Security of Medical Big Data Images using Decoy Technique

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Tele-radiology is a technology that helps in bringing the communication between the radiologist, patients and healthcare units situated at distant places. This involves exchange of medical centric data. The medical data may be stored as Electronic Health Records (EHR). These EHRs contain X-Rays, CT scans, MRI reports. Hundreds of scans across multiple radiology centers lead to medical big data (MBD). Healthcare Cloud can be used to handle MBD. Since lack of security to EHRs can cause havoc in medical IT, healthcare cloud must be secure. It should ensure secure sharing and storage of EHRs. This paper proposes the application of decoy technique to provide security to EHRs. The EHRs have the risk of internal attacks and external intrusion. This work addresses and handles internal attacks. It also involves study on honey-pots and intrusion detection techniques. Further it identifies the possibility of an intrusion and alerts the administrator. Also the details of intrusions are logged.

Original languageEnglish
Title of host publication2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages310-314
Number of pages5
ISBN (Electronic)9781538680100
DOIs
Publication statusPublished - 01-04-2019
Event2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019 - London, United Kingdom
Duration: 24-04-201926-04-2019

Publication series

Name2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019

Conference

Conference2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
Country/TerritoryUnited Kingdom
CityLondon
Period24-04-1926-04-19

All Science Journal Classification (ASJC) codes

  • Strategy and Management
  • Artificial Intelligence
  • Management of Technology and Innovation
  • Computer Science Applications
  • Information Systems and Management
  • Control and Optimization
  • Instrumentation

Fingerprint

Dive into the research topics of 'Security of Medical Big Data Images using Decoy Technique'. Together they form a unique fingerprint.

Cite this