A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2018-01-01
|
Series: | Journal of Healthcare Engineering |
Online Access: | http://dx.doi.org/10.1155/2018/6410180 |
id |
doaj-b69030f01eb144fbb3d269a4aba5d1c1 |
---|---|
record_format |
Article |
spelling |
doaj-b69030f01eb144fbb3d269a4aba5d1c12020-11-25T00:46:10ZengHindawi LimitedJournal of Healthcare Engineering2040-22952040-23092018-01-01201810.1155/2018/64101806410180A Study on Secure Medical-Contents Strategies with DRM Based on Cloud ComputingHoon Ko0Libor Měsíček1Jongsun Choi2Seogchan Hwang3IT Research Institute, Chosun University, 309 Pilmun-daero, Dong-gu, Gwangju 61452, Republic of KoreaJan Evangelista Purkyně University in Ústí nad Labem, Pasteurova 1, 400 96 Ústí nad Labem, Czech RepublicSchool of Computer Science and Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-Gu, Seoul 06978, Republic of KoreaGensoloft Inc., 99 Jangseungbaegi-Ro, Dongjak-Gu, Seoul 06936, Republic of KoreaMany hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.http://dx.doi.org/10.1155/2018/6410180 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hoon Ko Libor Měsíček Jongsun Choi Seogchan Hwang |
spellingShingle |
Hoon Ko Libor Měsíček Jongsun Choi Seogchan Hwang A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing Journal of Healthcare Engineering |
author_facet |
Hoon Ko Libor Měsíček Jongsun Choi Seogchan Hwang |
author_sort |
Hoon Ko |
title |
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing |
title_short |
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing |
title_full |
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing |
title_fullStr |
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing |
title_full_unstemmed |
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing |
title_sort |
study on secure medical-contents strategies with drm based on cloud computing |
publisher |
Hindawi Limited |
series |
Journal of Healthcare Engineering |
issn |
2040-2295 2040-2309 |
publishDate |
2018-01-01 |
description |
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely. |
url |
http://dx.doi.org/10.1155/2018/6410180 |
work_keys_str_mv |
AT hoonko astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing AT libormesicek astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing AT jongsunchoi astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing AT seogchanhwang astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing AT hoonko studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing AT libormesicek studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing AT jongsunchoi studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing AT seogchanhwang studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing |
_version_ |
1725266453053046784 |