{"title":"Analyzing the communication layers in Indian e-health system","authors":"Shilpa Srivastava, Namrata Agarwal, M. Pant","doi":"10.1109/INDIACOM.2014.6828070","DOIUrl":null,"url":null,"abstract":"Ehealth provides integrated services to the different users of health care which are broadly accessible by internet technology. It is subjected to the same threats as other online services. The paper highlights the sensitivity of communication involved in the health domain. The interaction has been divided into different stratum according to the Indian ehealth system. The layers portray the different level of confidentiality which further give rise to different requirement of protection. The different well known cryptography algorithms according to the different layers have been suggested to optimize the health system in terms of network bandwidth, CPU power and time.","PeriodicalId":404873,"journal":{"name":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Computing for Sustainable Global Development (INDIACom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INDIACOM.2014.6828070","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Ehealth provides integrated services to the different users of health care which are broadly accessible by internet technology. It is subjected to the same threats as other online services. The paper highlights the sensitivity of communication involved in the health domain. The interaction has been divided into different stratum according to the Indian ehealth system. The layers portray the different level of confidentiality which further give rise to different requirement of protection. The different well known cryptography algorithms according to the different layers have been suggested to optimize the health system in terms of network bandwidth, CPU power and time.