Security of Medical Big Data Images using Decoy Technique

U. S. Bhargavi, Shivaprasad Gundibail, K. N. Manjunath, A. Renuka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Tele-radiology is a technology that helps in bringing the communication between the radiologist, patients and healthcare units situated at distant places. This involves exchange of medical centric data. The medical data may be stored as Electronic Health Records (EHR). These EHRs contain X-Rays, CT scans, MRI reports. Hundreds of scans across multiple radiology centers lead to medical big data (MBD). Healthcare Cloud can be used to handle MBD. Since lack of security to EHRs can cause havoc in medical IT, healthcare cloud must be secure. It should ensure secure sharing and storage of EHRs. This paper proposes the application of decoy technique to provide security to EHRs. The EHRs have the risk of internal attacks and external intrusion. This work addresses and handles internal attacks. It also involves study on honey-pots and intrusion detection techniques. Further it identifies the possibility of an intrusion and alerts the administrator. Also the details of intrusions are logged.

Original languageEnglish
Title of host publication2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages310-314
Number of pages5
ISBN (Electronic)9781538680100
DOIs
Publication statusPublished - 01-04-2019
Event2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019 - London, United Kingdom
Duration: 24-04-201926-04-2019

Publication series

Name2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

Conference

Conference2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
CountryUnited Kingdom
CityLondon
Period24-04-1926-04-19

Fingerprint

decoys
Radiology
intrusion
radiology
Healthcare
attack
Computerized tomography
Intrusion detection
Magnetic resonance imaging
Attack
Health
Internal
X rays
health
Communication
Intrusion Detection
communication
Sharing
causes
Electronics

All Science Journal Classification (ASJC) codes

  • Strategy and Management
  • Artificial Intelligence
  • Management of Technology and Innovation
  • Computer Science Applications
  • Information Systems and Management
  • Control and Optimization
  • Instrumentation

Cite this

Bhargavi, U. S., Gundibail, S., Manjunath, K. N., & Renuka, A. (2019). Security of Medical Big Data Images using Decoy Technique. In 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019 (pp. 310-314). [8776696] (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICACTM.2019.8776696
Bhargavi, U. S. ; Gundibail, Shivaprasad ; Manjunath, K. N. ; Renuka, A. / Security of Medical Big Data Images using Decoy Technique. 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. Institute of Electrical and Electronics Engineers Inc., 2019. pp. 310-314 (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019).
@inproceedings{01ca1add26714730ae3ebe7dcbaba8e4,
title = "Security of Medical Big Data Images using Decoy Technique",
abstract = "Tele-radiology is a technology that helps in bringing the communication between the radiologist, patients and healthcare units situated at distant places. This involves exchange of medical centric data. The medical data may be stored as Electronic Health Records (EHR). These EHRs contain X-Rays, CT scans, MRI reports. Hundreds of scans across multiple radiology centers lead to medical big data (MBD). Healthcare Cloud can be used to handle MBD. Since lack of security to EHRs can cause havoc in medical IT, healthcare cloud must be secure. It should ensure secure sharing and storage of EHRs. This paper proposes the application of decoy technique to provide security to EHRs. The EHRs have the risk of internal attacks and external intrusion. This work addresses and handles internal attacks. It also involves study on honey-pots and intrusion detection techniques. Further it identifies the possibility of an intrusion and alerts the administrator. Also the details of intrusions are logged.",
author = "Bhargavi, {U. S.} and Shivaprasad Gundibail and Manjunath, {K. N.} and A. Renuka",
year = "2019",
month = "4",
day = "1",
doi = "10.1109/ICACTM.2019.8776696",
language = "English",
series = "2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "310--314",
booktitle = "2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019",
address = "United States",

}

Bhargavi, US, Gundibail, S, Manjunath, KN & Renuka, A 2019, Security of Medical Big Data Images using Decoy Technique. in 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019., 8776696, 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019, Institute of Electrical and Electronics Engineers Inc., pp. 310-314, 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019, London, United Kingdom, 24-04-19. https://doi.org/10.1109/ICACTM.2019.8776696

Security of Medical Big Data Images using Decoy Technique. / Bhargavi, U. S.; Gundibail, Shivaprasad; Manjunath, K. N.; Renuka, A.

2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. Institute of Electrical and Electronics Engineers Inc., 2019. p. 310-314 8776696 (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Security of Medical Big Data Images using Decoy Technique

AU - Bhargavi, U. S.

AU - Gundibail, Shivaprasad

AU - Manjunath, K. N.

AU - Renuka, A.

PY - 2019/4/1

Y1 - 2019/4/1

N2 - Tele-radiology is a technology that helps in bringing the communication between the radiologist, patients and healthcare units situated at distant places. This involves exchange of medical centric data. The medical data may be stored as Electronic Health Records (EHR). These EHRs contain X-Rays, CT scans, MRI reports. Hundreds of scans across multiple radiology centers lead to medical big data (MBD). Healthcare Cloud can be used to handle MBD. Since lack of security to EHRs can cause havoc in medical IT, healthcare cloud must be secure. It should ensure secure sharing and storage of EHRs. This paper proposes the application of decoy technique to provide security to EHRs. The EHRs have the risk of internal attacks and external intrusion. This work addresses and handles internal attacks. It also involves study on honey-pots and intrusion detection techniques. Further it identifies the possibility of an intrusion and alerts the administrator. Also the details of intrusions are logged.

AB - Tele-radiology is a technology that helps in bringing the communication between the radiologist, patients and healthcare units situated at distant places. This involves exchange of medical centric data. The medical data may be stored as Electronic Health Records (EHR). These EHRs contain X-Rays, CT scans, MRI reports. Hundreds of scans across multiple radiology centers lead to medical big data (MBD). Healthcare Cloud can be used to handle MBD. Since lack of security to EHRs can cause havoc in medical IT, healthcare cloud must be secure. It should ensure secure sharing and storage of EHRs. This paper proposes the application of decoy technique to provide security to EHRs. The EHRs have the risk of internal attacks and external intrusion. This work addresses and handles internal attacks. It also involves study on honey-pots and intrusion detection techniques. Further it identifies the possibility of an intrusion and alerts the administrator. Also the details of intrusions are logged.

UR - http://www.scopus.com/inward/record.url?scp=85070586391&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85070586391&partnerID=8YFLogxK

U2 - 10.1109/ICACTM.2019.8776696

DO - 10.1109/ICACTM.2019.8776696

M3 - Conference contribution

T3 - 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

SP - 310

EP - 314

BT - 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Bhargavi US, Gundibail S, Manjunath KN, Renuka A. Security of Medical Big Data Images using Decoy Technique. In 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019. Institute of Electrical and Electronics Engineers Inc. 2019. p. 310-314. 8776696. (2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019). https://doi.org/10.1109/ICACTM.2019.8776696