Towards Securing Medical Documents from Insider Attacks

Abstract

Medical organizations have sensitive health related documents. Unauthorized access attempts for these should not only be prevented but also detected in order to ensure correct treatment of the patients and to capture the malicious intent users. Such organizations normally rely on the principle of least privileges together with the deployment of some commercial available software to cope up this issue. But such methods can’t be helpful in some of the misuse methods e.g. covert channels. As insiders may be the part of the team which developed such software, he may have deliberately inserted such channels in the source code of that software. The results may be catastrophic not only to that organization but for the patients too. This paper presents an application for securely exchange of documents in medical organizations of our country. The induction of water marking and hash protected documents enhances its security and make it fit to deploy in medical related organizations. The deployment is done in such a way that only higher management has access to the source code for reviewing. Results demonstrate its effectiveness in preventing and detecting majority of the information misuse channels.

Authors and Affiliations

Maaz Ahmad, Muhammad Fahad, Abdul Khan

Keywords

Related Articles

Impact of Different Data Types on Classifier Performance of Random Forest, Naïve Bayes, and K-Nearest Neighbors Algorithms

This study aims to evaluate impact of three different data types (Text only, Numeric Only and Text + Numeric) on classifier performance (Random Forest, k-Nearest Neighbor (kNN) and Naïve Bayes (NB) algorithms). The class...

Performance Chronicles of Multicast Routing Protocol in Wireless Sensor Network

Routing protocol in wireless sensor network (WSN) has always been a frequently adopted topic of research in WSN owing to many unsolved issues in it. This paper discusses about the multicast routing protocols in WSN and b...

Software Cost Estimation using Enhanced Artificial Bee Colony Algorithm

Cost estimation is very important in software development progress so that resource and time planning can be successfully performed. Accurate estimation of cost is directly related to the decision making mechanism in the...

A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model

Internet of Things (IoT) has not yet reached a distinctive definition. A generic understanding of IoT is that it offers numerous services in many domains, utilizing conventional internet infrastructure by enabling differ...

Estimation of Trajectory and Location for Mobile Sound Source

In this paper, we present an approach to estimate mobile sound source trajectory. An artificially created sound source signal is used in this work. The main aim of this paper is to estimate the mobile object trajectory v...

Download PDF file
  • EP ID EP112617
  • DOI 10.14569/IJACSA.2016.070848
  • Views 78
  • Downloads 0

How To Cite

Maaz Ahmad, Muhammad Fahad, Abdul Khan (2016). Towards Securing Medical Documents from Insider Attacks. International Journal of Advanced Computer Science & Applications, 7(8), 357-360. https://europub.co.uk/articles/-A-112617