Skip to main content
Top
Published in: Journal of Medical Systems 3/2012

01-06-2012 | ORIGINAL PAPER

A Study on Agent-Based Secure Scheme for Electronic Medical Record System

Authors: Tzer-Long Chen, Yu-Fang Chung, Frank Y. S. Lin

Published in: Journal of Medical Systems | Issue 3/2012

Login to get access

Abstract

Patient records, including doctors’ diagnoses of diseases, trace of treatments and patients’ conditions, nursing actions, and examination results from allied health profession departments, are the most important medical records of patients in medical systems. With patient records, medical staff can instantly understand the entire medical information of a patient so that, according to the patient’s conditions, more accurate diagnoses and more appropriate in-depth treatments can be provided. Nevertheless, in such a modern society with booming information technologies, traditional paper-based patient records have faced a lot of problems, such as lack of uniform formats, low data mobility, slow data transfer, illegible handwritings, enormous and insufficient storage space, difficulty of conservation, being easily damaged, and low transferability. To improve such drawbacks, reduce medical costs, and advance medical quality, paper-based patient records are modified into electronic medical records and reformed into electronic patient records. However, since eletronic patient records used in various hospitals are diverse and different, in consideration of cost, it is rather difficult to establish a compatible and complete integrated electronic patient records system to unify patient records from heterogeneous systems in hospitals. Moreover, as the booming of the Internet, it is no longer necessary to build an integrated system. Instead, doctors can instantly look up patients’ complete information through the Internet access to electronic patient recoreds as well as avoid the above difficulties. Nonetheless, the major problem of accessing to electronic patient records cross-hospital systems exists in the security of transmitting and accessing to the records in case of unauthorized medical personnels intercepting or stealing the information. This study applies the Mobile Agent scheme to cope with the problem. Since a Mobile Agent is a program, which can move among hosts and automatically disperse arithmetic processes, and moves from one host to another in heterogeneous network systems with the characteristics of autonomy and mobility, decreasing network traffic, reducing transfer lag, encapsulating protocol, availability on heterogeneous platforms, fault-tolerance, high flexibility, and personalization. However, since a Mobile Agent contacts and exchanges information with other hosts or agents on the Internet for rapid exchange and access to medical information, the security is threatened. In order to solve the problem, this study proposes a key management scheme based on Lagrange interpolation formulas and hierarchical management structure to make Mobile Agents a more secure and efficient access control scheme for electronic patient record systems when applied to the access of patients’ personal electronic patient records cross hospitals. Meanwhile, with the comparison of security and efficacy analyses being the feasibility of validation scheme and the basis of better efficiency, the security of Mobile Agents in the process of operation can be guaranteed, key management efficacy can be advanced, and the security of the Mobile Agent system can be protected.
Literature
1.
go back to reference Safran, C., and Goldberg, H., Electronic patient records and the impact of the Internet. Int. J. Med. Inform. 60(2):77–83, 2000.CrossRef Safran, C., and Goldberg, H., Electronic patient records and the impact of the Internet. Int. J. Med. Inform. 60(2):77–83, 2000.CrossRef
2.
go back to reference Calcote, S., Developing a secure healthcare information network on the Internet. Healthc. Financ. Manage. 51(1):68, 1997. Calcote, S., Developing a secure healthcare information network on the Internet. Healthc. Financ. Manage. 51(1):68, 1997.
3.
go back to reference Uslu, A. M., and Stausberg, J., Value of the electronic patient record: An analysis of the literature. J. Biomed. Inform. 41(4):675–682, 2008.CrossRef Uslu, A. M., and Stausberg, J., Value of the electronic patient record: An analysis of the literature. J. Biomed. Inform. 41(4):675–682, 2008.CrossRef
4.
go back to reference Dujat, C., Haux, R., Schmucker, P., and Winter, A., Digital optical archiving of medical records in hospital information systems-a practical approach towards the computer-based patient record. Meth. Inf. Med. 34(5):487–497, 1995. Dujat, C., Haux, R., Schmucker, P., and Winter, A., Digital optical archiving of medical records in hospital information systems-a practical approach towards the computer-based patient record. Meth. Inf. Med. 34(5):487–497, 1995.
5.
go back to reference Rind, D. M., and Safran, C., Real and imagined barriers to an electronic medical record. Proceedings of the Annual Symposium on Computer Application in Medical Care, pp. 74-78, 1993. Rind, D. M., and Safran, C., Real and imagined barriers to an electronic medical record. Proceedings of the Annual Symposium on Computer Application in Medical Care, pp. 74-78, 1993.
