Developing a secure and private tele pharmacy platform for remote medication management

Authors

  • Sanjay Kumar Mire
  • Kishor Kumar Sahu

DOI:

https://doi.org/10.52783/jns.v14.1574

Keywords:

health, information, DWT, DCT, experimental, management.

Abstract

Implementing the e-healthcare paradigm has gained popularity recently throughout different research communities on a global scale. Through the use of contemporary information and communication technology, the e-healthcare solution sends the pertinent patient data to a distant healthcare facility and the relevant medical specialists. Sensitive data access and transmission methods over unprotected channels, however, are dangerous and provide serious security risks. Protecting patient medical information security from unauthorized access or users is crucial, according to standard agencies. Furthermore, studies have shown that identity theft pertaining to medical conditions is a growing and serious crime. Watermarking, steganography, and cryptography are the three methods used to safeguard medical data. Watermarking is the most widely used and promising of these strategies. Hence, medical image data and their dimensionalities are rapidly expanding. Because of these expansions in medical data, manually managing the file system is becoming increasingly challenging. Therefore, the management of medical data has become a major concern for healthcare practitioners. In the medical field, cloud computing is commonly utilised for storing, computing, and exchanging patient medical records. The hospital merely needs to collect patient information from files and upload the data to the cloud for storage via cloud computing.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Lechner NH. An overview of cybersecurity regulations and standards for medical device software. InCentral European Conference on Information and Intelligent Systems 2017 (pp. 237-249). Faculty of Organization and Informatics Varazdin.

Govindarajan R, Dhanavandan S. Information Literacy among Ophthalmologists: A Study. SRELS Journal of Information Management. 2019 Feb 28;56(1):51-60. https://doi.org/ 10.17821/srels/ 2019/v56i1/139605

Anderson S, Williams T. Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge?. Computer Standards & Interfaces. 2018 Feb 1;56:134-43. https://doi.org/10.1016/j.csi.2017.10.001

Park HB, Kim Y, Jeon J, Moon H, Woo S. Practical Methodology for In-Vehicle CAN Security Evaluation. J. Internet Serv. Inf. Secur. 2019 May;9(2):42-56.

Marotta A, Madnick S. Cybersecurity as a unifying factor for privacy, compliance and trust: The Haga Hospital case. Issues in Information Systems. 2022 Jan 1;23(1).

Kwon J, Johnson ME. Healthcare security strategies for regulatory compliance and data security. In2013 46th Hawaii International Conference on System Sciences 2013 Jan 7 (pp. 3972-3981). IEEE. https://doi.org/10.1109/HICSS.2013.246

Kelly B, Quinn C, Lawlor A, Killeen R, Burrell J. Cybersecurity in Healthcare. Trends of Artificial Intelligence and Big Data for E-Health. 2023 Jan 2:213-31. https://doi.org/10.1007/978-3-031-11199-0_11

Laouamer L, Euchi J, Zidi S, Mihoub A. Image-to-Tree to Select Significant Blocks for Image Watermarking. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2020;11(1):81-115.

Thomasian NM, Adashi EY. Cybersecurity in the internet of medical things. Health Policy and Technology. 2021 Sep 1;10(3):100549. https://doi.org/10.1016/j.hlpt.2021.100549

Dhamala K. Pharmacist-Delivered Interventions on Pain Management: Review and Cluster-Randomized Trial. Clinical Journal for Medicine, Health and Pharmacy. 2024 Dec 20;2(4):11-20.

Lee CD, Ho KI, Lee WB. A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations. IEEE Transactions on Information Technology in Biomedicine. 2011 May 12;15(4):550-6. https://doi.org/10.1109/TITB.2011.2154363

Deepika J, Rajan C, Senthil T. Improved CAPSNET model with modified loss function for medical image classification. Signal, Image and Video Processing. 2022 Nov;16(8):2269-77. https://doi.org/10.1007/s11760-022-02192-5

Busdicker M, Upendra P. The role of healthcare technology management in facilitating medical device cybersecurity. Biomedical Instrumentation & Technology. 2017 Nov;51(s6):19-25. https://doi.org/10.2345/0899-8205-51.s6.19

Udayakumar R, Anuradha M, Gajmal YM, Elankavi R. Anomaly detection for internet of things security attacks based on recent optimal federated deep learning model. J Internet Services Inform Secur.. 2023;13(3):104-21.

Abraham C, Chatterjee D, Sims RR. Muddling through cybersecurity: Insights from the US healthcare industry. Business horizons. 2019 Jul 1;62(4):539-48. https://doi.org/10.1016/j.bushor.2019.03.010

Nifakos S, Chandramouli K, Nikolaou CK, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors. 2021 Jul 28;21(15):5119. https://doi.org/10.3390/s21155119

Downloads

Published

2025-02-06

How to Cite

1.
Kumar Mire S, Kumar Sahu K. Developing a secure and private tele pharmacy platform for remote medication management. J Neonatal Surg [Internet]. 2025Feb.6 [cited 2025Mar.20];14(1S):537-41. Available from: https://jneonatalsurg.com/index.php/jns/article/view/1574

Most read articles by the same author(s)