CFP last date
20 January 2025
Reseach Article

Article:Security of Data of EHR in a grid computing Environment

by Kulvinder Singh Mann, Ankit Bansal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 7 - Number 6
Year of Publication: 2010
Authors: Kulvinder Singh Mann, Ankit Bansal
10.5120/1168-1307

Kulvinder Singh Mann, Ankit Bansal . Article:Security of Data of EHR in a grid computing Environment. International Journal of Computer Applications. 7, 6 ( September 2010), 11-14. DOI=10.5120/1168-1307

@article{ 10.5120/1168-1307,
author = { Kulvinder Singh Mann, Ankit Bansal },
title = { Article:Security of Data of EHR in a grid computing Environment },
journal = { International Journal of Computer Applications },
issue_date = { September 2010 },
volume = { 7 },
number = { 6 },
month = { September },
year = { 2010 },
issn = { 0975-8887 },
pages = { 11-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume7/number6/1168-1307/ },
doi = { 10.5120/1168-1307 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:55:39.490213+05:30
%A Kulvinder Singh Mann
%A Ankit Bansal
%T Article:Security of Data of EHR in a grid computing Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 7
%N 6
%P 11-14
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data protection in EHR application needs to be enforced more strictly than in other application areas [1, 2]. Since the 1960s, data protection of personal health information was and is still of high concern. The details of where information flows, who has access to the data and for what purpose are of major importance. Considering this and bearing in mind that in grid computing it is not only simple data sharing, but rather it is the sharing of distributed resources like algorithms, storage, computing power, etc., it is necessary to study closely the aspects of grid security and to find suitable solutions to enforce it. Phenotypic data in a patient electronic medical record can lead to identify for example whether the subject has a particular infection or not. Analyses methods for such identification can be simple statistical procedures, like in [4], or machine learning systems – artificial neural network – like in [5]. Anonymizing procedures are not enough for protecting the data without loosing the scientific value of this data. For instance, sharing high-resolution imaging datasets online may be risky; a full reconstruction of the face using computerized 3D techniques is indeed possible [6-8]. Sharing of medical 3D imaging datasets has already been reported in some pre grid environment applications [9, 10], anyhow, the risk of this sharing is not well studied so far. The major problem is that we still cannot enforce a dependable security policy in grids; i.e. we cannot assure that administrators, developers, or other staffs do not have an access to the medical data.

References
  1. Anderson, R., Security engineering: a guide to building dependable distributed systems. 2001, New York: Wiley. xxviii, 612 p.
  2. Anderson, R., Isaac Newton Institute for Mathematical Sciences, and British Medical Association, Personal medical information: security, engineering, and ethics, Proceedings of the Personal Information Workshop, Cambridge, U.K., June 21-22, 1996. 1997, Berlin; New York: Springer. x, 250 p.
  3. Martin-Sanchez, F., V. Maojo, and G. Lopez-Campos, Integrating genomics into health information systems. Methods of Information in Medicine, 2002. 41(1): p. 25-30.
  4. Diero, L., et al., Can data from an electronic medical record identify which patients with pneumonia have Pneumocystis carinii Infection? International Journal of Medical Informatics, 2004. 73(11-12): p. 743-750.
  5. Haraldsson, H., L. Edenbrandt, and M. Ohlsson, Detecting acute myocardial infarction in the 12-lead ECG using Hermite expansions and neural networks. Artificial Intelligence in Medicine, 2004. 32(2): p. 127-36.
  6. Nakajima, S., et al., 3D MRI reconstruction for surgical planning and guidance, in Advanced Navigation in Neurosurgery, E. Alexander and R.J. Maciunas, Editors. 1999, New York: Thieme. p. 137-145.
  7. Jones, M.W., Facial reconstruction using volumetric data, in Proceedings of the Vision Modelling and Visualization Conference 2001. 2001, Berlin: AKA GmbH. p. 135-150.
  8. Evison, M.P., Computerised 3D facial reconstruction. assemblage - the Sheffield graduate journal of archaeology, 1996. 1(1).
  9. Medical data storage and processing on the GRID. 2002 [Accessed 2008 March 13]; Available from: http://creatis-www.insa-lyon.fr/MEDIGRID.
  10. Benkner, S., et al., GEMSS: Grid-infrastructure for Medical Service Provision. Methods of Information in Medicine, 2005. 44(2): p. 177-181.
  11. Purdam, K., et al., Grid computing and disclosure control. New Review of Information Networking, 2004. 10: p. 161-176.
  12. Banatre, J.-P., et al., Future for European Grids: grids and service oriented knowledge utilities. Vision and research directions 2010 and beyond., D.D. Roure, Editor. 2006, Next Generation GRIDs Expert Group, Information Society Technologies (IST), European Commission, Office for Official Publications of the European Communities, Luxembourg. p. 60.
  13. Tomita, Y., et al., Artificial neural network approach for selection of susceptible single nucleotide polymorphisms and construction of prediction model on childhood allergic asthma. BMC Bioinformatics, 2004. 5(1): p. 120.
  14. Bao, L. and Y. Cui, Prediction of the phenotypic effects of nonsynonymous single nucleotide polymorphisms using structural and evolutionary information. Bioinformatics, 2005. 10(21): p. 2185-2190.
Index Terms

Computer Science
Information Sciences

Keywords

EHR Grid Computing SOA Distributed system