Developing a secure and private tele pharmacy platform for remote medication management
DOI:
https://doi.org/10.52783/jns.v14.1574Keywords:
health, information, DWT, DCT, experimental, management.Abstract
Implementing the e-healthcare paradigm has gained popularity recently throughout different research communities on a global scale. Through the use of contemporary information and communication technology, the e-healthcare solution sends the pertinent patient data to a distant healthcare facility and the relevant medical specialists. Sensitive data access and transmission methods over unprotected channels, however, are dangerous and provide serious security risks. Protecting patient medical information security from unauthorized access or users is crucial, according to standard agencies. Furthermore, studies have shown that identity theft pertaining to medical conditions is a growing and serious crime. Watermarking, steganography, and cryptography are the three methods used to safeguard medical data. Watermarking is the most widely used and promising of these strategies. Hence, medical image data and their dimensionalities are rapidly expanding. Because of these expansions in medical data, manually managing the file system is becoming increasingly challenging. Therefore, the management of medical data has become a major concern for healthcare practitioners. In the medical field, cloud computing is commonly utilised for storing, computing, and exchanging patient medical records. The hospital merely needs to collect patient information from files and upload the data to the cloud for storage via cloud computing.
Downloads
Metrics
References
Lechner NH. An overview of cybersecurity regulations and standards for medical device software. InCentral European Conference on Information and Intelligent Systems 2017 (pp. 237-249). Faculty of Organization and Informatics Varazdin.
Govindarajan R, Dhanavandan S. Information Literacy among Ophthalmologists: A Study. SRELS Journal of Information Management. 2019 Feb 28;56(1):51-60. https://doi.org/ 10.17821/srels/ 2019/v56i1/139605
Anderson S, Williams T. Cybersecurity and medical devices: Are the ISO/IEC 80001-2-2 technical controls up to the challenge?. Computer Standards & Interfaces. 2018 Feb 1;56:134-43. https://doi.org/10.1016/j.csi.2017.10.001
Park HB, Kim Y, Jeon J, Moon H, Woo S. Practical Methodology for In-Vehicle CAN Security Evaluation. J. Internet Serv. Inf. Secur. 2019 May;9(2):42-56.
Marotta A, Madnick S. Cybersecurity as a unifying factor for privacy, compliance and trust: The Haga Hospital case. Issues in Information Systems. 2022 Jan 1;23(1).
Kwon J, Johnson ME. Healthcare security strategies for regulatory compliance and data security. In2013 46th Hawaii International Conference on System Sciences 2013 Jan 7 (pp. 3972-3981). IEEE. https://doi.org/10.1109/HICSS.2013.246
Kelly B, Quinn C, Lawlor A, Killeen R, Burrell J. Cybersecurity in Healthcare. Trends of Artificial Intelligence and Big Data for E-Health. 2023 Jan 2:213-31. https://doi.org/10.1007/978-3-031-11199-0_11
Laouamer L, Euchi J, Zidi S, Mihoub A. Image-to-Tree to Select Significant Blocks for Image Watermarking. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2020;11(1):81-115.
Thomasian NM, Adashi EY. Cybersecurity in the internet of medical things. Health Policy and Technology. 2021 Sep 1;10(3):100549. https://doi.org/10.1016/j.hlpt.2021.100549
Dhamala K. Pharmacist-Delivered Interventions on Pain Management: Review and Cluster-Randomized Trial. Clinical Journal for Medicine, Health and Pharmacy. 2024 Dec 20;2(4):11-20.
Lee CD, Ho KI, Lee WB. A novel key management solution for reinforcing compliance with HIPAA privacy/security regulations. IEEE Transactions on Information Technology in Biomedicine. 2011 May 12;15(4):550-6. https://doi.org/10.1109/TITB.2011.2154363
Deepika J, Rajan C, Senthil T. Improved CAPSNET model with modified loss function for medical image classification. Signal, Image and Video Processing. 2022 Nov;16(8):2269-77. https://doi.org/10.1007/s11760-022-02192-5
Busdicker M, Upendra P. The role of healthcare technology management in facilitating medical device cybersecurity. Biomedical Instrumentation & Technology. 2017 Nov;51(s6):19-25. https://doi.org/10.2345/0899-8205-51.s6.19
Udayakumar R, Anuradha M, Gajmal YM, Elankavi R. Anomaly detection for internet of things security attacks based on recent optimal federated deep learning model. J Internet Services Inform Secur.. 2023;13(3):104-21.
Abraham C, Chatterjee D, Sims RR. Muddling through cybersecurity: Insights from the US healthcare industry. Business horizons. 2019 Jul 1;62(4):539-48. https://doi.org/10.1016/j.bushor.2019.03.010
Nifakos S, Chandramouli K, Nikolaou CK, Papachristou P, Koch S, Panaousis E, Bonacina S. Influence of human factors on cyber security within healthcare organisations: A systematic review. Sensors. 2021 Jul 28;21(15):5119. https://doi.org/10.3390/s21155119
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.