Abstract

Problem statement: Delivering services online is important in e-health. Services that are delivered through online communications between engaging parties, often involve sensitive information transmitted over the Internet. However, while the Internet successfully facilitates these services, significant threats also come in parallel. Network attacks, information breaches and malicious software on a computer system are common threats to the Internet. These threats can cause severe damage to computer systems and also the information. As we study current security technologies particularly that provide security to online communications, we found out that these technologies do not cater for different kinds of security needs because of the rigid way the security mechanisms are constructed. Therefore, we are interested in developing a security model that facilitates these needs, specifically in e-health. Approach: First, the area where different security requirements are needed are explored, such as the information classification found in ISO17799. This classification is based on the sensitivity levels of the information, where the more sensitive information requires higher security measures compared to the less sensitive information. Then, the information classification is applied to the e-health environment, so that our security model can handle the security processes for each classification. Results: The multilayer communication approach or MLC is the proposed security model. MLC classifies communications in e-health into five categories: Layer 1 to Layer 5 representing extremely sensitive, highly sensitive, medium sensitive, low sensitive and no sensitive data. This classification refers to the different sensitivity of the information exchanged during communications. For example, Extremely Sensitive communication involves exchanging extremely sensitive information, which requires highest security mechanisms, while Low Sensitive communication requires lower security mechanism. Conclusion: MLC provides five different types of security needs, where users can flexibly choose their own security preferences for their online communications, which the current technologies are lacking.

Highlights

  • The Internet plays a major role for delivering services in e-health, since it offers cheap and worldwide access. Sulaiman et al (2007) discusses examples of online communications in e-health, which include videoconferencing sessions, x-ray image sharing, electronic mails, web-based applications and software applications used with mobile devices (e.g. PDA and smart phones) to assist mobile users

  • It is exposed to security threats, which exploit the vulnerability of computer systems

  • 193 and longer Wired: 129-192 Lightweight devices: 112-192 112-128 be kept confidential and there is information that can be shared with public

Read more

Summary

Introduction

The Internet plays a major role for delivering services in e-health, since it offers cheap and worldwide access. Sulaiman et al (2007) discusses examples of online communications in e-health, which include videoconferencing sessions, x-ray image sharing, electronic mails, web-based applications and software applications used with mobile devices (e.g. PDA and smart phones) to assist mobile users. Sulaiman et al (2007) discusses examples of online communications in e-health, which include videoconferencing sessions, x-ray image sharing, electronic mails, web-based applications and software applications used with mobile devices (e.g. PDA and smart phones) to assist mobile users. Using the Internet in e-health promises to improve communication between users, because patients in rural areas can access services such as consultation sessions, diagnostic aid and remote patient monitoring There are many Internet-based technologies developed to facilitate the communication processes and enhance healthcare service delivery, the Internet has its own drawbacks. The threats include network attacks, Corresponding Author: Rossilawati Sulaiman, School of Computer Science, Faculty of Information Science and Technology, National University of Malaysia, 43600, Bangi, Selangor, Malaysia 1691

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.