Towards Securing Medical Documents from Insider Attacks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 8
Abstract
Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this issue. But such methods can’t be helpful in some of the misuse methods e.g. covert channels. As insiders may be the part of the team which developed such software, he may have deliberately inserted such channels in the source code of that software. The results may be catastrophic not only to that organization but for the patients too. This paper presents an application for securely exchange of documents in medical organizations of our country. The induction of water marking and hash protected documents enhances its security and make it fit to deploy in medical related organizations. The deployment is done in such a way that only higher management has access to the source code for reviewing. Results demonstrate its effectiveness in preventing and detecting majority of the information misuse channels.
Authors and Affiliations
Maaz Ahmad, Muhammad Fahad, Abdul Khan
The Optimization of Query Processing in Seabase Cloud Databases based on CCEVP Model
A cloud database is a database usually installed on cloud computing software platforms. There are several methods for query processing in cloud databases. This study tried to optimize query processing in the SeaBase clou...
Performance Analysis of Route Redistribution among Diverse Dynamic Routing Protocols based on OPNET Simulation
Routing protocols are the fundamental block of selecting the optimal path from a source node to a destination node in internetwork. Due to emerge the large networks in business aspect thus; they operate diverse routing p...
Timed-Arc Petri-Nets based Agent Communication for Real-Time Multi-Agent Systems
This research focuses on Timed-Arc Petri-nets-based agent communication in real-time multi-agent systems. The Agent Communication Language is a standard language for the agents to communicate. The objective is to combine...
A Survey of Cloud Migration Methods: A Comparison and Proposition
Along with the significant advantages of cloud computing paradigm, the number of enterprises, which expect to move a legacy system towards a cloud, is steadily increasing. Unfortunately, this move is not straightforward....
An Analysis on Host Vulnerability Evaluation of Modern Operating Systems
Security is a major concern in all computing environments. One way to achieve security is to deploy a secure operating system (OS). A trusted OS can actually secure all the resources and can resist the vulnerabilities an...