Name ( what is this am a MSC holder do you expect yourself to write Bsc student paper )!!!
Instructor
Class
Date
Healthcare Informatics Security System (general name anybody can write it , write a more specific professional name which suggest the solution )
Introduction( Should be bold and this is not IEEE format or even MLA its something else.)
The healthcare field is one of the most advanced industrial sectors that has attracted a significant percentage of investors. According to Mshali et al. [1], the transformations that have been witnessed in this sector are primarily due to the application of technology in addressing problems faced by both professionals and institutions. Consequently, experts in software engineering (why SW engineering not IT specialists !!) play substantial roles in ensuring the smooth running of this industry. One of the primary challenges that the healthcare system faces is the confidentiality of data. Gaivéo [2] asserted that previous pieces of research have mainly focused on the examination of patient data security thereby neglecting other forms of information that are transmitted within the hospital or healthcare unit (such as what be more specific!!!) . Therefore (therefore is not the word here !!! you jumped the conclusion before doing and writing !!! how this come that you are a Phd holder !!! try to explain more without mentioning the word this paper), this paper presents a solution to healthcare data security (talk specifically confedality security is rather a big word for this little paper ) by exploring a system that protects the information that is transferred between the hospitals or other medical facilities and device manufacturing firms.
System description
The proposed problem (no problem get proposed it shows itself the solution should be proposed!!!) that the system strives to solve is the issue of eavesdropping by other rival firms and unauthorized agents on the communication between the two agencies (where is the evidence that is even a problem and how they get wiretrace or eavesdroppind you should explain here). Dehling [3] contended that device manufacturers have the role of ensuring that medical equipment are delivered to facilities and maintained without failure whenever they are on warranty. However, rival firms have in the past breached information systems of healthcare facilities and proposed solutions to mechanical problems that the institutions face thereby competing unfairly (no evidences no statistics!! Try to provide a clue guess you cant!! And should also refer to a strong reference to ensure that this info is right!!!)j . The breaches of the information systems also have the potential of releasing data that may cripple the activities of both the healthcare facilities and the suppliers of the medical equipment. Therefore, the proposed health informatics security systems will have three basic security mechanisms that would guarantee the safe and secure transmission of data from one organization to another.
The first security mechanism is the access control module that defines the individuals who access such data. Hoppe et al. [4] argued that a principle challenge that large data networks experience is security admission. The complexity of this admission process subjects firms to security breaches that may have a negative impact on their operations. Therefore, the access control module used in the health informatics security system would be role-based (explain with examples!! And add a reference here). to ensure that all information flowing through the system is protected.
The second security mechanism that will be highly effective for the protection of the data transmitted from the hospitals to the device manufacturers is a solid authentication system. According to Pussewalage et al. [5], authentication mechanisms have been beneficial in the past in ensuring that the data sent from one entity is the same information that is received by the other entity without any form of distortion. The increased numbers of authentication models such as the use of the “challenge-response authentication protocols,” digital signatures, and passwords have substantially reduced the percentage of security flaws (scientific evidence and why) in organizations using different types of networks. Therefore, the main authentication mechanism that the health information security system will use of biometric authentication software such as eye scanner and finger print sensor (general talks use specific types or suggest due to a statistic!!! Very poor just narratives ). The significance of the biometric sensors is that they provide solid security as no two individuals share similar bio features such as fingerprint. Therefore, the authentication process would bar corporate rivals from using unethical means or methods to facilitate the unauthorized access of data.
The final mechanism that the healthcare informatics security system will be built based on is tight encryptions to enhance data integrity. According to Huang et al. [6], encryption is the best approach that corporations use to protect their data from intruders who skim or eavesdrop on the data (this will destroy the whole ideas and previous suggestions since we can rely on encryption only what a poor system which is used to flush the companies money big blow to your three points!!). Different encryption software has been used by various firms to prevent incidences of cyber-attacks (cyber attacks !!!! how ??? on local info machines !!!) . However, the primary technique that would be adopted in the case of the healthcare informatics security system is the Tinysec software (already bult programs are lame in computer science you should suugests your algorithm here at least, alsi tell me what is this program where is the refernce which ensures that your talk is right then tell me how this is possible to be accepted if you do not provide screen shoot of the softwre and text of its feauters which is useful beside statistics and references which assist that do you call yourself a PhD holder!!!) . The software is mainly used in wireless sensor networks to enhance a secure communication of healthcare information. The transfer of data through the healthcare informatics security system is wireless making it easy to incorporate Tinysec encryptions (not enough at all refer to the above notes).
