Loading

Malware Intrusion in Electronic Health Record
Sowmya1, Dhina Suresh2

1Sowmya, Research Scholar, Department of Computer Science, Joseph’s College of Arts and Science for Women, Hosur, Tamil Nadu, India.

2Dhina Suresh, Assistant Professor, Department of Computer Science, Joseph’s College of Arts and Science for Women, Hosur, Tamil Nadu, India.

Manuscript received on 04 April 2019 | Revised Manuscript received on 11 April 2019 | Manuscript Published on 26 April 2019 | PP: 210-215 | Volume-8 Issue-6S April 2019 | Retrieval Number: F60580486S19/19©BEIESP

Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open-access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The general motivation behind this research is to defeat the spread of malware exercises in several aspects. EHR – Electronic Health Records which is the ongoing, patient-centered record system that makes the fundamental data accessible to the approved clients incorporates specialists, patients, and other nursing and clinical institutional for getting to or refreshing the vital data and keeping up them every now and again for the significance in patient consideration. Health record management is the most important and challenging task. Use of innovations in medicinal services framework, especially the utilization of Electronic Health Records (EHR) gives a wide assortment of advantages. Better and appropriate healthcare is provided by EHR by improving all aspects of health care. A few verifications are created and associated with protecting the records of the patients and for giving delicate and real information to the patients. In spite of many safeguarding techniques provided, still there is malware capacity and this malware exercise leads in influencing the entire procedure. A worldwide effect from WannaCry malware is one of the transient issues where the greatest information is encoded. This prompts the mishandling of SMB(Server Message Block). The primary point is to defeat the malware. To beat this issue we have proposed an ABE which is the novel – based system for patient-driven secure sharing of EHRs in distributed processing circumstances, under multi owner / proprietor settings. For keeping an eye on the key administration challenges, we isolate the clients into two kinds of areas, to be specific open spaces(public domains) and individual spaces(personal domains). Specifically, the larger part proficient clients are overseen distributive by characteristic experts, while every proprietor just needs to deal with the keys of few clients in her own space. In the open area, Multi – Expert ABE (MA-ABE) to improve the security and to stay away from key escrow issue is used. Every single property specialist (AA) oversees a disjoint subset of client job characteristics, while none of only them can control the security of the general framework. We proposed the components for both key appropriation and encryption so that EHR proprietors can indicate customized fine-grained job-based access arrangements amid encryption of document. In the individual domain, owners / proprietor are directly assigned with the authorization for individual users and encrypt an EHR file under its data attributes.

Keywords: Attribute Based Encryption, Multi-Authority, Semi-Trusted Servers.
Scope of the Article: Computer Science and Its Applications