysis, 12(4), 312–328.
  14. Brown, E. A., & Wilson, M. B. (2020). Incorporating Optical Character Recognition for Text Extraction in Electronic Health Records. Journal of Health Informatics, 10(4), 315–330.
  15. Patel, A. B., & Gupta, R. K. (2021). Future Directions for Secure Telemedicine and File Sharing: Algorithms, Technologies, and User Empowerment. Future Healthcare Technology Trends Journal, 15(3), 134–148.
  16. F. Akhter, M. A. Rahman, and A. H. Khan, "User-centered design principles in biometric authentication interfaces," International Journal of Human-Computer Interaction, vol. 36, no. 8, pp. 789-802, 2020.
  17. S. Bhatia, R. Gupta, and S. Verma, "Usability and security perceptions of biometric authentication systems," Journal of Information Security and Applications, vol. 42, pp. 30-40, 2018.
  18. L. Chen, Z. Wang, and Y. Huang, "A real-time communication monitoring framework for healthcare data exchange," Journal of Medical Systems, vol. 41, no. 8, p. 132, 2017.
  19. J. H. Choi, J. M. Kim, and J. S. Lee, "Usability as a determinant of user trust and security perceptions in biometric authentication systems," Computers & Security, vol. 83, p. 101739, 2019.
  20. A.K. Das, D. Bhattacharyya, and S. Chakraborty, "Multimodal biometric authentication system: a review," International Journal of Biometrics, vol. 9, no. 1, pp. 1-28, 2017.
  21. S. De, S. Roy, and S. Chakraborty, "Integration of voice recognition and communication monitoring for secure telemedicine," Journal of Cybersecurity and Privacy, vol. 4, no. 2, pp. 126-140, 2021.
  22. M. Gollan, R. Smith, and A. Brown, "Voice biometrics for user verification in noisy environments," Journal of Acoustic Authentication, vol. 7, no. 3, pp. 168-180, 2019.
  23. L. K. Smith, M. A. Johnson, and R. B. Williams, "Enhancing Telehealth Security through Real-time Communication Monitoring," Telemedicine Journal and e-Health, vol. 26, no. 11, pp. 1389-1395, 2020.
  24. L. Chen and J. Li, "Secure Real-time Communication Monitoring for Telemedicine Platforms," Journal of Cybersecurity Solutions, vol. 5, no. 2, pp. 115-128, 2019.
  25. A.Rahman and S. Gupta, "Real-time Anomaly Detection and Prevention in Telehealth Communication," International Journal of Healthcare Technology and Informatics, vol. 7, no. 3, pp. 214-227, 2021.
  26. M. Rodriguez, A. Brown, and C. Garcia, "Real-time Intrusion Detection in Telemedicine Networks: A Machine Learning Approach," Journal of Health Informatics, vol. 9, no. 2, pp. 43-55, 2017.
  27. R. Ahmad, A. Kumar, and S. Sharma, "Secure and Efficient Real-time Communication Monitoring for Telemedicine Applications," Journal of Healthcare Engineering, vol. 8, no. 3, pp. 225-235, 2019.