6.
go back to reference van Ginneken, A. M., The computerized patient record: Balancing effort and benefit. Int. J. Med. Inform. 65(2):97–119, 2002.CrossRef van Ginneken, A. M., The computerized patient record: Balancing effort and benefit. Int. J. Med. Inform. 65(2):97–119, 2002.CrossRef
7.
go back to reference Picco, G. P., Mobile agents: an introduction. J. Microprocess. Microsyst. 25(2):65–74, 2001.CrossRef Picco, G. P., Mobile agents: an introduction. J. Microprocess. Microsyst. 25(2):65–74, 2001.CrossRef
8.
go back to reference Chen, T. S., Chung, Y. F., and Tian, C. S., A novel key management scheme for dynamic access control in a user hierarchy. Proc. IEEE Annu. Int. Comput. Softw. Appl. Conf. 1:396–401, 2004. Chen, T. S., Chung, Y. F., and Tian, C. S., A novel key management scheme for dynamic access control in a user hierarchy. Proc. IEEE Annu. Int. Comput. Softw. Appl. Conf. 1:396–401, 2004.
9.
go back to reference Bierman, E., Pretoria T., Cloete, E., Classification of malicious host threats in mobile agent computing. Proceedings of the 2002 Annual Research conference of The South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, pp. 141-148, 2002. Bierman, E., Pretoria T., Cloete, E., Classification of malicious host threats in mobile agent computing. Proceedings of the 2002 Annual Research conference of The South African Institute of Computer Scientists and Information Technologists on Enablement Through Technology, pp. 141-148, 2002.
10.
go back to reference Corradi, A., Montanari, R., Stefanelli, C., Security issues in mobile agent technology. Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing System, Cape Town, South Africa, pp. 3-8, 1999. Corradi, A., Montanari, R., Stefanelli, C., Security issues in mobile agent technology. Proceedings of the 7th IEEE Workshop on Future Trends of Distributed Computing System, Cape Town, South Africa, pp. 3-8, 1999.
11.
go back to reference Karnik, N. M., Tripathi,, A. R. A security architecture for mobile agents in Ajanta. Proceedings of the International Conference on Distributed Computing Systems, Taipei, Taiwan, pp. 402-409, 2000. Karnik, N. M., Tripathi,, A. R. A security architecture for mobile agents in Ajanta. Proceedings of the International Conference on Distributed Computing Systems, Taipei, Taiwan, pp. 402-409, 2000.
12.
go back to reference Volker, R., and Mehrdad, J. S., Access control and key management for mobile agents. Comput. Graph. 22(4):457–461, 1998.CrossRef Volker, R., and Mehrdad, J. S., Access control and key management for mobile agents. Comput. Graph. 22(4):457–461, 1998.CrossRef
13.
go back to reference The State of HIPAA Privacy and Security Compliance. AHIMA, April 2006. The State of HIPAA Privacy and Security Compliance. AHIMA, April 2006.
14.
go back to reference Rash, M. C. Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area, 2005. Rash, M. C. Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area, 2005.
15.
go back to reference Halamka, J. D., Szolovits, P., Rind, D., and Safran, C., A WWW implementation of national recommendations for protecting electronic health information. J. Am. Med. Inform. Assoc. 4(6):258–464, 1997.CrossRef Halamka, J. D., Szolovits, P., Rind, D., and Safran, C., A WWW implementation of national recommendations for protecting electronic health information. J. Am. Med. Inform. Assoc. 4(6):258–464, 1997.CrossRef
16.
go back to reference Lovis, C., Baud, R. H., and Scherrer, J. R., Internet integrated in the daily medical practice within an electronic patient record. Comput. Biol. Med. 28(5):567–579, 1998.CrossRef Lovis, C., Baud, R. H., and Scherrer, J. R., Internet integrated in the daily medical practice within an electronic patient record. Comput. Biol. Med. 28(5):567–579, 1998.CrossRef
17.
go back to reference Safran, C., Rind, D., Citroen, M., Bakker, A. R., Slack, W. V., and Bleich, H. L., Protection of confidentiality in the computer-based patient record. MD Computing 12(3):187–192, 1995. Safran, C., Rind, D., Citroen, M., Bakker, A. R., Slack, W. V., and Bleich, H. L., Protection of confidentiality in the computer-based patient record. MD Computing 12(3):187–192, 1995.
18.
go back to reference Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139–148, 1996.CrossRef Barrows, R. C., Jr., and Clayton, P. D., Privacy, confidentiality, and electronic medical records. J. Am. Med. Inform. Assoc. 3(2):139–148, 1996.CrossRef
19.
go back to reference Borselius, N., Mobile agent security, electronics and communication. Eng. J. 14(5):211–218, 2002. Borselius, N., Mobile agent security, electronics and communication. Eng. J. 14(5):211–218, 2002.
20.
go back to reference Maes, P., Guttman, R. H., and Moukas, A. G., Agents that buy and sell. Commun. ACM 42(3):81–91, 1999.CrossRef Maes, P., Guttman, R. H., and Moukas, A. G., Agents that buy and sell. Commun. ACM 42(3):81–91, 1999.CrossRef
21.
Metadata
Title
A Study on Agent-Based Secure Scheme for Electronic Medical Record System
Authors
Tzer-Long Chen
Yu-Fang Chung
Frank Y. S. Lin
Publication date
01-06-2012
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 3/2012
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-010-9595-8

Other articles of this Issue 3/2012

Journal of Medical Systems 3/2012 Go to the issue