[go: up one dir, main page]

Skip to main content

Medical Information Access Control Method Based on Weighted Information Entropy

  • Conference paper
  • First Online:
Cloud Computing and Security (ICCCS 2018)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11065))

Included in the following conference series:

  • 2313 Accesses

Abstract

With the rapid popularization of the Internet and the Information Office of medical institutions, a large amount of electronic medical information has been generated. Medical information involves the privacy of the patient. At present, many lawless use various means to obtain the patient’s privacy information and take advantage of it for benefits. At present, there are many research methods of medical data access control, but the structure of medical data is complex, and the amount of data is huge. The contradiction between privacy protection and data utilization is still difficult to balance. A method of medical information access control based on weighted information entropy is proposed for the privacy protection and data utilization of electronic medical information. This method uses information entropy to measure the amount of information that a medical information visitor possesses, and sets different weights for different kinds of privacy information to assist in computing information contents. Method sets the tolerance of information and compares the amount of information the visitor has with the tolerance. The access strategy decides whether to feed back the requested medical information according to comparison result. After security analysis and comparison, this method can effectively protect the patient’s privacy information and meet the needs of the legitimate visitors.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang, X.Y., Tian, L.Y., Han, X., et al.: Big data with precision and moderate health care. Commun. CCF 12(10), 10–12 (2016)

    Google Scholar 

  2. Cai, J.H., Zhang, T., Zong, W.H.: Challenges and considerations of the big data of medicine. Chin. J. Health Inf. Manag. 10(4), 292–295 (2013)

    Google Scholar 

  3. Shen, F.J.: The exploration and practice of cloud computing in the information of medical industry. Inf. Commun. 10, 152–153 (2016)

    Google Scholar 

  4. Zhang, Z., Zhou, Y., Du, S.H., et al.: Medical big data and the facing opportunities and challenges. J. Med. Inf. 35(6), 2–8 (2014)

    Google Scholar 

  5. Zou, B.J.: Bid data analysis and its application in the medical field. Comput. Educ. 7, 24–29 (2014)

    Google Scholar 

  6. Bi, D., Dong, K.N., Xue, L.N., et al.: Big data analytics in healthcare: promise and potential. Big Data Time 4, 6–20 (2017)

    Article  Google Scholar 

  7. China Website Security Report in 2015. http://zt.360.cn/1101061855.php?dtid=1101062368&did=11015364902018/3/11

  8. Zhao, Y.Y., Huang, X., Li, J.J.: Contribution title. In: 9th International Proceedings (2017). Prevention and control of internal auditing risk in medical institutions under big data environment. Times Financ. 2, 15–21

    Google Scholar 

  9. Chen, B.: Integration and application of information technology for industrial integration – the application of cloud computing technology in medical and health fields. China Eng. Consul. 2, 37–41 (2015)

    Google Scholar 

  10. Zhou, K., Jiang, X.H., Sun, T.F.: Study on EMR system based on cloud storage and access control policy. Inf. Secur. Commun. Priv. 4, 86–89 (2012)

    Google Scholar 

  11. Huo, C.Y., Wu, Z.Q.: Patient-oriented privacy protection access control model for HIS. Comput. Appl. Softw. 31(11), 75–77 (2014)

    Google Scholar 

  12. Khan, A., Mckillop, I.: Privacy-centric access control for distributed heterogeneous medical information systems. In: IEEE International Conference on Healthcare Informatics, vol. 7789, no. 1, pp. 297–306. IEEE (2013)

    Google Scholar 

  13. Li, M., Yu, S., Zheng, Y., et al.: Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24(1), 131–143 (2012)

    Article  Google Scholar 

  14. Qu, S., Sun, T., Zhou, X.: Purpose management-based privacy access control model for his. Comput. Appl. Softw. 28(3), 74–76 (2011)

    Google Scholar 

  15. Zhang, Y.T., Fu, Y.C., Ming, Y., et al.: Access control scheme for medical data based on PBAC and IBE. J. Commun. 36(12), 200–211 (2015)

    Google Scholar 

  16. Hu, J.K., Chen, H.H., Hou, T.W.: A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput. Stand. Interfac. 32(5), 274–280 (2009)

    Google Scholar 

  17. Hui, Z., Li, H., Zhang, M., et al.: Risk-adaptive access control model for big data in healthcare. J. Commun. 36(12), 190–199 (2015)

    Google Scholar 

  18. Peng, C.G., Ding, H.F., Zhu, Y.J., et al.: Information entropy models and privacy metrics methods for privacy protection. J. Softw. 27(8), 1891–1903 (2016)

    MathSciNet  MATH  Google Scholar 

Download references

Acknowledgment

This research was supported by Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lijuan Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zheng, L., Zhang, L., Cui, M., Chen, J., Yang, S., Li, Z. (2018). Medical Information Access Control Method Based on Weighted Information Entropy. In: Sun, X., Pan, Z., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2018. Lecture Notes in Computer Science(), vol 11065. Springer, Cham. https://doi.org/10.1007/978-3-030-00012-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00012-7_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00011-0

  • Online ISBN: 978-3-030-00012-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics