http://iet.metastore.ingenta.com
1887

Introduction

Introduction

For access to this article, please select a purchase option:

Buy chapter PDF
$16.00
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
Security and Privacy of Electronic Healthcare Records: Concepts, paradigms and solutions — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Security and privacy are the foremost concern for growing individual trust and data integration. The health information of patients/individuals should be secure and private. Patients hesitate to disclose their health information if they don't have trust in the electronic health records (EHR) system. Hence, security and privacy of health records play a crucial role because leaking of patient health data could have life threating consequences. Security and privacy are required between patients and physicians/doctors. Once data is generated, it is stored in local databases and then stored in a remote system using a remote gateway. As soon as we collect data and store it and further share it, there is the possibility of attacks and privacy issues. To mitigate this, various privacy preservation techniques need to be applied. Some examples of privacy techniques are shown such as grant access, access control model, and pseudonymity. Further, some attack mitigation techniques are mentioned such as authorization and authentication.

Chapter Contents:

  • 1.1 Personal health record
  • 1.2 Privacy and security issue in PHR
  • 1.2.1 Insider curiosity and subordination
  • 1.2.2 Accidental disclosure
  • 1.2.3 Outsider intrusion
  • 1.2.4 Uncontrolled secondary usage
  • 1.3 Electronic health record
  • 1.3.1 Advantages of having EHRs
  • 1.3.1.1 Enhanced quality of care
  • 1.3.1.2 More convenient care
  • 1.3.1.3 Save efforts and time
  • 1.4 What are the benefits of EHR technology?
  • 1.5 Security and privacy concern in EHR
  • 1.5.1 Privacy in EHR
  • 1.5.2 Security in EHR
  • 1.5.1.1 Grant access
  • 1.5.1.2 Access control model
  • 1.5.1.3 Pseudonymity
  • 1.5.2 Security in EHR
  • 1.6 Challenges in security and privacy
  • 1.6.1 Verification of user
  • 1.6.2 Integrity and confidentiality
  • 1.6.3 Access control
  • 1.6.4 Data control
  • 1.6.5 Data security policies
  • 1.6.6 Profiles of user
  • 1.6.7 Misuse of health record
  • References

Inspec keywords: security of data; data integration; data privacy; electronic health records

Other keywords: access control; data security; authentication; electronic health records; authorization; data integration; EHR system; pseudonymity; data privacy

Subjects: Medical administration; Economic, social and political aspects of computing; Data security

Preview this chapter:
Zoom in
Zoomout

Introduction, Page 1 of 2

| /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch1-1.gif /docserver/preview/fulltext/books/he/pbhe020e/PBHE020E_ch1-2.gif

Related content

content/books/10.1049/pbhe020e_ch1
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address