Ways of Unauthorized Access to Medical Data and Approach to Organize Secure Access using Blockchain Technology

被引:0
|
作者
Maksymiv, Taras [1 ]
Chaplinskyi, Roman [1 ]
机构
[1] Ternopil Ivan Puluj Natl Tech Univ, Dept Software Engn, Ternopol, Ukraine
关键词
differentiation of access; unauthorized user; health care system; encryption; blockchain; token;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The introduction of digital technologies into medical institutions promises great prospects, allowing of improving the quality of treatment and radically changing the approach to early diagnosis of dangerous diseases. However, this progress has a dangerous side effect - the risk of information security. The system of differentiation of access in many systems of medical establishments is not reliable due to the lack of active ways of cryptographic protection of information. In addition, most systems do not provide mandatory access control, and accordingly do not allow you to differentiate computer resources by secrecy and category. In some cases, it is not possible to set passwords to access some of the most important computer resources. Cryptographic protection is the basis for protecting information from theft. The disadvantage of modern diagnostic center systems is the high speed of cryptographic transformations, which forces users to abandon the encryption function.
引用
收藏
页码:791 / 795
页数:5
相关论文
共 50 条
  • [21] A Hierarchical Multi Blockchain for Fine Grained Access to Medical Data
    Malamas, Vangelis
    Kotzanikolaou, Panayiotis
    Dasaklis, Thomas K.
    Burmester, Mike
    IEEE ACCESS, 2020, 8 : 134393 - 134412
  • [22] Employing Blockchain Technology for Decentralized Crowdsourced Data Access and Management
    Sukhija, Nitin
    Bautista, Elizabeth
    Moore, Moon
    Sample, John-George
    2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 268 - 273
  • [23] A novel approach for blocking unauthorized access on the internet
    Chen, Chun-Xiang
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2007, 10 (01): : 95 - 100
  • [24] My data, my control: A secure data sharing and access scheme over blockchain
    Chiu, Wei-Yang
    Meng, Weizhi
    Jensen, Christian D.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [25] Secure Data Sharing: Blockchain-Enabled Data Access Control Framework for IoT
    Wei, Xin
    Yan, Yong
    Guo, Shaoyong
    Qiu, Xuesong
    Qi, Feng
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8143 - 8153
  • [26] USING GOOGLE SEARCH ENGINE TO GET UNAUTHORIZED ACCESS TO PRIVATE DATA
    Laskowski, Maciej
    ACTUAL PROBLEMS OF ECONOMICS, 2012, (132): : 381 - 386
  • [27] A Mechanism to Resolve the Unauthorized Access Vulnerability Caused by Permission Delegation in Blockchain-Based Access Control
    Shi, Jinshan
    Li, Ru
    Hou, Wenhan
    IEEE ACCESS, 2020, 8 : 156027 - 156042
  • [28] MetaData for efficient, secure and extensible access to data in a medical grid
    Pierson, JM
    Seitz, L
    Duque, H
    Montagnat, J
    15TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, : 562 - 566
  • [29] Secure Digital Certificate-Based Data Access Control Scheme in Blockchain
    Liu, Bin
    Xiao, Lijun
    Long, Jing
    Tang, Mingdong
    Hosam, Osama
    IEEE ACCESS, 2020, 8 (08): : 91751 - 91760
  • [30] Research on secure storage data access control of smart TV based on blockchain
    Qiu J.
    International Journal of Product Development, 2023, 27 (04) : 384 - 396