Figure 1 below shows a detailed map of the flow of information from the two entities (healthcare device manufacturers and the hospital). (big figures with large squres will this eats up more space to reach the 9 papers how bad is this idea get this smaller and justify the text in the middle of each small one and use a professional way to draw!!!.
Figure 1: Information flow within the system (the size should be like above it’s a scientific paper )
The main types of data that will be transferred through the system is the information regarding machine health (and !!!?). Therefore, the first unit diagnoses the functioning of the machine and sends information to the storage unit. The security of the diagnostic data is the main reason for the development of the system. As such encryption and access control mechanisms will be installed at this stage. The second key unit that is significant for the flow of information is the storage unit. Diagnostic data is stored temporarily for some time before it is transmitted to the CPU (are you a hardware specialist how this gonna be done are you used to work with intel or AMD ???!!!?) . The central processing (for sure it will be done in the cpu !!! you are desgining a CPU now !!! it should be a controller that do this work !! a processing unit of Arduino)!!! unit defines what information is to be sent to the hospital database and the data that will be relayed to the medical device manufacturers. The two datasets will not be the same as technical information that will communicate the health of the machine will be sent to the medical device manufacturers while basic information communicating either potential failure or giving a green light for use will be transmitted to the hospital. Therefore, the essence of the introduction of security mechanisms is to ensure that the diagnostic data is not sent to either the wrong manufacturer or hospital.
Challenges
Conclusion
(did I tell you to provide a complete draft 10 refernces and 9 pages as I paid do not put big drawings to fill the papers it should be 2500 words long not filled with drawings my evaluation to your work is weak am an expert too in the field my problem is my time not the experience )…. Where is the IEEE format by the way!!!
Works Cited
[1] H. Mshali, T. Lemlouma, M. Moloney and D. Magoni, “A survey on health monitoring systems for health smart homes”, International Journal of Industrial Ergonomics, vol. 66, pp. 26-56, 2018. Available: 10.1016/j.ergon.2018.02.002.
[2] J. Gaivéo, “Information Security Standards in Healthcare Activities”, International Journal of Reliable and Quality E-Healthcare, vol. 5, no. 4, pp. 15-33, 2016. Available: 10.4018/ijrqeh.2016100102.
[3] T. Dehling, F. Gao, S. Schneider and A. Sunyaev, “Exploring the Far Side of Mobile Health: Information Security and Privacy of Mobile Health Apps on iOS and Android”, JMIR mHealth and uHealth, vol. 3, no. 1, p. e8, 2015. Available: 10.2196/mhealth.3672.
[4] A. Hoppe, J. Knackmuß, M. Morgenstern and R. Creutzburg, “Privacy Issues in Mobile Health Applications – Assessment of Current Android Health Apps”, Electronic Imaging, vol. 2017, no. 6, pp. 76-83, 2017. Available: 10.2352/issn.2470-1173.2017.6.mobmu-302.
[5] H. Gardiyawasam Pussewalage and V. Oleshchuk, “Privacy preserving mechanisms for enforcing security and privacy requirements in E-health solutions”, International Journal of Information Management, vol. 36, no. 6, pp. 1161-1173, 2016. Available: 10.1016/j.ijinfomgt.2016.07.006.
[6] M. Huang, W. Xie and X. Jing, “Analysis of Searchable Encryption Mechanism in Medical Cloud Environment”, Journal of Medical Imaging and Health Informatics, vol. 8, no. 2, pp. 331-336, 2018. Available: 10.1166/jmihi.2018.2305.