{"title":"电子健康记录的安全和隐私方面:综述","authors":"Divya Sharma, C. Prabha","doi":"10.1109/InCACCT57535.2023.10141814","DOIUrl":null,"url":null,"abstract":"With the growth in population, there is an increase in the amount of Electronic Health Records (EHR) and so is the rise in concern regarding their security and privacy. At present, the security and privacy of EHR have gained significant importance. This research paper gives an indebt understanding of what EHR comprises and why they need to be secured. Further how the Internet of Medical Things (IoMT) devices contribute towards adding records into these EHR. Further, this paper answers Why these EHR are saved as big data? This research also compares the already prevalent security technique used in EHR. Finally, this paper studies the various performance evaluation metrics which are commonly used for the evaluation of EHR.","PeriodicalId":405272,"journal":{"name":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security and Privacy Aspects of Electronic Health Records: A Review\",\"authors\":\"Divya Sharma, C. Prabha\",\"doi\":\"10.1109/InCACCT57535.2023.10141814\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the growth in population, there is an increase in the amount of Electronic Health Records (EHR) and so is the rise in concern regarding their security and privacy. At present, the security and privacy of EHR have gained significant importance. This research paper gives an indebt understanding of what EHR comprises and why they need to be secured. Further how the Internet of Medical Things (IoMT) devices contribute towards adding records into these EHR. Further, this paper answers Why these EHR are saved as big data? This research also compares the already prevalent security technique used in EHR. Finally, this paper studies the various performance evaluation metrics which are commonly used for the evaluation of EHR.\",\"PeriodicalId\":405272,\"journal\":{\"name\":\"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)\",\"volume\":\"67 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/InCACCT57535.2023.10141814\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Advancement in Computation & Computer Technologies (InCACCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/InCACCT57535.2023.10141814","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security and Privacy Aspects of Electronic Health Records: A Review
With the growth in population, there is an increase in the amount of Electronic Health Records (EHR) and so is the rise in concern regarding their security and privacy. At present, the security and privacy of EHR have gained significant importance. This research paper gives an indebt understanding of what EHR comprises and why they need to be secured. Further how the Internet of Medical Things (IoMT) devices contribute towards adding records into these EHR. Further, this paper answers Why these EHR are saved as big data? This research also compares the already prevalent security technique used in EHR. Finally, this paper studies the various performance evaluation metrics which are commonly used for the evaluation of EHR.