A New Security Model using Multilayer Approach for E-Health Services

نویسندگان

  • Rossilawati Sulaiman
  • Dharmendra Sharma
چکیده

Problem statement: Delivering services online is important in e-health. Services that are delivered through online communications between engaging parties, often involve sensitive information transmitted over the Internet. However, while the Internet successfully facilitates these services, significant threats also come in parallel. Network attacks, information breaches and malicious software on a computer system are common threats to the Internet. These threats can cause severe damage to computer systems and also the information. As we study current security technologies particularly that provide security to online communications, we found out that these technologies do not cater for different kinds of security needs because of the rigid way the security mechanisms are constructed. Therefore, we are interested in developing a security model that facilitates these needs, specifically in e-health. Approach: First, the area where different security requirements are needed are explored, such as the information classification found in ISO17799. This classification is based on the sensitivity levels of the information, where the more sensitive information requires higher security measures compared to the less sensitive information. Then, the information classification is applied to the e-health environment, so that our security model can handle the security processes for each classification. Results: The multilayer communication approach or MLC is the proposed security model. MLC classifies communications in e-health into five categories: Layer 1 to Layer 5 representing extremely sensitive, highly sensitive, medium sensitive, low sensitive and no sensitive data. This classification refers to the different sensitivity of the information exchanged during communications. For example, Extremely Sensitive communication involves exchanging extremely sensitive information, which requires highest security mechanisms, while Low Sensitive communication requires lower security mechanism. Conclusion: MLC provides five different types of security needs, where users can flexibly choose their own security preferences for their online communications, which the current technologies are lacking.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

A Distributed Authentication Model for an E-Health Network Using Blockchain

Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...

متن کامل

New Economic Instruments of State Regulation of Private Savings, Social Security and Pension Support

In the conditions of market infrastructure for the transformation of medical services, there is an objective need to build effective insurance protection of the population against risks associated with loss of health. Using a systematic approach, the problem of combining compulsory and voluntary health insurance is investigated, a theoretical conceptualization of the concept of “financial mecha...

متن کامل

Presenting a Model for Ranking Insurance Organizations Based on Electronic Readiness Using a Combination of ANP and DEMATEL Techniques

Activities of insurance, like other work fields, have been greatly influences by new technologies; therefore, they must be at the suitable level of electronic readiness to provide more effective information services in line with the needs of new era. But the question is, are the insurance companies in Iran ready to use the e-commerce opportunities efficiently? To answer, it is necessary t...

متن کامل

Presenting a Model for Ranking Insurance Organizations Based on Electronic Readiness Using a Combination of ANP and DEMATEL Techniques

Activities of insurance, like other work fields, have been greatly influences by new technologies; therefore, they must be at the suitable level of electronic readiness to provide more effective information services in line with the needs of new era. But the question is, are the insurance companies in Iran ready to use the e-commerce opportunities efficiently? To answer, it is necessary t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011