A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing

A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing

Hoon Ko, Libor Mesicek, Jongsun Choi, Junho Choi, Seogchan Hwang
Copyright: © 2018 |Pages: 11
DOI: 10.4018/IJCAC.2018010107
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Many hospitals have been built for people in silver age and these hospitals want to set various remote health care systems for the old people who are living in a place far from these hospitals. The systems processes are connected with each other and with networks as well. These systems handle many sensitive medical records and therefore the security of the health care systems has to be improved to protect these systems from cyber-attacks. Any penetration of these systems could cause serious privacy problem. To protect these systems security programs have to be used. Therefore, this paper suggests security policy compliance of medical contents which should be followed to improve level of security including DRM to protect against illegal alteration by an attacker.
Article Preview
Top

2. Secure Contents System Model

Microsoft offers a usage in an Office Open XML type to support portable medical electronics, standard of medical industry with an office 2007 (Chaudhry, Mahmood, Naqvi, & Khan, 2015; Zhu, 2012) also many relevant institutes have been working on the similar area. In this section, it de- scribes the suggest security strategy to medical records (Youssef, 2014). As shown in Figure 1 the medical record form usually contains 3 categories, (1) patient.information which consists of name, birth information and address, (2) insurance.information which includes insurance information of a patient and call number information in case their emergency status, and (3) disease.information that it involves detailed dis- ease information. Hoon Ko had defined a medical record which is going to be stored on server in Ko and Song, (2016). A medical doctor in a hospital inputs this information when they treat in a hospital server. Someone, who wants to access their records, has to login with ID and password (Chen, Lo, & Yeh, 2012), however if an attacker login after getting the ID/password, then the patients records will be disclosed (Jiang, Ma, Ma, & Li, 2013). Therefore, all hospitals have been asked that they let the records under decrypting.

Figure 1.

Health care system flow and contents structure with security

IJCAC.2018010107.f01

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing