Personal Privacy Protection of Electronic Medical Record in Health Information System

의료정보시스템에서 전자의무기록의 개인신분정보보호

Kim, Dong-Myung;Baeg, Weon-Hong
김동명;백원홍

  • Published : 2007.09.30

Abstract

Objective: The consolidation of health information has led to the creation of a national network of medical institutions. In this wireless and hard-line communication web, patients' medical information, which is extremely private and must be kept in secret, may leak out, and the risk of dangers such as privacy infringement and misuse of information has increased. Methods: For this dissertation, a patient information protection algorithm was designed for a hospital information system in order to improve the untraceability and anonymity of patients' individual information in a ubiquitous computing environment. Results: Additionally, analyzing the computing load showed that the computing load of the entire system did not increase, and since 57 percent of the sensor node's computing load was transferred to the secure server, the sensor node's load was minimized. Thus, the system can also be applied to low performance sensor networks. Conclusion: In conclusion, improving the security level of identification information transmissions while minimizing the computing and communication load of sensor nodes in a ubiquitous computing environment did not lead to an increase in the system's overall computing or communication load. Thus, a system with improved security features for identification information and communication information was developed and established. (Journal of Korean Society of Medical Informatics 13-3, 249-257, 2007)

Keywords

References

  1. Park KW, Standard interworking measures to construct medical video storing system, Doctorate thesis of Sogang University:2004
  2. Kil JK, Measures for personal information protection in medical information, Law and Strategy Study, Section 6, 2006;(1): 117-140
  3. Lee DH, Cho YB, Kim DM, Lee SH, A low-cost protocol in sensor network ubiquitous environment, International Symposium on Remote Sensing ISRS, 2005
  4. Industrial Promote Institute Company, HL7 korea, Health Level Seven (HL 7) and development Tools, 2002; 1-10:32-39
  5. Kim DM, Oh BH, Lee SH, Privacy for low-power sensor node based on alias in ubiquitous network, 4th ACIS International Conference on Software Engineering Research Management & Applications (SERA), 2006;144-149
  6. Hamid M.A, Hong CS, Location privacy and authentication for low-cost sensor node devices using varying identifiers, Korea Computer Congress 2005;32:412-414
  7. N Asokan, Anonymity in a mobile computing environment, Proceedings of the Workshop on Mobile Computing Systems and Applications, Santa Cruz: 1994
  8. Lee MiY, and Bahk YI, Recognition and exercise of privacy information action for nurses and patients, Clinical Nursing Research, 2005;1(1):7-20
  9. Oh GT, Kim GJ, Lee YB, Lee ST, Lee YS, Remote medical authentication system in mobile environment, Thesis of Spring Academic Meeting by Korea Institute of Information Security & Cryptology, 2004; 21:373-375
  10. Kook YS, Kim DG, Technological advance in remote medical system and application system. Jnl of the Korean Society of PACS, 2004;77-82
  11. Kim GJ, Kim YG, Design and implementation of wireless transfer system of medical information with zigbee, Thesis of Korean Institute of Marine Information and Communication Sciences, 2005; 9(3): 487-492