Abstract
With the rapid popularization of the Internet and the Information Office of medical institutions, a large amount of electronic medical information has been generated. Medical information involves the privacy of the patient. At present, many lawless use various means to obtain the patient’s privacy information and take advantage of it for benefits. At present, there are many research methods of medical data access control, but the structure of medical data is complex, and the amount of data is huge. The contradiction between privacy protection and data utilization is still difficult to balance. A method of medical information access control based on weighted information entropy is proposed for the privacy protection and data utilization of electronic medical information. This method uses information entropy to measure the amount of information that a medical information visitor possesses, and sets different weights for different kinds of privacy information to assist in computing information contents. Method sets the tolerance of information and compares the amount of information the visitor has with the tolerance. The access strategy decides whether to feed back the requested medical information according to comparison result. After security analysis and comparison, this method can effectively protect the patient’s privacy information and meet the needs of the legitimate visitors.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, X.Y., Tian, L.Y., Han, X., et al.: Big data with precision and moderate health care. Commun. CCF 12(10), 10–12 (2016)
Cai, J.H., Zhang, T., Zong, W.H.: Challenges and considerations of the big data of medicine. Chin. J. Health Inf. Manag. 10(4), 292–295 (2013)
Shen, F.J.: The exploration and practice of cloud computing in the information of medical industry. Inf. Commun. 10, 152–153 (2016)
Zhang, Z., Zhou, Y., Du, S.H., et al.: Medical big data and the facing opportunities and challenges. J. Med. Inf. 35(6), 2–8 (2014)
Zou, B.J.: Bid data analysis and its application in the medical field. Comput. Educ. 7, 24–29 (2014)
Bi, D., Dong, K.N., Xue, L.N., et al.: Big data analytics in healthcare: promise and potential. Big Data Time 4, 6–20 (2017)
China Website Security Report in 2015. http://zt.360.cn/1101061855.php?dtid=1101062368&did=11015364902018/3/11
Zhao, Y.Y., Huang, X., Li, J.J.: Contribution title. In: 9th International Proceedings (2017). Prevention and control of internal auditing risk in medical institutions under big data environment. Times Financ. 2, 15–21
Chen, B.: Integration and application of information technology for industrial integration – the application of cloud computing technology in medical and health fields. China Eng. Consul. 2, 37–41 (2015)
Zhou, K., Jiang, X.H., Sun, T.F.: Study on EMR system based on cloud storage and access control policy. Inf. Secur. Commun. Priv. 4, 86–89 (2012)
Huo, C.Y., Wu, Z.Q.: Patient-oriented privacy protection access control model for HIS. Comput. Appl. Softw. 31(11), 75–77 (2014)
Khan, A., Mckillop, I.: Privacy-centric access control for distributed heterogeneous medical information systems. In: IEEE International Conference on Healthcare Informatics, vol. 7789, no. 1, pp. 297–306. IEEE (2013)
Li, M., Yu, S., Zheng, Y., et al.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2012)
Qu, S., Sun, T., Zhou, X.: Purpose management-based privacy access control model for his. Comput. Appl. Softw. 28(3), 74–76 (2011)
Zhang, Y.T., Fu, Y.C., Ming, Y., et al.: Access control scheme for medical data based on PBAC and IBE. J. Commun. 36(12), 200–211 (2015)
Hu, J.K., Chen, H.H., Hou, T.W.: A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput. Stand. Interfac. 32(5), 274–280 (2009)
Hui, Z., Li, H., Zhang, M., et al.: Risk-adaptive access control model for big data in healthcare. J. Commun. 36(12), 190–199 (2015)
Peng, C.G., Ding, H.F., Zhu, Y.J., et al.: Information entropy models and privacy metrics methods for privacy protection. J. Softw. 27(8), 1891–1903 (2016)
Acknowledgment
This research was supported by Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this paper
Cite this paper
Zheng, L., Zhang, L., Cui, M., Chen, J., Yang, S., Li, Z. (2018). Medical Information Access Control Method Based on Weighted Information Entropy. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-030-00012-7_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00011-0
Online ISBN: 978-3-030-00012-7
eBook Packages: Computer ScienceComputer Science (R0)