Call for Paper - August 2022 Edition
IJCA solicits original research papers for the August 2022 Edition. Last date of manuscript submission is July 20, 2022. Read More

Enhancing Security and Privacy of Healthcare Data using XML Schema

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 116 - Number 12
Year of Publication: 2015
Ruchika Asija

Ruchika Asija. Article: Enhancing Security and Privacy of Healthcare Data using XML Schema. International Journal of Computer Applications 116(12):1-6, April 2015. Full text available. BibTeX

	author = {Ruchika Asija},
	title = {Article: Enhancing Security and Privacy of Healthcare Data using XML Schema},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {116},
	number = {12},
	pages = {1-6},
	month = {April},
	note = {Full text available}


Information security and privacy in the health care sector is an issue of growing importance. Widespread use of digital data in health care industry has provided potentially immeasurable benefits by instant access to patient information practically from anywhere in the world. Connecting HIS to the network and making EHR available over the Internet put the data vulnerable to security threats and risk the privacy of patients. For the storage and exchange of health care data, Extensible Markup Language (XML) is widely used. This paper presents a survey on security and privacy of health care data and details about the paper-less hospitals, risks to the privacy and security of health data due to digitization. Further the paper presents XML and its security technologies for the security and privacy of health care data. But these are having many challenges. Dealing with those challenges, the paper presents how XML Schema exploiting the capabilities of XML can be used to enhance the security and privacy of health care data.


  • Amrita medical solutions. amritamedical. com/healthcare. html/.
  • Blue coat systems 2013 mobile malware report. Technical report. www. bluecoat. com/sites/default/files/documents/files/.
  • Breach report 2011, protected health information. Technical report. www. redspin. com/docs/.
  • HIMSS. www. himssanalytics. eu/emram/.
  • OHSU notifies patients of cloud health information storage. www. ohsu. edu/xd/about/new-events/news/2013/.
  • SAML single sign-on (SSO) service for google applications. http://developers. google. com/google-applications/SSO/.
  • XML encryption. en. wikipedia. org/wiki/XML-Encryption.
  • XML key management specification (XKMS). 2001. http://www. w3. org/TR/2001/NOTE-xkms-20010330/.
  • Cost of data breach study: Global analysis. Technical report, 2013. https://www4. symantec. com/mktginfo/whitepaper/.
  • PWCs Health Research Institute identifies the top ten health industry issues to watch in 2013. 2013.
  • Study on the impact of digital technology in health and social care, 2013. https://www. gov. uk/government/publications/.
  • Jason Dearen. The rising risk of electronic medical records. 2012. www. smartplanet. com/blog/pure-genius/therising- ofelectronic- medical-records/8293/.
  • Jeff Goldman. Montfort Hospital suffers security breach.
  • Bichilien Hoang and Ashley Caudill. pages 20062012. Published byIEEE Emerging Technology.
  • Chris Hourihan and Bryan Cline (HITRUST). A look back: U. S healthcare data breach trends. 2012. Published by HITRUST.
  • Theo Lippeveld, Rainer Sauerborn, and Claude Bodart. Design and implementation of health information systems, WHO. 2000.
  • P. Rubens. Four steps to securing mobile devices and applications in the workplace. 2012.
  • Ed Simon, Paul Madsen, and Carlisle Adams. An introduction to XML digital signature. 2001. www. xml. com/pub/a/2001/08/08/xmldsig. html/.
  • Colin Sweeney. Moving towards a paperless NHS, Kings College Hospital. 2013. Published by Guardian Professional.
  • Piazza T. and Vizzini G. ISMETT: A paperless hospital. pages 19, 2010. Published by eChallenges.
  • Jamie Thompson and Web Produces. Healthcare IT News. 2013. www. healthcareitnews. com.
  • Manish Verma. XML security: control information access with XACML. 2004. www. ibm. com/developerworks/library/x-xacml/.
  • Weymouth and Ma. Health care IT News, 2012. 6