Designing a secure e-health network system

Gabriel De Luca, Morgan Brattstrom, Patricia Morreale

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Healthcare data breaches are a growing issue, with healthcare security incidents increasing more than 900% in the last 2 years. A large U.S. health insurance provider had a major data breach, which resulted in the theft of more than 80 million patient and employee records. The U.S. Health Insurance Portability and Accountability Act (HIPAA) currently does not require Electronic Personal Health Information (ePHI) to be encrypted, increasing the vulnerability of e-health information. This paper proposes a secure e-health network system architecture which will significantly reduce the risk of data breaches and data theft, with minimal additional cost or network delay. This architecture is reliant on the application client and ensures authorized access to health records through the use of a secure client and a 2-step authentication process. The proposed network design will reduce instances of compromised networks, phishing attacks, or unwanted remote access, while improving authenticity of credentials.

Original languageEnglish
Title of host publication10th Annual International Systems Conference, SysCon 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781467395182
DOIs
StatePublished - 13 Jun 2016
Event10th Annual International Systems Conference, SysCon 2016 - Orlando, United States
Duration: 18 Apr 201621 Apr 2016

Publication series

Name10th Annual International Systems Conference, SysCon 2016 - Proceedings

Conference

Conference10th Annual International Systems Conference, SysCon 2016
Country/TerritoryUnited States
CityOrlando
Period18/04/1621/04/16

Keywords

  • electronic health records
  • Encryption
  • secure client
  • time-based one-time passwords (TOTP)
  • two-step authentication

Fingerprint

Dive into the research topics of 'Designing a secure e-health network system'. Together they form a unique fingerprint.

Cite this