Towards Securing Medical Documents from Insider Attacks

Abstract

Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this issue. But such methods can’t be helpful in some of the misuse methods e.g. covert channels. As insiders may be the part of the team which developed such software, he may have deliberately inserted such channels in the source code of that software. The results may be catastrophic not only to that organization but for the patients too. This paper presents an application for securely exchange of documents in medical organizations of our country. The induction of water marking and hash protected documents enhances its security and make it fit to deploy in medical related organizations. The deployment is done in such a way that only higher management has access to the source code for reviewing. Results demonstrate its effectiveness in preventing and detecting majority of the information misuse channels.

Authors and Affiliations

Maaz Ahmad, Muhammad Fahad, Abdul Khan

Keywords

Related Articles

EDAC: A Novel Energy-Aware Clustering Algorithm for Wireless Sensor Networks

Clustering is a useful technique for reducing energy consumption in wireless sensor networks (WSN). To achieve a better network lifetime performance, different clustering algorithms use various parameters for cluster hea...

Main Stream Temperature Control System Based on Smith-PID Scheduling Network Control

This paper is concerned with the controller design problem for a class of networked main stream temperature control system with long random time delay and packet losses. To compensate the effect of time delay and packet...

FFD Variants for Virtual Machine Placement in Cloud Computing Data Centers

Virtualization technology is used to efficiently utilize the resources of a Cloud datacenter by running multiple virtual machines (VMs) on a single physical machine (PM) as if each VM is a standalone PM. Efficient placem...

Brainstorming 2.0: Toward collaborative tool based on social networks

Social networks are part of Web 2.0 collaborative tools that have a major impact in enriching the sharing and communication enabling a maximum of collaboration and innovation globally between web users. It is in this con...

Wakes-Ship Removal on High-Resolution Optical Images based on Histograms in HSV Color Space

Ship detection on optical remote sensing images is getting great attention; however, some images called wakes-ship have not been taken into account yet. Current works in ship detection are focusing on in-shore detection...

Download PDF file
  • EP ID EP112617
  • DOI 10.14569/IJACSA.2016.070848
  • Views 113
  • Downloads 0

How To Cite

Maaz Ahmad, Muhammad Fahad, Abdul Khan (2016). Towards Securing Medical Documents from Insider Attacks. International Journal of Advanced Computer Science & Applications, 7(8), 357-360. https://europub.co.uk/articles/-A-112617