On Secure Data Management in Health-Care Environment

Health-care management systems are of great relevance because they provide an easy and quick management of all aspects regarding a patient, not necessarily medical. Furthermore, there are more and more cases of pathologies in which diagnosis and treatment can be only carried out by using medical imaging techniques. With an ever-increasing prevalence, medical images are directly acquired in or converted into digital form, for their storage as well as subsequent retrieval and processing. Similarly, text interpreting medical image with other associated patient information, are included into or acquired directly in digital form and stored. It is easy to note that greater is the amount of clinical data available to the specialists, acquired for example on previously treated cases, and better is the quality and the rapidity of diagnosis and treatment. It is therefore important, if not essential, to share easily and quickly data and clinical experiences. However, such sharing among different entities, whether public or private, is a non-trivial task, since such information are always subjected to restrictions related to privacy laws and to health insurance regulations. To the best of our knowledge, in literature there are no systems which allows the rapid and secure sharing of clinical experiences among different entities. We propose a fully distributed system which allows secure sharing of all information (both medical and not) necessary for patients management. With our system, each node belonging to it, can access quickly, easily and in a secure way to a considerable amount of data, thereby improving the speed and quality of clinical evaluation performed by the physician.

[1]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[2]  A. Dowling Do Hospital Staff Interfere with Computer System Implementation? , 1980, Health care management review.

[3]  P. Carpenter Use and Impact of Computers in Clinical Medicine , 1987 .

[4]  J. Reggia,et al.  HELP: A Dynamic Hospital Information System , 1991, Computers and Medicine.

[5]  M. J. Goldschmidt,et al.  Craniomaxillofacial trauma in the elderly. , 1995, Journal of oral and maxillofacial surgery : official journal of the American Association of Oral and Maxillofacial Surgeons.

[6]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[7]  Viergever,et al.  An Overview of Medical Image Registration Methods , 1998 .

[8]  T. K. Ong,et al.  Craniofacial trauma presenting at an adult accident and emergency department with an emphasis on soft tissue injuries. , 1999, Injury.

[9]  Nicholas Ayache,et al.  Medical Image Analysis: Progress over Two Decades and the Challenges Ahead , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[10]  P. V. Biron,et al.  The HL7 Clinical Document Architecture. , 2001, Journal of the American Medical Informatics Association : JAMIA.

[11]  Jerry L Prince,et al.  Current methods in medical image segmentation. , 2000, Annual review of biomedical engineering.

[12]  Ramaswamy Chandramouli,et al.  The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..

[13]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[14]  Michael M. Wagner,et al.  Technical Description of RODS: A Real-time Public Health Surveillance System , 2003, Journal of the American Medical Informatics Association.

[15]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[16]  Bogdan M. Wilamowski,et al.  The Transmission Control Protocol , 2005, The Industrial Information Technology Handbook.

[17]  Amnon Shabo,et al.  Model Formulation: HL7 Clinical Document Architecture, Release 2 , 2006, J. Am. Medical Informatics Assoc..

[18]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.1 , 2006, RFC.

[19]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[20]  Eric Rescorla,et al.  Datagram Transport Layer Security , 2006, RFC.

[21]  Ingmar Baumgart,et al.  S/Kademlia: A practicable approach towards secure key-based routing , 2007, 2007 International Conference on Parallel and Distributed Systems.

[22]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[23]  Martha Giangiulio,et al.  Initiation and Evaluation of an Admission, Discharge, Transfer (ADT) Nursing Program in a Pediatric Setting , 2008, Issues in comprehensive pediatric nursing.

[24]  Rossano Schifanella,et al.  Tempering Kademlia with a Robust Identity Based System , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[25]  Eric Rescorla,et al.  Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP) , 2010, RFC.

[26]  Alfredo De Santis,et al.  Efficient provably-secure hierarchical key assignment schemes , 2007, Theor. Comput. Sci..

[27]  Alfredo De Santis,et al.  E-mail-Based Covert Channels for Asynchronous Message Steganography , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[28]  Hemanta Kumar Kalitay,et al.  Designing WANem : A Wide Area Network emulator tool , 2011, COMSNETS.

[29]  Alfredo De Santis,et al.  An asynchronous covert channel using spam , 2012, Comput. Math. Appl..

[30]  Oleg S. Pianykh,et al.  Digital Imaging and Communications in Medicine (DICOM) , 2017, Radiopaedia.org.

[31]  Balraj Naren,et al.  Medical Image Registration , 2022 .