ipatient privacy copyright cloud management

Yu Jie Kuo, Jiann Cherng Shieh

Research output: Contribution to journalArticlepeer-review

2 Citations (Scopus)

Abstract

The advent and rapid rise of network technology and cloud computing have led to new opportunities for ushering in a new era in telehealth. Thanks to the Internet of Things (IoT) and advances in 5G communication, telehealth is expanding and shows no signs of slowing down. It provides patients including elderly and disabled patients with convenient and easy access to healthcare services across space and time. However, the continuous real-time transmission of health information over networks also exposes private data to the risk of being intercepted by third parties. The privacy of the primary individual patient must be managed under the protection of the patient's anonymous key while storing, transferring, sharing, and adding privacy rights. A question arises: How can we design a secure communication environment for remote access control to personal privacy matters? The patient's electronic medical record is protected by the patient's private key, and our scheme provides a real anonymous design for the patient with absolute autonomy over their privacy. Each update of the cloud medical records is patient-led and performed in a secure tunnel. As a result, this study reveals that the cloud-based iPatient privacy copyright management fully controlled by an individual patient is indeed safe and effective.

Original languageEnglish
Article number1863
JournalApplied Sciences (Switzerland)
Volume10
Issue number5
DOIs
Publication statusPublished - 2020 Mar 1

Keywords

  • Electronic patient record
  • Ipatient
  • Privacy copyright management
  • Telehealth

ASJC Scopus subject areas

  • General Materials Science
  • Instrumentation
  • General Engineering
  • Process Chemistry and Technology
  • Computer Science Applications
  • Fluid Flow and Transfer Processes

Fingerprint

Dive into the research topics of 'ipatient privacy copyright cloud management'. Together they form a unique fingerprint.

Cite this