Healthcare System

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 193236 Experts worldwide ranked by ideXlab platform

Kuohui Yeh - One of the best experts on this subject based on the ideXlab platform.

  • a secure iot based Healthcare System with body sensor networks
    IEEE Access, 2016
    Co-Authors: Kuohui Yeh
    Abstract:

    The ever-increasing advancement in communication technologies of modern smart objects brings with it a newera of application development for Internet of Things (IoT)-based networks. In particular, owing to the contactless-ness nature and efficiency of the data retrieval of mobile smart objects, such as wearable equipment or tailored bio-sensors, several innovative types of Healthcare Systems with body sensor networks (BSN) have been proposed. In this paper, we introduce a secure IoT-based Healthcare System, which operates through the BSN architecture. To simultaneously achieve System efficiency and robustness of transmission within public IoT-based communication networks, we utilize robust crypto-primitives to construct two communication mechanisms for ensuring transmission confidentiality and providing entity authentication among smart objects, the local processing unit and the backend BSN server. Moreover, we realize the implementation of the proposed Healthcare System with the Raspberry PI platform to demonstrate the practicability and feasibility of the presented mechanisms.

Hongfeng Wang - One of the best experts on this subject based on the ideXlab platform.

  • patient assignment scheduling in a cloud Healthcare System based on petri net and greedy based heuristic
    Enterprise Information Systems, 2019
    Co-Authors: Hongfeng Wang
    Abstract:

    ABSTRACTIntegrated System has been identified as one of must-do strategies in future Healthcare. This paper focuses on a cloud Healthcare System, which is a novel integrated Healthcare System by th...

  • A Petri net based model for a cloud Healthcare System
    2018 Chinese Control And Decision Conference (CCDC), 2018
    Co-Authors: Na Wang, Hongfeng Wang
    Abstract:

    More and more researchers have begun to focus on the applications of Internet techniques in the Healthcare System in order to solve unbalanced allocation of medical resources in China. This paper studies and investigates the modeling method for a cloud Healthcare System, which is a new Internet Healthcare System arising in very recent year. In this cloud Healthcare System, the high-quality medical resources can be shared among big tertiary hospital and small community hospitals through the telemedicine platform. Based on the general framework of an actual cloud hospital, a Petri net model is presented to describe the state of patients and the relationship between medical process and resources in this cloud Healthcare System and verified through analyzing its simulation process by using CPN Tools.

Kakali Chatterjee - One of the best experts on this subject based on the ideXlab platform.

  • Security and privacy issues of electronic Healthcare System: A survey
    Journal of Information and Optimization Sciences, 2019
    Co-Authors: Ashish Singh, Kakali Chatterjee
    Abstract:

    In today’s digital environment, the paper-based Healthcare System shifts towards the Electronic Healthcare System (EHS). The EHS features will allow its user to access the Healthcare data and resou...

  • ITrust: identity and trust based access control model for Healthcare System security
    Multimedia Tools and Applications, 2019
    Co-Authors: Ashish Singh, Kakali Chatterjee
    Abstract:

    The patient and Healthcare professionals use the Electronic Healthcare System (EHS) for accessing medical records from the remote locations via the Internet. The emerging Healthcare System has several advantages such as better management of the Healthcare data, streamlined collaboration, improvement of medical care, insurance purpose, medical data backup, etc. Regardless of its advantages, the sensitivity and openness nature of the Healthcare System arises different type of attacks and threats such as insider attack, service hijacking, abuse use of Healthcare data, and impersonation attack. In the EHS, without knowing the prior information of the requester, data sharing is another considerable issue. Hence, a dynamic Access Control Model (ACM) is needed to overcome the above-discussed issues. In the EHS, the addition of trust into the access control solutions can provide dynamic access to the resources. To achieve such a model, in this paper, we have added user trust into the Identity Based Access Control (IBAC) model. For the computation of user trust, we have used beta reputation approach. An access control rule set has been proposed based on the trust degree and identity of the user to provide access in a controlled manner. This hybrid ACM and rule set not only protect the data from unauthorized access but also dynamically control the access view of the Healthcare data. The experimental result of the proposed model shows that it is more accurate and reliable as compared to other trust models.

