INTERNATIONAL JOURNAL OF SCIENTIFIC DEVELOPMENT AND RESEARCH International Peer Reviewed & Refereed Journals, Open Access Journal ISSN Approved Journal No: 2455-2631 | Impact factor: 8.15 | ESTD Year: 2016
open access , Peer-reviewed, and Refereed Journals, Impact factor 8.15
A Decisive Way To Secure Data Leakage from Intruders
Authors Name:
Amrapali Subhash Paul
, Rutuja Suresh Medankar , Kajal Bhima Bambale , Harshali Hanumant Gosavi , Prof.Mrs. S. R. Bhujbal
Unique Id:
IJSDR2205049
Published In:
Volume 7 Issue 5, May-2022
Abstract:
Statistics from security firms, research institutions, healthcare, and government organizations show that the number of data-leak instances has grown rapidly in recent years. Among various data leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and providing alerts for organizations. A common approach is to screen content in storage and transmission for exposed sensitive information. Such an approach usually requires the detection operation to be conducted in secrecy. A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy-preserving approaches to ensure the privacy and security of electronic health records (EHRs). This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR. We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data; 3) HER architecture, and; 4) diverse EHR cryptographic and non-cryptographic approaches. We also discuss some crucial issues and ample opportunities for advanced research related to the security and privacy of EHRs. Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist. Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients’ information.
Keywords:
Electronic Medical Records(EMR), Electronic Health Records(EHR),Personal Health Records(PHR),Denial of Service attacks(DoS),Electronic Health Data(EHD),Distributed Denial of Service(DDoS),Protected Health Information(PHI),Health Insurance Probability and Accountability Act(HIPAA),Data Privacy Preservation(DPP),Health Information System(HIS).
Cite Article:
"A Decisive Way To Secure Data Leakage from Intruders ", International Journal of Science & Engineering Development Research (www.ijsdr.org), ISSN:2455-2631, Vol.7, Issue 5, page no.255 - 259, May-2022, Available :http://www.ijsdr.org/papers/IJSDR2205049.pdf
Downloads:
000337072
Publication Details:
Published Paper ID: IJSDR2205049
Registration ID:200335
Published In: Volume 7 Issue 5, May-2022
DOI (Digital Object Identifier):
Page No: 255 - 259
Publisher: IJSDR | www.ijsdr.org
ISSN Number: 2455-2631
Facebook Twitter Instagram LinkedIn