Scheme for Health File Privacy Protection Based on Trusted Computing Technology

Main Article Content

Xingkui Wang, Jing Bian

Abstract

Our objectives were to construct a security and reliable health information system protection measure and to provide a trusted terminal environment for medical information system. This scheme is to melt the credible computing idea into the medical information privacy protection. This melting makes the medical information be able to find a trust source and trust foundation in this application environment with high sensitivity and to further extend to the safety of the entire business system. In this scheme, TPM chip will take advantage of its own key management function, encryption and decryption function, platform identity attestation function and so on to provide the security support that is based on hardware for the file safety protection in HIS system. Designed a HIS file privacy protection scheme by adopting trusted computing technology. This module is to protect the files of all subsystems in HIS and to ensure that the files can reach a certain security requirements in the confidentiality, integrity and non-repudiation. This paper designed a scheme of medical file privacy protection based on trusted computing technology. Scheme on the basis of HIS system, through the analysis of files in the HIS system, security protection scheme is put forward based on trusted computing. From the aspects of confidentiality and integrity of
medical records to privacy protection, and trusted computing use in the field of health information protection of high sensitivity based on hardware security features.

Article Details

How to Cite
Xingkui Wang, Jing Bian. (2021). Scheme for Health File Privacy Protection Based on Trusted Computing Technology. CONVERTER, 2021(6), 56-66. Retrieved from https://converter-magazine.info/index.php/converter/article/view/369
Section
Articles