Skip to main content

On the Security Policy and Privacy Protection in Electronic Health Information System

  • Conference paper
  • First Online:
6GN for Future Wireless Networks (6GN 2020)

Abstract

The integration of information technology and medical techniques could benefit expanding the time and location for medical services as well as provide better medical quality that it has become a trend in medical domain. For this reason, this study proposes to develop an integrated healthcare information system. Furthermore, based on user privacy and system information security, the key in a smart national health insurance card or a patient’s fingerprint together with a doctor’s group signature and public key are utilized for retrieving electronic medical records from the system so as to protect the confidential information in the system and guarantee patients’ privacy. This system covers other relevant functions of medical record mobility, data link, information security protection, and drug conflict avoidance. In the integrated healthcare information system, a patient’s privacy could be protected through hiding. The retrieval location of medical records is always the same that doctors from different hospitals could access to the medical records through authorization. When dealing with an urgent case, the real-time medical record retrieval could effectively enhance the recovery rate. The information in the system procedure broadly covers diagnoses of patients, insurance claims, and drug collection in order to prevent doctors from prescribing wrong medicine, avoid the troublesome of insurance claim application, and reduce patients’ problem about collecting receipts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dai, C.-y.: Secure Access Control of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. Department of Information Science and Engineering, National Chiao Tung University, Hsinchu City (2013)

    Google Scholar 

  2. Huang, K.-H., Hsieh, S.-H., Chang, Y.-J., Lai, F., Hsieh, S.-L., Lee, H.-H.: Application of portable CDA for secure clinical-document exchange. J. Med. Syst. 34(4), 531–539 (2010)

    Article  Google Scholar 

  3. Yang, Y., Han, X., Bao, F., Deng, R.H.: A Smart-card-enabled privacy preserving E-prescription system. IEEE Trans. Inf. Technol. Biomed. 8(1), 47–58 (2004)

    Article  Google Scholar 

  4. Stallings, W.: Cryptography and Network Security: Principal and Practices, 7th edn. Prentice Hall, Boston (2016)

    Google Scholar 

  5. Takeda, H., Matsumura, Y., Kuwata, S.: Architecture for networked electronic medical record systems. Int. J. Med. Inform. 60(2), 161–167 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhen-Yu Wu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, HY., Huang, YM., Wu, ZY., Huang, YT. (2020). On the Security Policy and Privacy Protection in Electronic Health Information System. In: Wang, X., Leung, V.C.M., Li, K., Zhang, H., Hu, X., Liu, Q. (eds) 6GN for Future Wireless Networks. 6GN 2020. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 337. Springer, Cham. https://doi.org/10.1007/978-3-030-63941-9_34

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-63941-9_34

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-63940-2

  • Online ISBN: 978-3-030-63941-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics