Paper Title

A Decisive Way To Secure Data Leakage from Intruders

Authors

Amrapali Subhash Paul , Rutuja Suresh Medankar , Kajal Bhima Bambale , Harshali Hanumant Gosavi , Prof.Mrs. S. R. Bhujbal

Keywords

Electronic Medical Records(EMR), Electronic Health Records(EHR),Personal Health Records(PHR),Denial of Service attacks(DoS),Electronic Health Data(EHD),Distributed Denial of Service(DDoS),Protected Health Information(PHI),Health Insurance Probability and Accountability Act(HIPAA),Data Privacy Preservation(DPP),Health Information System(HIS).

Abstract

Statistics from security firms, research institutions, healthcare, and government organizations show that the number of data-leak instances has grown rapidly in recent years. Among various data leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and providing alerts for organizations. A common approach is to screen content in storage and transmission for exposed sensitive information. Such an approach usually requires the detection operation to be conducted in secrecy. A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy-preserving approaches to ensure the privacy and security of electronic health records (EHRs). This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR. We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data; 3) HER architecture, and; 4) diverse EHR cryptographic and non-cryptographic approaches. We also discuss some crucial issues and ample opportunities for advanced research related to the security and privacy of EHRs. Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist. Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients’ information.

How To Cite

"A Decisive Way To Secure Data Leakage from Intruders ", IJSDR - International Journal of Scientific Development and Research (www.IJSDR.org), ISSN:2455-2631, Vol.7, Issue 5, page no.255 - 259, May-2022, Available :https://ijsdr.org/papers/IJSDR2205049.pdf

Issue

Volume 7 Issue 5, May-2022

Pages : 255 - 259

Other Publication Details

Paper Reg. ID: IJSDR_200335

Published Paper Id: IJSDR2205049

Downloads: 000347242

Research Area: Engineering

Country: Pune, Maharashtra, India

Published Paper PDF: https://ijsdr.org/papers/IJSDR2205049

Published Paper URL: https://ijsdr.org/viewpaperforall?paper=IJSDR2205049

About Publisher

ISSN: 2455-2631 | IMPACT FACTOR: 9.15 Calculated By Google Scholar | ESTD YEAR: 2016

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 9.15 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Publisher: IJSDR(IJ Publication) Janvi Wave

Article Preview

academia
publon
sematicscholar
googlescholar
scholar9
maceadmic
Microsoft_Academic_Search_Logo
elsevier
researchgate
ssrn
mendeley
Zenodo
orcid
sitecreex