CFP last date
22 April 2024
Reseach Article

Enhancing Security and Privacy of Healthcare Data using XML Schema

by Ruchika Asija
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 12
Year of Publication: 2015
Authors: Ruchika Asija
10.5120/20385-2684

Ruchika Asija . Enhancing Security and Privacy of Healthcare Data using XML Schema. International Journal of Computer Applications. 116, 12 ( April 2015), 1-6. DOI=10.5120/20385-2684

@article{ 10.5120/20385-2684,
author = { Ruchika Asija },
title = { Enhancing Security and Privacy of Healthcare Data using XML Schema },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 12 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-6 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number12/20385-2684/ },
doi = { 10.5120/20385-2684 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:53.577201+05:30
%A Ruchika Asija
%T Enhancing Security and Privacy of Healthcare Data using XML Schema
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 12
%P 1-6
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security and privacy in the health care sector is an issue of growing importance. Widespread use of digital data in health care industry has provided potentially immeasurable benefits by instant access to patient information practically from anywhere in the world. Connecting HIS to the network and making EHR available over the Internet put the data vulnerable to security threats and risk the privacy of patients. For the storage and exchange of health care data, Extensible Markup Language (XML) is widely used. This paper presents a survey on security and privacy of health care data and details about the paper-less hospitals, risks to the privacy and security of health data due to digitization. Further the paper presents XML and its security technologies for the security and privacy of health care data. But these are having many challenges. Dealing with those challenges, the paper presents how XML Schema exploiting the capabilities of XML can be used to enhance the security and privacy of health care data.

References
  1. Amrita medical solutions. amritamedical. com/healthcare. html/.
  2. Blue coat systems 2013 mobile malware report. Technical report. www. bluecoat. com/sites/default/files/documents/files/.
  3. Breach report 2011, protected health information. Technical report. www. redspin. com/docs/.
  4. HIMSS. www. himssanalytics. eu/emram/.
  5. OHSU notifies patients of cloud health information storage. www. ohsu. edu/xd/about/new-events/news/2013/.
  6. SAML single sign-on (SSO) service for google applications. http://developers. google. com/google-applications/SSO/.
  7. XML encryption. en. wikipedia. org/wiki/XML-Encryption.
  8. XML key management specification (XKMS). 2001. http://www. w3. org/TR/2001/NOTE-xkms-20010330/.
  9. Cost of data breach study: Global analysis. Technical report, 2013. https://www4. symantec. com/mktginfo/whitepaper/.
  10. PWCs Health Research Institute identifies the top ten health industry issues to watch in 2013. 2013.
  11. Study on the impact of digital technology in health and social care, 2013. https://www. gov. uk/government/publications/.
  12. Jason Dearen. The rising risk of electronic medical records. 2012. www. smartplanet. com/blog/pure-genius/therising- ofelectronic- medical-records/8293/.
  13. Jeff Goldman. Montfort Hospital suffers security breach.
  14. Bichilien Hoang and Ashley Caudill. pages 20062012. Published byIEEE Emerging Technology.
  15. Chris Hourihan and Bryan Cline (HITRUST). A look back: U. S healthcare data breach trends. 2012. Published by HITRUST.
  16. Theo Lippeveld, Rainer Sauerborn, and Claude Bodart. Design and implementation of health information systems, WHO. 2000.
  17. P. Rubens. Four steps to securing mobile devices and applications in the workplace. 2012.
  18. Ed Simon, Paul Madsen, and Carlisle Adams. An introduction to XML digital signature. 2001. www. xml. com/pub/a/2001/08/08/xmldsig. html/.
  19. Colin Sweeney. Moving towards a paperless NHS, Kings College Hospital. 2013. Published by Guardian Professional.
  20. Piazza T. and Vizzini G. ISMETT: A paperless hospital. pages 19, 2010. Published by eChallenges.
  21. Jamie Thompson and Web Produces. Healthcare IT News. 2013. www. healthcareitnews. com.
  22. Manish Verma. XML security: control information access with XACML. 2004. www. ibm. com/developerworks/library/x-xacml/.
  23. Weymouth and Ma. Health care IT News, 2012. 6
Index Terms

Computer Science
Information Sciences

Keywords

XML XML Schema XML Security Paper-less hospitals