A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical...

Full description

Bibliographic Details
Main Authors: Hoon Ko, Libor Měsíček, Jongsun Choi, Seogchan Hwang
Format: Article
Language:English
Published: Hindawi Limited 2018-01-01
Series:Journal of Healthcare Engineering
Online Access:http://dx.doi.org/10.1155/2018/6410180
id doaj-b69030f01eb144fbb3d269a4aba5d1c1
record_format Article
spelling doaj-b69030f01eb144fbb3d269a4aba5d1c12020-11-25T00:46:10ZengHindawi LimitedJournal of Healthcare Engineering2040-22952040-23092018-01-01201810.1155/2018/64101806410180A Study on Secure Medical-Contents Strategies with DRM Based on Cloud ComputingHoon Ko0Libor Měsíček1Jongsun Choi2Seogchan Hwang3IT Research Institute, Chosun University, 309 Pilmun-daero, Dong-gu, Gwangju 61452, Republic of KoreaJan Evangelista Purkyně University in Ústí nad Labem, Pasteurova 1, 400 96 Ústí nad Labem, Czech RepublicSchool of Computer Science and Engineering, Soongsil University, 369 Sangdo-Ro, Dongjak-Gu, Seoul 06978, Republic of KoreaGensoloft Inc., 99 Jangseungbaegi-Ro, Dongjak-Gu, Seoul 06936, Republic of KoreaMany hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.http://dx.doi.org/10.1155/2018/6410180
collection DOAJ
language English
format Article
sources DOAJ
author Hoon Ko
Libor Měsíček
Jongsun Choi
Seogchan Hwang
spellingShingle Hoon Ko
Libor Měsíček
Jongsun Choi
Seogchan Hwang
A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Journal of Healthcare Engineering
author_facet Hoon Ko
Libor Měsíček
Jongsun Choi
Seogchan Hwang
author_sort Hoon Ko
title A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
title_short A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
title_full A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
title_fullStr A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
title_full_unstemmed A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
title_sort study on secure medical-contents strategies with drm based on cloud computing
publisher Hindawi Limited
series Journal of Healthcare Engineering
issn 2040-2295
2040-2309
publishDate 2018-01-01
description Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients’ biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
url http://dx.doi.org/10.1155/2018/6410180
work_keys_str_mv AT hoonko astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
AT libormesicek astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
AT jongsunchoi astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
AT seogchanhwang astudyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
AT hoonko studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
AT libormesicek studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
AT jongsunchoi studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
AT seogchanhwang studyonsecuremedicalcontentsstrategieswithdrmbasedoncloudcomputing
_version_ 1725266453053046784