2014 IEEE 16th International Conference on E-Health Networking, Applications and Services (Healthcom) 2014
DOI: 10.1109/healthcom.2014.7001846
|View full text |Cite
|
Sign up to set email alerts
|

A network security architecture to reduce the risk of data leakage for health care organizations

Abstract: Health care is a highly regulated industry in which much value is placed upon privacy and confidentiality. The business of health care, particularly in certain academic environments, requires access to data of varying sensitivities, including information from the public Internet. This paper proposes a VLAN-based architecture for segregating data of varying sensitivities, a list of components that facilitate access to and distillation of data, and a method for one-way promotion of individual nodes from areas of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…Rauscher et al [43] present a VLAN-based architecture for reducing the risk of data leakage in a healthcare organization. The proposed approach is based on separating data based on sensitivity level and moving nodes from lower sensitivity zone to higher sensitivity zone.…”
Section: Classification Of Countermeasuresmentioning
confidence: 99%
See 2 more Smart Citations
“…Rauscher et al [43] present a VLAN-based architecture for reducing the risk of data leakage in a healthcare organization. The proposed approach is based on separating data based on sensitivity level and moving nodes from lower sensitivity zone to higher sensitivity zone.…”
Section: Classification Of Countermeasuresmentioning
confidence: 99%
“…Rauscher et al [43] In use Separates data into different zones based on sensitivity level Unauthorized copying, phishing attack, botnets, malware attack, dumpster diving Schmidt et al [44] In use…”
Section: Malware Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…RELATED WORK There have been previous efforts to design network security architectures for the health care system that reduce the risk of data leakage. Prime examples of these are in [10], [11]. Similar to those efforts, endpoint protection and endpoint key management are important aspects of our proposed architecture because the endpoints are the only locations where unencrypted data is accessible.…”
Section: Initial Experimentationmentioning
confidence: 96%
“…This feature substantially simplifies interactions between intermediate data hosts and significantly reduces the risks of data leakage due to insider attacks and compromised devices. Our architecture thus provides a more secure framework than [10], [11] because data is protected by encryption at all locations and points in time.…”
Section: Initial Experimentationmentioning
confidence: 99%