Network security metrics and performance for healthcare systems management

While enhanced cybersecurity options, mainly based around cryptographic functions, are needed overall speed and performance of a healthcare network may take priority in many circumstances. As such the overall security metrics and performance of those cryptographic functions in their embedded context needs to be understood in detail. Understanding those metrics has been the main aim of this research activity. This research reports on an implementation of one network security technology, Internet Protocol Security (IPSec), to evaluate security performance. This research simulates sensitive healthcare information being transferred over a network, and then measures data delivery times with selected security parameters for various communication types running under different operating systems. Based on our performance experiments, this research has indicated a number of network security metrics that need to be considered when designing and managing network security for healthcare-specific or non-healthcare-specific systems from security, performance and manageability perspectives. This research proposes distinct recommendations based on our test results to contribute to selecting the appropriate security metrics for achieving the correct balance between network security and performance.

[1]  John Haskew,et al.  Implementation of a cloud-based electronic medical record for maternal and child health in rural Kenya , 2015, Int. J. Medical Informatics.

[2]  Jinan Fiaidhi,et al.  HCX: A Distributed OSGi Based Web Interaction System for Sharing Health Records in the Cloud , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[3]  B. B. Zaidan,et al.  New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.

[4]  Miguel López-Coronado,et al.  Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems , 2013, Journal of medical Internet research.

[5]  Vicky Liu,et al.  Open trusted health informatics structure (OTHIS) , 2008 .

[6]  Klaus Henning,et al.  A Telematic Support System for Emergency Medical Services , 2013 .

[7]  Ravi Varma Dandu,et al.  Storage media for computers in radiology , 2008, Indian Journal of Radiology and Imaging.

[8]  Emmanuel Aroms NIST Special Publication 800-113 Guide to SSL VPNs , 2012 .

[9]  Nasser N. Khamiss,et al.  Distributed Healthcare System Framework for Dynamic Medical Data Integration , 2015 .

[10]  Craig Standing,et al.  The implementation of electronic health records: A case study of bush computing the Ngaanyatjarra Lands , 2011, Int. J. Medical Informatics.

[11]  Ahmad-Reza Sadeghi,et al.  Securing the e-health cloud , 2010, IHI.

[12]  B. B. Zaidan,et al.  A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy , 2015, Journal of Medical Systems.

[13]  Quynh H. Dang,et al.  Recommendation for Applications Using Approved Hash Algorithms , 2009 .