  • ITrust: identity and trust based access control model for Healthcare System security
    Multimedia Tools and Applications, 2019
    Co-Authors: Ashish Singh, Kakali Chatterjee
    Abstract:

    The patient and Healthcare professionals use the Electronic Healthcare System (EHS) for accessing medical records from the remote locations via the Internet. The emerging Healthcare System has several advantages such as better management of the Healthcare data, streamlined collaboration, improvement of medical care, insurance purpose, medical data backup, etc. Regardless of its advantages, the sensitivity and openness nature of the Healthcare System arises different type of attacks and threats such as insider attack, service hijacking, abuse use of Healthcare data, and impersonation attack. In the EHS, without knowing the prior information of the requester, data sharing is another considerable issue. Hence, a dynamic Access Control Model (ACM) is needed to overcome the above-discussed issues. In the EHS, the addition of trust into the access control solutions can provide dynamic access to the resources. To achieve such a model, in this paper, we have added user trust into the Identity Based Access Control (IBAC) model. For the computation of user trust, we have used beta reputation approach. An access control rule set has been proposed based on the trust degree and identity of the user to provide access in a controlled manner. This hybrid ACM and rule set not only protect the data from unauthorized access but also dynamically control the access view of the Healthcare data. The experimental result of the proposed model shows that it is more accurate and reliable as compared to other trust models.

Periyasamy Rajendiran - One of the best experts on this subject based on the ideXlab platform.

  • Tiger hash based AdaBoost machine learning classifier for secured multicasting in mobile Healthcare System
    Cluster Computing, 2018
    Co-Authors: Ramu Venkatesan, Balakrishnan Srinivasan, Periyasamy Rajendiran
    Abstract:

    Secure multicast routing is an important in mobile Healthcare System. Few research works have been developed to prevent malicious behaviors from disclosing integrity of data in mobile Healthcare Systems using machine learning technique. But, the performance of conventional machine learning technique was not effectual. In order to overcome this limitation, Tiger hashing based AdaBoost with SVM classifier (TH-ASVMC) technique is proposed. The TH-ASVMC technique is designed to improve the security of multicast routing in MANETs with higher data integrity rate and therefore reducing the time taken. The TH-ASVMC technique initially used Tiger hash function which converts the patient data to be transmitted over a wireless network into a hash value for maintaining the data integrity during the process of multicasting in mobile Healthcare System. After that, TH-ASVMC technique used AdaBoost with SVM classifier to classify the nodes in mobile Healthcare System as authentic or unauthentic based on measurement of trust value for securing multicast routing with minimum communication overhead. Thus, TH-ASVMC technique choose the only an authentic node for routing the hash value of patient data to multiple destination nodes in mobile Healthcare System. This process results in enhanced reliability and scalability of secured multicast routing. The TH-ASVMC technique conducts the simulations works on metrics such as data integrity rate, scalability, reliability and communication overhead. The simulation results shows that the TH-ASVMC technique is able to improve the reliability and data integrity rate of multicast routing as compared to state-of-the-art works.

Nicholas Mays - One of the best experts on this subject based on the ideXlab platform.

  • What is public trust in the Healthcare System? A new conceptual framework developed from qualitative data in England
    Social Theory & Health, 2020
    Co-Authors: Felix Gille, Sarah Smith, Nicholas Mays
    Abstract:

    The conceptual ambiguity of public trust in the Healthcare System poses problems for governance and public trust measurement. Therefore, we aimed to answer: what is public trust in the Healthcare System? We conducted in the context of the English NHS an analysis of online news with readership comments concerning the care.data initiative; a secondary analysis of interviews about participants’ experiences and perceptions of biobanks; and an analysis of public focus groups about perceptions of the 100,000 Genomes Project. Further, we engaged with existing conceptual work and trust theory. This resulted in a full conceptual framework of public trust in the Healthcare System. Public trust is established in anticipation of net benefits. Public trust legitimises the actions of the Healthcare System as well as encourages the public to participate in Healthcare-related activities. Further, levels of public trust are affected by spill-over effects from high or low levels of public trust in other parts of the government System. Last, many actors inside and outside the Healthcare System influence public trust. Future research needs to translate this conceptual framework into policy guidelines and a measurement scale, as well as to validate the conceptual framework for Healthcare Systems other than the British NHS.