TY - GEN
T1 - Security of Medical Big Data Images using Decoy Technique
AU - Bhargavi, U. S.
AU - G, Shivaprasad
AU - Manjunath, K. N.
AU - Renuka, A.
PY - 2019/4/1
Y1 - 2019/4/1
N2 - Tele-radiology is a technology that helps in bringing the communication between the radiologist, patients and healthcare units situated at distant places. This involves exchange of medical centric data. The medical data may be stored as Electronic Health Records (EHR). These EHRs contain X-Rays, CT scans, MRI reports. Hundreds of scans across multiple radiology centers lead to medical big data (MBD). Healthcare Cloud can be used to handle MBD. Since lack of security to EHRs can cause havoc in medical IT, healthcare cloud must be secure. It should ensure secure sharing and storage of EHRs. This paper proposes the application of decoy technique to provide security to EHRs. The EHRs have the risk of internal attacks and external intrusion. This work addresses and handles internal attacks. It also involves study on honey-pots and intrusion detection techniques. Further it identifies the possibility of an intrusion and alerts the administrator. Also the details of intrusions are logged.
AB - Tele-radiology is a technology that helps in bringing the communication between the radiologist, patients and healthcare units situated at distant places. This involves exchange of medical centric data. The medical data may be stored as Electronic Health Records (EHR). These EHRs contain X-Rays, CT scans, MRI reports. Hundreds of scans across multiple radiology centers lead to medical big data (MBD). Healthcare Cloud can be used to handle MBD. Since lack of security to EHRs can cause havoc in medical IT, healthcare cloud must be secure. It should ensure secure sharing and storage of EHRs. This paper proposes the application of decoy technique to provide security to EHRs. The EHRs have the risk of internal attacks and external intrusion. This work addresses and handles internal attacks. It also involves study on honey-pots and intrusion detection techniques. Further it identifies the possibility of an intrusion and alerts the administrator. Also the details of intrusions are logged.
UR - http://www.scopus.com/inward/record.url?scp=85070586391&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85070586391&partnerID=8YFLogxK
U2 - 10.1109/ICACTM.2019.8776696
DO - 10.1109/ICACTM.2019.8776696
M3 - Conference contribution
T3 - 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
SP - 310
EP - 314
BT - 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2019 International Conference on Automation, Computational and Technology Management, ICACTM 2019
Y2 - 24 April 2019 through 26 April 2019
ER -