Reference Hub3
Preserving the Privacy of Patient Records in Health Monitoring Systems

Preserving the Privacy of Patient Records in Health Monitoring Systems

Mahmoud Elkhodr, Seyed Shahrestani, Hon Cheung
ISBN13: 9781466640306|ISBN10: 1466640308|EISBN13: 9781466640313
DOI: 10.4018/978-1-4666-4030-6.ch019
Cite Chapter Cite Chapter

MLA

Elkhodr, Mahmoud, et al. "Preserving the Privacy of Patient Records in Health Monitoring Systems." Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., IGI Global, 2013, pp. 499-529. https://doi.org/10.4018/978-1-4666-4030-6.ch019

APA

Elkhodr, M., Shahrestani, S., & Cheung, H. (2013). Preserving the Privacy of Patient Records in Health Monitoring Systems. In A. Elçi, J. Pieprzyk, A. Chefranov, M. Orgun, H. Wang, & R. Shankaran (Eds.), Theory and Practice of Cryptography Solutions for Secure Information Systems (pp. 499-529). IGI Global. https://doi.org/10.4018/978-1-4666-4030-6.ch019

Chicago

Elkhodr, Mahmoud, Seyed Shahrestani, and Hon Cheung. "Preserving the Privacy of Patient Records in Health Monitoring Systems." In Theory and Practice of Cryptography Solutions for Secure Information Systems, edited by Atilla Elçi, et al., 499-529. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-4030-6.ch019

Export Reference

Mendeley
Favorite

Abstract

The goal of this chapter is to discuss the challenges of generic security protocols and platforms for securing Electronic Health Records (EHR) in general and for their adoption in shared care environments in particular. The chapter introduces various methods and security solutions based on existing protocols, discusses their potentials, and describes some experiences with their implementations. Amongst the main challenges that e-health technology faces, security is considered as one of the major obstacles to its deployment. The chapter proposes an authentication approach, referred to as Ubiquitous Health Trust Protocol (UHTP), which aims at minimizing the security risk associated with the remote access of EHRs using portable devices. In particular, the proposed approach has been used to create ways for secure collaboration providing a set of generic services such as read/write, authentication, and trust management, as well as advanced functionality for mobile access. The experience in adopting the approach using Java on the Android platform is described.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.