45 research outputs found
Access control of EHR records in a heterogeneous cloud infrastructure
Since the advent of smartphones, IoT and cloud computing, we have seen an industry-wide requirement to integrate different healthcare applications with each other and with the cloud, connecting multiple institutions or even countries. But despite these trends, the domain of access control and security of sensitive healthcare data still raises a serious challenge for multiple developers and lacks the necessary definitions to create a general security framework addressing these issues. Taking into account newer, more special cases, such as the popular heterogeneous infrastructures with a combination of public and private clouds, fog computing, Internet of Things, the area becomes more and more complicated. In this paper we will introduce a categorization of these required policies, describe an infrastructure as a possible solution to these security challenges, and finally evaluate it with a set of policies based on real-world requirements
Taxonomy for trade-off problem in distributed telemedicine systems
Increasing amount of data and demands for features are challenging for Web systems. By serving these requirements, distributed systems gather ground, however they bring problems along. These issues are already present in telemedicine. Since telemedicine is a wide discipline, various phenomena have different effects on data. Availability and consistency have both important roles in telemedicine, but as CAP and PACELC theorems addressed trade-off problem, no one can guarantee both capabilities simultaneously. Our research aims to get a nearer view of the problem considering real world telemedicine use-cases and offer an easily tunable system with a taxonomy that gives a helping hand at designing telemedicine systems. Model checking verifies and data quality measurement proves the correctness of our model. In the course of measurements, we revealed an interesting occurence and consequence that is called hypothetical-zero-latency
Small degree BitTorrent
It is well-known that the BitTorrent file sharing protocol is responsible for a significant portion of the Internet traffic. A large amount of work has been devoted to reducing the footprint of the protocol in terms of the amount of traffic, however, its flow level footprint has not been studied in depth. We argue in this paper that the large amount of flows that a BitTorrent client maintains will not scale over a certain point. To solve this problem, we first examine the flow structure through realistic simulations. We find that only a few TCP connections are used frequently for data transfer, while most of the connections are used mostly for signaling. This makes it possible to separate the data and signaling paths. We propose that, as the signaling traffic provides little overhead, it should be transferred on a separate dedicated small degree overlay while the data traffic should utilize temporal TCP sockets active only during the data transfer. Through simulation we show that this separation has no significant effect on the performance of the BitTorrent protocol while we can drastically reduce the number of actual flows
A FHIR-based healthcare system backend with deep cloud side security
The need for an easy-to-learn healthcare development framework is becoming evermore urgent, but the challenges created by the very specific nature of this domain, combined with increasingly complex technological requirements is no easy task. In this paper, we introduce our proposition for one such development stack, ready for handling large amounts of medical data and security issues. Then we introduce benchmark-based evaluations on a heavily loaded database instance, and compare them with a similar benchmark from another team, who used a similar approach with the FHIR standard but with different technologies
SIP COMPRESSION
The wired line network has been well studied and widely used for a long
time. Most of its protocols are so successful that passed the test of
time. There are many
similar tasks in mobile and wired line environment, and we would like
to achieve compatible, inter-working solutions. So it is a plausible
idea to use the protocols of the wired line network in mobile
environment too. However, the mobile and wired line environment differ
significantly; mainly the bandwidth is different in the two networks.
Although the difference is going to be smaller with the help of new
generation of mobile networks, it will
still remain significant. An acceptable solution is to compress these
protocols. We have not found such a solution in the literature
so our opinion is that this article is the first dealing with SIP compression.
We have created a demonstration
system, which connects two SIP user agents to each
other and ensures the compression and decompression of the
messages between them.
In this article we show our development about adapting various compressing
algorithms for SIP compression, and we evaluate them
Full-stack FHIR-based MBaaS with server- and client-side caching capable WebDAO
In healthcare systems, it is essential to have applications that are robust responsive and have a good performance. It is also advisable to store data in some standardized way so it can be integrated with other systems. However, in the 21st century an application may be doubtful of use if the userexperience is at a low level. Several studies inform us about how tolerant the users are when they visit a website or wait to retrieve some data. Based on these studies, we will construct a system that is capable of working offline and can also unburden the server-side. This will be achieved by establishing a so-called Web Data Access Object (WebDAO), which has a maintainable offline capability and also performs better in most given circumstances. Our measurements were evaluated in the context of how users tolerate a delay and slow responses