DOI QR코드

DOI QR Code

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS

CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구

  • 조영성 (한양여자대학교 스마트 IT학과) ;
  • 정지문 (남서울대학교 컴퓨터소프트웨어학과) ;
  • 나원식 (남서울대학교 컴퓨터소프트웨어학과)
  • Received : 2019.07.15
  • Accepted : 2019.09.20
  • Published : 2019.09.27

Abstract

Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

유비쿼터스-헬스케어의 발전과 함께 사이버 공격에 대처하기 위한 개인의료정보 처리를 위한 CloudHIS의 망 분리를 기반으로 한 보안 강화를 제안한다. 모든 보안 위협으로부터 보호하고 명확한 데이터 보안 정책을 수립하기 위해 CloudHIS용 데스크톱 컴퓨팅 서버를 클라우드 컴퓨팅 서비스에 적용한다. 하이퍼 바이저 아키텍처를 갖춘 두 대의 PC를 사용하여 물리적 망분리를 적용하고 KVM 스위치를 사용하여 네트워크를 선택할 수 있다. 다른 하나는 두 개의 OS가 있는 하나의 PC를 사용하는 논리적 망분리이지만 네트워크는 가상화를 통해 분할된다. 물리적 망 분리는 인터넷과 업무망 모두에서 액세스 경로를 차단하기 위해 각 네트워크에 대한 PC의 물리적 연결이다. 제안된 시스템은 사용자의 실제 데스크톱 컴퓨터에서 서버 가상화 기술을 통해 인트라넷 또는 인터넷에 액세스하는 데 사용되는 독립적인 데스크톱이다. 보안 강화를 처리하기 위해 네트워크 분리를 통해 의료병원 정보를 처리하는 클라우드 시스템인 CloudHIS를 구성하여 해킹을 방지하는 적응형 솔루션을 구현할 수 있다.

Keywords

References

  1. Y. B. Cho, S. H. Woo & S. H Lee. (2014). The CloudHIS System for Personal Healthcare Information Integration Scheme of Cloud Computing. Journal of the Korea society of computer and information, 19(5), 27-35. DOI : 10.9708/jksci.2014.19.5.027
  2. Y. S. Cho & K. H. Ryu. (2014). Predictive pattern analysis using SOM in medical data sets for medical treatment service. Computational Intelligence in Bioinformatics and Computational Biology. IEEE Conference on. IEEE, 2014. DOI : 10.1109/CIBCB.2014.6845512
  3. S. C. Noh & J. H. Hwang. (2011). A Study of Software Architecture Design Methods for Multiple Access Control under Web-based Medical Information System Environment. Journal of Information and Security, 11(4), 43-49.
  4. I. S. Cho. & H. S. Kwon. (2009). Efficient Sharing System of Medical Information for Interoperability between PACS System. Journal of the Korea Institute of Information and Communication Engineering, 13(3), 498-504.
  5. D. C. Kaelber, A. K. Jha, D. Johnston, B. Middleton & D. W. Bates. (2008). A research agenda for personal health records (PHRs). Journal of the American Medical Informatics Association, 15(6), 729-736. https://doi.org/10.1197/jamia.M2547
  6. G. L Yau., Williams, A. S. & J. B. Brown. (2011). Family physicians' perspectives on personal health records Qualitative study. Canadian Family Physician, 57(5), 178-184.
  7. T. H. Kim, I. H. Kim, J. H. Kim, C. W. Min, J. H. Kim & Y. I. Eom. Security-Enhanced Local Process Execution Scheme in Cloud Computing Environments. Journal of the Korea Institute of Information Security and Cryptology, 2010, 20(5), 69-79.
  8. D. K. Cho & S. C. Park. (2013). Development and implementation of monitoring system for management of virtual resource based on cloud computing. Journal of The Korea Society of Computer and Information, 18(2), 41-47. https://doi.org/10.9708/jksci.2013.18.2.041
  9. K. M. Kim. (2012). Implementation of patient monitoring system based on mobile healthcare. Journal of The Korea Society of Computer and Information, 17(12), 1-10. https://doi.org/10.9708/jksci/2012.17.12.001
  10. K. Balaji & P. S. Kiran. (2016). A Review on Cloud Security Challenges and Issues. Indian Journal of Science and Technology, 9(43).
  11. J. C. Patni, A. Sharma, P. Mishra & A. Kumar. (2016). Datacenter Virtualization with Optimization and Customization. Indian Journal of Science and Technology, 9(44).