A Decisive Way To Secure Data Leakage from Intruders
Amrapali Subhash Paul
, Rutuja Suresh Medankar , Kajal Bhima Bambale , Harshali Hanumant Gosavi , Prof.Mrs. S. R. Bhujbal
Electronic Medical Records(EMR), Electronic Health Records(EHR),Personal Health Records(PHR),Denial of Service attacks(DoS),Electronic Health Data(EHD),Distributed Denial of Service(DDoS),Protected Health Information(PHI),Health Insurance Probability and Accountability Act(HIPAA),Data Privacy Preservation(DPP),Health Information System(HIS).
Statistics from security firms, research institutions, healthcare, and government organizations show that the number of data-leak instances has grown rapidly in recent years. Among various data leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and providing alerts for organizations. A common approach is to screen content in storage and transmission for exposed sensitive information. Such an approach usually requires the detection operation to be conducted in secrecy. A systematic and comprehensive review of security and privacy-preserving challenges in e-health solutions indicates various privacy-preserving approaches to ensure the privacy and security of electronic health records (EHRs). This paper highlights the research challenges and directions concerning cyber security to build a comprehensive security model for EHR. We surveyed, investigated, and reviewed various aspects of several articles and identified the following tasks: 1) EHR security and privacy; 2) security and privacy requirements of e-health data; 3) HER architecture, and; 4) diverse EHR cryptographic and non-cryptographic approaches. We also discuss some crucial issues and ample opportunities for advanced research related to the security and privacy of EHRs. Since big data provide a great mine of information and knowledge in e-Health applications, serious privacy and security challenges that require immediate attention exist. Studies must focus on efficient comprehensive security mechanisms for EHR and also explore techniques to maintain the integrity and confidentiality of patients’ information.
"A Decisive Way To Secure Data Leakage from Intruders ", IJSDR - International Journal of Scientific Development and Research (www.IJSDR.org), ISSN:2455-2631, Vol.7, Issue 5, page no.255 - 259, May-2022, Available :https://ijsdr.org/papers/IJSDR2205049.pdf
Volume 7
Issue 5,
May-2022
Pages : 255 - 259
Paper Reg. ID: IJSDR_200335
Published Paper Id: IJSDR2205049
Downloads: 000347242
Research Area: Engineering
Country: Pune, Maharashtra, India
ISSN: 2455-2631 | IMPACT FACTOR: 9.15 Calculated By Google Scholar | ESTD YEAR: 2016
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 9.15 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publisher: IJSDR(IJ Publication) Janvi Wave