Font Size: a A A

The Research And Implementation Of Resident’s Health Records Information Security Technologe Based On Cloud Computing

Posted on:2016-05-13Degree:MasterType:Thesis
Country:ChinaCandidate:Y X LiFull Text:PDF
GTID:2308330473954313Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The resident’s health record information based on cloud computing is facing not only traditional security threats such as information theft, malicious attacks, virus attacks, but other new security problem such as cloud platform, underlying virtual resources, the user resource sharing, the sensitive information leakage. At present, the content in cloud computing is so much that the research on cloud security systematic is not deep enough.On top of existing research, this thesis integrates hardware and software strategy, effectively using a variety of techniques, and meanwhile combines system specific security requirements, designing a low-cost but effective security system. This thesis mainly focus on physics isolation technology, CA(certificate authority) authentication technology, and privacy protection technology, which are applied to cloud computing based resident health record system, to strengthen its security.First of all, we do researches on physical isolation technology. After comparing physical isolation card and GAP, we try to use physical isolation card into our system to resist external network attacks for its higher security properties. GAP is designed to establish the security isolation exchange area between the medical business private network area and public service area to cut off the connection between the internal and external network.Second, we research CA authentication technology and test the generation of the digital certificate. By analyzing the requirement of CA authentication system and the process of certificate acceptance system, we build the CA authentication system. Keytool is used to generate the CA certificate, complete the CA test work, and successfully generate digital certificate.Finally, privacy protection technology is researched and implemented. This thesis uses the role-based access control technology, in which different roles are assigned to different users. Thereby users are awarded different access privileges. We adopt centralized certification method, combining access authorization policy management method, to ensure that information patients are not disclosed to unauthorized users. This method is effective to protect privacy information in health records.This thesis is organized as follows: In the first part, we introduce the overall framework of health archives information security platform based on cloud computing. Then three key technologies of information security and the implementation of privacy protection technology are discussed in detail. Finally, the effective integration of a variety of techniques is used in health records information platform based on cloud computing, to ensure the safety of the health records information.
Keywords/Search Tags:cloud computing, health records, physical isolation, CA authentication, privacy protection
PDF Full Text Request
Related items