Advertisement

Research on Medical Big Data Security Management

  • Xiaohan Hu
  • Rong JiangEmail author
  • Zhenwei Qian
  • Mingyue Shi
  • Jingwei Shang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1075)

Abstract

Medical big data, as an important basic strategic resource of the countries, can bring disruptive changes to the medical field with its application, but its safety management problems are also becoming increasingly prominent. This paper introduces the concept of medical big data and its unique characteristics, analyzes the significance of its safety management, and discusses the safety management measures of medical big data from two aspects of technology and policy. Some suggestions on data integration and privacy protection are also putting forward in this paper.

Keywords

Medical big data Safety management Measures 

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (Nos. 61763048, 61263022, 61303234), National Social Science Foundation of China (No. 12XTQ012), Innovation and Promotion of Education Foundation Project of Science and Technology Development Center of Ministry of Education (No. 2018A01042), Science and Technology Foundation of Yunan Province (No. 2017FB095), the 18th Yunnan Young and Middle-aged Academic and Technical Leaders Reserve Personnel Training Program (No. 2015HB038).

References

  1. 1.
    Huang, J., Wang, Y., Pi, B.: Research on the security guarantee technology of health and medical big data. Comput. Age 11, 45–48 (2018). (in Chinese)Google Scholar
  2. 2.
    Lu, Z., Yao, Y., Yin, X.: Health and Medical Big Data Theory and Practice. Electronics Industry Press, Beijing (2017). (in Chinese)Google Scholar
  3. 3.
    Zhang, Z., Zhou, Y., Du, S., et al.: Medical big data and the opportunities and challenges it faces. J. Med. Inf. (35), 2–8 (2014). (in Chinese)Google Scholar
  4. 4.
    Ling, H.: U.S. Utah Health Agency was Implicated in Blackened 180,000 User Information (2012). http://sec.chinabyte.com/447/12307447.shtml. (in Chinese)
  5. 5.
    Shah, F., Li, J., Shamil, F.R., Iqbal, M.: Medical big data existence flavors: a review. In: 2nd International Conference on Robotics and Automation Engineering, Guangzhou, China, pp. 487–490 (2017)Google Scholar
  6. 6.
    Dai, M., Meng, Q.: Medical health big data mining and analysis. China Health Inf. Manag. 14, 126–130 (2017). (in Chinese)Google Scholar
  7. 7.
    Jing, X., Qin, J.: The application and development direction of big data in medical insurance management (2018). https://www.cn-healthcare.com/articlewm/20180719/content-1029797.html. (in Chinese)
  8. 8.
    Tavakol, P., Labruto, F., Bergstrand, L., Blomqvist, L.: Effects of outsourcing magnetic resonance examinations from a public university hospital to a private agent. EBSCO 52(1), 81–85 (2011)Google Scholar
  9. 9.
    Godinho, T.M., Costa, C., Oliveira, J.L.: Generating big data repositories for research in medical imaging. In: 11th Iberian Conference on Information Systems and Technologies (CISTI), Gran Canaria, Spain. IEEE (2016)Google Scholar
  10. 10.
    Siddique, M., Mirza, M.A., Ahmad, M., Chaudhry, J., Islam, R.: A survey of big data security solutions in healthcare. In: International Conference on Security and Privacy in Communication Systems, pp. 391–406. Springer, Singapore (2018)Google Scholar
  11. 11.
    Jayabalan, M., O’Daniel, T.: Access control and privilege management in electronic health record: a systematic literature review. J. Med. Syst. 40, 1–9 (2016)CrossRefGoogle Scholar
  12. 12.
    Huang, Y., Yang, Z., Ping, L., et al.: Implementation method of role-based access control in security management system. J. Zhejiang Univ. (Eng. Ed.) 38, 408–413 (2004). (in Chinese)Google Scholar
  13. 13.
    Thejas, G.S., Pramod, T.C., Iyengar, S.S., Sunitha, N.R.: Intelligent access control: a self-adaptable trust-based access control (SATBAC) framework using game theory strategy, chapter 7. In: Proceedings of International Symposium on Sensor Networks, Systems and Security 2018, pp. 97–111. Springer (2018)Google Scholar
  14. 14.
    Hui, Z., Li, H., Zhang, M., Feng, D.: Risk adaptive access control model for medical big data. J. Commun. 36, 190–199 (2015). (in Chinese)Google Scholar
  15. 15.
    Identity Authentication Technology. https://baike.baidu.com/item/identificationtechnology/1897549?fr=aladdin. (in Chinese)
  16. 16.
    Wang, D., Zhao, W., Ding, Z.: Summary of key technology analysis of big data security protection. J. Beijing Univ. Technol. 43(3), 335–350 (2017). (in Chinese)Google Scholar
  17. 17.
    Yarmand, M.H., Sartipi, K., Down, D.G.: Behavior-based access control for distributed healthcare environment. In: 21st IEEE International Symposium on Computer-Based Medical Systems, Jyvaskyla, Finland, pp. 126–134. IEEE (2008)Google Scholar
  18. 18.
    Zhao, R., He, P.: Research on personal privacy protection system in medical big data application. China Health Inf. Manag. 191–196 (2016). (in Chinese)Google Scholar
  19. 19.
    Luo, X., Luo, Y.: The status quo of medical big data in information construction. Chin. J. Med. Libr. Inf. Sci. 24(11), 48–51 (2015). (in Chinese)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Xiaohan Hu
    • 1
    • 2
  • Rong Jiang
    • 1
    • 2
    Email author
  • Zhenwei Qian
    • 1
    • 2
  • Mingyue Shi
    • 1
    • 2
  • Jingwei Shang
    • 1
    • 2
  1. 1.Yunnan University of Finance and EconomicsKunmingChina
  2. 2.Key Laboratory of Service Computing and Safety Management of Yunnan Provincial UniversitiesKunmingChina

Personalised recommendations