
Security approach to controlling access to personal health records in healthcare service
Author(s) -
Chen TzerLong,
Liao YuTing,
Chang YiFan,
Hwang JenHung
Publication year - 2015
Publication title -
security and communication networks
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.446
H-Index - 43
eISSN - 1939-0122
pISSN - 1939-0114
DOI - 10.1002/sec.1387
Subject(s) - computer science , computer security , encryption , cryptosystem , medical record , internet privacy , construct (python library) , personally identifiable information , access control , health care , computer network , medicine , law , political science , radiology
The changing information technology and the constant progress of medical technologies have gradually changed traditional paper‐based medical records into low‐cost electronic health records. The broad application of electronic health records allows a medical information exchange model being developed, called personal health records (PHR), which are the personal health medical information managed and maintained by the user. In consideration of PHR being a patient's health medical information, the privacy setting and the access authority have to be strictly controlled. In addition to providing users with reasonable access authorities, the PHR system has to avoid the illegal access of unauthorized single users or groups. The idea of public‐key cryptosystems and Lagrange interpolating polynomial is applied to construct a high‐security and efficient encryption scheme so that PHR users could execute the access system in a secure environment. Copyright © 2015 John Wiley & Sons, Ltd.