TY - GEN
T1 - Watermarking and Encryption for Electronic Medical Records (EMR) Security Based on mCloud
AU - Abdulshaheed, Haider Rasheed
AU - Abbas, Yaseen Saadi
AU - Tawfeq, Jamal F.
AU - Ateeq, Karamath
AU - Alnawayseh, Saif E.A.
AU - Ghazal, Taher M.
N1 - Publisher Copyright:
© 2024 IEEE.
PY - 2024
Y1 - 2024
N2 - Providing quality healthcare services and promoting collaborative clinical research are easier and more efficient with electronic medical record (EMR) systems. All aspects of care are included in electronic health records. Data characterized by volume, variety, and velocity is what IBM defines as big data. Therefore, we evidently have a significant problem managing 'big EMR data' from a volume, accuracy, and velocity perspective. Data misuse and patient safety are significant risks associated with poorly implemented EMR-based systems. Storage, access, and retrieval of big data are all aspects of security to consider. Location is another important aspect of secure data use, in addition to strong access control mechanisms. Researchers are investigating secure mobile data usage based on location after recent reports of illegal trade and theft of patient data over mobile devices. To improve work flow dynamics and efficiency, healthcare facilities are increasingly using mobile devices. In spite of this, mobile devices are becoming more and more common. A new technique for preventing EMR infiltration and manipulation by hackers using the cloud is presented in this article.
AB - Providing quality healthcare services and promoting collaborative clinical research are easier and more efficient with electronic medical record (EMR) systems. All aspects of care are included in electronic health records. Data characterized by volume, variety, and velocity is what IBM defines as big data. Therefore, we evidently have a significant problem managing 'big EMR data' from a volume, accuracy, and velocity perspective. Data misuse and patient safety are significant risks associated with poorly implemented EMR-based systems. Storage, access, and retrieval of big data are all aspects of security to consider. Location is another important aspect of secure data use, in addition to strong access control mechanisms. Researchers are investigating secure mobile data usage based on location after recent reports of illegal trade and theft of patient data over mobile devices. To improve work flow dynamics and efficiency, healthcare facilities are increasingly using mobile devices. In spite of this, mobile devices are becoming more and more common. A new technique for preventing EMR infiltration and manipulation by hackers using the cloud is presented in this article.
KW - Authentication
KW - Data Encryption/Decryption
KW - Data integrity
KW - Electronic Medical Record (EMR)
KW - Medical Cloud Computing (mCloud)
KW - Watermarking
UR - http://www.scopus.com/inward/record.url?scp=85195144620&partnerID=8YFLogxK
U2 - 10.1109/ICCR61006.2024.10532934
DO - 10.1109/ICCR61006.2024.10532934
M3 - Conference contribution
AN - SCOPUS:85195144620
T3 - 2nd International Conference on Cyber Resilience, ICCR 2024
BT - 2nd International Conference on Cyber Resilience, ICCR 2024
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2nd International Conference on Cyber Resilience, ICCR 2024
Y2 - 26 February 2024 through 28 February 2024
ER -