Skip to main content

Research on Medical Big Data Security Management

  • Conference paper
  • First Online:
  • 1275 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1075))

Abstract

Medical big data, as an important basic strategic resource of the countries, can bring disruptive changes to the medical field with its application, but its safety management problems are also becoming increasingly prominent. This paper introduces the concept of medical big data and its unique characteristics, analyzes the significance of its safety management, and discusses the safety management measures of medical big data from two aspects of technology and policy. Some suggestions on data integration and privacy protection are also putting forward in this paper.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Huang, J., Wang, Y., Pi, B.: Research on the security guarantee technology of health and medical big data. Comput. Age 11, 45–48 (2018). (in Chinese)

    Google Scholar 

  2. Lu, Z., Yao, Y., Yin, X.: Health and Medical Big Data Theory and Practice. Electronics Industry Press, Beijing (2017). (in Chinese)

    Google Scholar 

  3. Zhang, Z., Zhou, Y., Du, S., et al.: Medical big data and the opportunities and challenges it faces. J. Med. Inf. (35), 2–8 (2014). (in Chinese)

    Google Scholar 

  4. Ling, H.: U.S. Utah Health Agency was Implicated in Blackened 180,000 User Information (2012). http://sec.chinabyte.com/447/12307447.shtml. (in Chinese)

  5. Shah, F., Li, J., Shamil, F.R., Iqbal, M.: Medical big data existence flavors: a review. In: 2nd International Conference on Robotics and Automation Engineering, Guangzhou, China, pp. 487–490 (2017)

    Google Scholar 

  6. Dai, M., Meng, Q.: Medical health big data mining and analysis. China Health Inf. Manag. 14, 126–130 (2017). (in Chinese)

    Google Scholar 

  7. Jing, X., Qin, J.: The application and development direction of big data in medical insurance management (2018). https://www.cn-healthcare.com/articlewm/20180719/content-1029797.html. (in Chinese)

  8. Tavakol, P., Labruto, F., Bergstrand, L., Blomqvist, L.: Effects of outsourcing magnetic resonance examinations from a public university hospital to a private agent. EBSCO 52(1), 81–85 (2011)

    Google Scholar 

  9. Godinho, T.M., Costa, C., Oliveira, J.L.: Generating big data repositories for research in medical imaging. In: 11th Iberian Conference on Information Systems and Technologies (CISTI), Gran Canaria, Spain. IEEE (2016)

    Google Scholar 

  10. Siddique, M., Mirza, M.A., Ahmad, M., Chaudhry, J., Islam, R.: A survey of big data security solutions in healthcare. In: International Conference on Security and Privacy in Communication Systems, pp. 391–406. Springer, Singapore (2018)

    Google Scholar 

  11. Jayabalan, M., O’Daniel, T.: Access control and privilege management in electronic health record: a systematic literature review. J. Med. Syst. 40, 1–9 (2016)

    Article  Google Scholar 

  12. Huang, Y., Yang, Z., Ping, L., et al.: Implementation method of role-based access control in security management system. J. Zhejiang Univ. (Eng. Ed.) 38, 408–413 (2004). (in Chinese)

    Google Scholar 

  13. Thejas, G.S., Pramod, T.C., Iyengar, S.S., Sunitha, N.R.: Intelligent access control: a self-adaptable trust-based access control (SATBAC) framework using game theory strategy, chapter 7. In: Proceedings of International Symposium on Sensor Networks, Systems and Security 2018, pp. 97–111. Springer (2018)

    Google Scholar 

  14. Hui, Z., Li, H., Zhang, M., Feng, D.: Risk adaptive access control model for medical big data. J. Commun. 36, 190–199 (2015). (in Chinese)

    Google Scholar 

  15. Identity Authentication Technology. https://baike.baidu.com/item/identificationtechnology/1897549?fr=aladdin. (in Chinese)

  16. Wang, D., Zhao, W., Ding, Z.: Summary of key technology analysis of big data security protection. J. Beijing Univ. Technol. 43(3), 335–350 (2017). (in Chinese)

    Google Scholar 

  17. Yarmand, M.H., Sartipi, K., Down, D.G.: Behavior-based access control for distributed healthcare environment. In: 21st IEEE International Symposium on Computer-Based Medical Systems, Jyvaskyla, Finland, pp. 126–134. IEEE (2008)

    Google Scholar 

  18. Zhao, R., He, P.: Research on personal privacy protection system in medical big data application. China Health Inf. Manag. 191–196 (2016). (in Chinese)

    Google Scholar 

  19. Luo, X., Luo, Y.: The status quo of medical big data in information construction. Chin. J. Med. Libr. Inf. Sci. 24(11), 48–51 (2015). (in Chinese)

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Nos. 61763048, 61263022, 61303234), National Social Science Foundation of China (No. 12XTQ012), Innovation and Promotion of Education Foundation Project of Science and Technology Development Center of Ministry of Education (No. 2018A01042), Science and Technology Foundation of Yunan Province (No. 2017FB095), the 18th Yunnan Young and Middle-aged Academic and Technical Leaders Reserve Personnel Training Program (No. 2015HB038).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rong Jiang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hu, X., Jiang, R., Qian, Z., Shi, M., Shang, J. (2020). Research on Medical Big Data Security Management. In: Liu, Y., Wang, L., Zhao, L., Yu, Z. (eds) Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery. ICNC-FSKD 2019. Advances in Intelligent Systems and Computing, vol 1075. Springer, Cham. https://doi.org/10.1007/978-3-030-32591-6_38

Download citation

Publish with us

Policies and ethics