Improving the Security Layer logic for a Health Care Information System
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 1
Abstract
Abstract: In a previous paper we suggested an information system to store, manage and treat millions of the gathered patient’s information. We were able to propose a reliable application, which is able to fulfill the most important criterions, mainly measurement, monitoring, guidance, Data management and their analysis. The introduction of the Internet and the related technologies are offering countless opportunities to build an efficient healthcare system, but in the same time, Software-applications are facing adoption and securities challenges.In the software development, end users often lack knowledge of vulnerabilities, attacks and threats. Application designers, developers and testers are discovering and fixing constantly bugs, defects and flaws.The aim of this paper is to highlight the importance of integrating and adding a high level of security to the previously developed application by advocating a reliable and protected information system. To this end, we examine firstthe several possible sources of vulnerability. Secondly, we will present a viewpoint explaining the fundamentals principles that a secured health care system should possess. In a third part we will discuss the proposed strategy and system architecture to defend against attacks. Today, the technology could contribute actively in resolving some of problems. Connected computers are increasingly being introduced into safety -critical healthcare systems and as consequence have being involved in the progress but also in some accidents. Concretely in this study, the objective is to obtain a safely data management system by implementing an additional level oflogical and physical data security.To summarize, this paper presents a software development concept, particularly with a web-based focus. It introduces a common application’s attacks and suggests methods to defend against them.
Authors and Affiliations
Abdelghani El malhi , Mohamed Ahd , Adil Echchelh , Abdelrhani Mokhtari , Soulaymani Bencheik
An Effective Approach to Discern Leaders in Wireless Sensor Networks
The influential significance across individual vertices in a Wireless Network raises a concern for the effective evaluation for Centrality metrics. A graph-theoretical comparison between the behaviour of betweenness, clo...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hiding in Cloud Over-Lay Network
Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be lossless recovered after embedded data is &nb...
Pseudonym Based Security Architecture for Wireless Mesh Network
Abstract : Wireless Mesh Network (WMN) is a wireless network with mesh topology and is expected to be widespread due to the advantages such as low deployment cost, easy maintenance, robustness, scalability, reliable serv...
A Hybrid Evolutionary Optimization Model for Solving Job Shop Scheduling Problem using GA and SA
Abstract: The heuristic optimization techniques were commonly used in solving several optimization problems. The present work aims to develop a hybrid algorithm to solve the scheduling optimization problem of JSSP. There...
Performance Evaluation of Soft RoCE over 1 Gigabit Ethernet
Ethernet is most influential & widely used technology in the world. With the growing demand of low latency & high throughput technologies like InfiniBand and RoCE have evolved with unique features viz. RD...