A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing

A Study on Secure Contents Strategies for Applications With DRM on Cloud Computing

Hoon Ko (Chosun University, Gwangju, South Korea), Libor Mesicek (Jan Evangelista Purkyne University, Czech Republic), Jongsun Choi (School of Computer Science and Engineering, Soongsil University, Seoul, South Korea), Junho Choi (Division of Undeclared Majors, Chosun University, Gwangju, South Korea) and Seogchan Hwang (Gensoloft Inc., Seoul, South Korea)
Copyright: © 2018 |Pages: 11
DOI: 10.4018/IJCAC.2018010107

Abstract

Many hospitals have been built for people in silver age and these hospitals want to set various remote health care systems for the old people who are living in a place far from these hospitals. The systems processes are connected with each other and with networks as well. These systems handle many sensitive medical records and therefore the security of the health care systems has to be improved to protect these systems from cyber-attacks. Any penetration of these systems could cause serious privacy problem. To protect these systems security programs have to be used. Therefore, this paper suggests security policy compliance of medical contents which should be followed to improve level of security including DRM to protect against illegal alteration by an attacker.
Article Preview

2. Secure Contents System Model

Microsoft offers a usage in an Office Open XML type to support portable medical electronics, standard of medical industry with an office 2007 (Chaudhry, Mahmood, Naqvi, & Khan, 2015; Zhu, 2012) also many relevant institutes have been working on the similar area. In this section, it de- scribes the suggest security strategy to medical records (Youssef, 2014). As shown in Figure 1 the medical record form usually contains 3 categories, (1) patient.information which consists of name, birth information and address, (2) insurance.information which includes insurance information of a patient and call number information in case their emergency status, and (3) disease.information that it involves detailed dis- ease information. Hoon Ko had defined a medical record which is going to be stored on server in Ko and Song, (2016). A medical doctor in a hospital inputs this information when they treat in a hospital server. Someone, who wants to access their records, has to login with ID and password (Chen, Lo, & Yeh, 2012), however if an attacker login after getting the ID/password, then the patients records will be disclosed (Jiang, Ma, Ma, & Li, 2013). Therefore, all hospitals have been asked that they let the records under decrypting.

Figure 1.

Health care system flow and contents structure with security

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2019): 1 Released, 3 Forthcoming
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing