Security Privacy and Policy for Cryptographic Based Electronic Medical Information System

Hsuan-Yu Chen,Zhen-Yu Wu,Tzer-Long Chen,Yao-Min Huang,Chia-Hui Liu
DOI: https://doi.org/10.3390/s21030713
IF: 3.9
2021-01-21
Sensors
Abstract:With the development of the internet, applications have become complicated, and the relevant technology has diversified. Compared with medical applications, the significance of information technology has been expanding to include clinical auxiliary functions of medical information. This includes electronic medical records, electronic prescriptions, medical information systems, etc. Although research on the data processing structure and format of various related systems is becoming mature, the integration is insufficient. An integrated medical information system with security policy and privacy protection, which combines e-patient records, e-prescriptions, modified smart cards, and fingerprint identification systems, and applies proxy signature and group signature, is proposed in this study. This system effectively applies and saves medical resources—satisfying the mobility of medical records, presenting the function, and security of medicine collection, and avoiding medical conflicts and profiteering to further acquire the maximum effectiveness with the least resources. In this way, this medical information system may be developed into a comprehensive function that eliminates the transmission of manual documents and maintains the safety of patient medical information. It can improve the quality of medical care and indispensable infrastructure for medical management.
engineering, electrical & electronic,chemistry, analytical,instruments & instrumentation
What problem does this paper attempt to address?
The main problems that this paper attempts to solve are security, privacy and policy issues in medical information systems. Specifically, the paper focuses on how to achieve secure data transmission in electronic medical information systems, protect patients' privacy and ensure the security of the system. To achieve these goals, the paper proposes an Integrated Medical Information System (IMIS), which combines electronic medical records, electronic prescriptions, modified smart cards and fingerprint identification systems, and applies proxy signature and group signature technologies. ### Summary of Main Problems: 1. **Data Security and Privacy Protection**: With the wide application of information technology in the medical field, how to ensure the secure transmission and storage of patient data while protecting patients' privacy has become an important issue. In particular, the popularization of electronic medical records and electronic prescriptions makes data security and privacy protection more crucial. 2. **System Integration and Interoperability**: Current medical information systems are relatively mature in terms of data structure and format, but there are still deficiencies in integration and interoperability among different medical institutions. The paper proposes a comprehensive medical information system to solve this problem. 3. **Legal and Policy Compliance**: Medical information systems need to comply with relevant laws and regulations to ensure the legal use and management of data. The paper discusses how to meet these legal and policy requirements through technical means. ### Overview of Solutions: - **Encryption and Digital Signatures**: The paper uses encryption technology and digital signatures to ensure the secure transmission of data. In particular, proxy signature and group signature technologies are applied to protect the privacy of doctors and patients. - **Smart Cards and Fingerprint Identification**: By using smart cards and fingerprint identification systems, the security of the system and the convenience of users are enhanced. - **Integrated Medical Information System**: The paper proposes a comprehensive medical information system that integrates electronic medical records, electronic prescriptions, smart cards and fingerprint identification systems, aiming to simplify medical processes and improve medical efficiency. ### Formula Examples: - **Registration Phase**: - The patient applies to the National Health Insurance Bureau for an anonymous National Health Insurance IC card, and the application request \( R_P \) is as follows: \[ P \rightarrow NHI : R_P = \{ \text{Req}, PK_{AP}, \text{Sig}_{SK_P}(\text{Req}, PK_{AP}), \text{Cert}_P \} \] - After verifying the request, the National Health Insurance Bureau generates the patient's public key certificate \( PCert_P \) and returns it to the patient: \[ NHI \rightarrow P : PCert_P = \{ PID_P, \text{Data}, PK_{AP}, PK_P, \text{Sig}_{SK_{NHI}}(PK_{AP}, PK_P) \} \] - **Doctor Registration**: - The doctor applies to the National Health Insurance Bureau for a doctor card and a personal group signature key, and the application request \( R_D \) is as follows: \[ DR \rightarrow NHI : R_D = \{ ID_D, \text{Sig}_{SK_D}(ID_D), \text{Cert}_D \} \] Through these technical means, the system proposed in the paper can effectively protect the security of medical data and patients' privacy, while improving the efficiency and quality of medical management.