The Scalability and the Strategy for EMR Database Encryption Techniques
EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners...
Saved in:
| Published in | Journal of Information and Communication Convergence Engineering, 9(5) Vol. 9; no. 5; pp. 577 - 582 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
한국정보통신학회
31.10.2011
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2234-8255 2234-8883 2234-8883 |
| DOI | 10.6109/jicce.2011.9.5.577 |
Cover
| Abstract | EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial department and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) – DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some technique like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues. KCI Citation Count: 0 |
|---|---|
| AbstractList | EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial department and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) – DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some technique like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues. KCI Citation Count: 0 |
| Author | Sahama, Tony Kim, Steve Jung-Tae Kim, Ji-Hong Shin, David |
| Author_xml | – sequence: 1 givenname: David surname: Shin fullname: Shin, David – sequence: 2 givenname: Tony surname: Sahama fullname: Sahama, Tony – sequence: 3 givenname: Steve Jung-Tae surname: Kim fullname: Kim, Steve Jung-Tae – sequence: 4 givenname: Ji-Hong surname: Kim fullname: Kim, Ji-Hong |
| BackLink | https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001599163$$DAccess content in National Research Foundation of Korea (NRF) |
| BookMark | eNqNkD1PwzAURS0EEqX0DzB5ZUjwRxI7Y1VKqVSEVMJsPTtOaxqc4qRC-fc0LexM9-rpnjecG3TpG28RuqMkzijJHz6cMTZmhNI4j9M4FeICjRjjSSSl5Jd_naXpNZq0rdMk5VxkgiQjtCi2Fr8ZqEG72nU9Bl_ibrh1ATq76XHVBDx_WeNH6EBDa_Hcm9DvO9d4XFiz9e7rYNtbdFVB3drJb47R-9O8mD1Hq9fFcjZdRYYyKiJOS1sxnchj6FxzkjFGiNAVy0SWSaNLrisQRkgiaJ5LDSZPSpIlwBJJreBjdH_-60OldsapBtwpN43aBTVdF0tFGWM0Gbb8vD34PfTfUNdqH9wnhF5RogZ16qRODepUrlJ1VHek2JkyoWnbYKv_QD-mAnQd |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY ACYCR |
| DOI | 10.6109/jicce.2011.9.5.577 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall Korean Citation Index |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| DocumentTitleAlternate | The Scalability and the Strategy for EMR Database Encryption Techniques |
| EISSN | 2234-8883 |
| EndPage | 582 |
| ExternalDocumentID | oai_kci_go_kr_ARTI_1222147 10.6109/jicce.2011.9.5.577 10_6109_jicce_2011_9_5_577 |
| GroupedDBID | .UV AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION ADTOC UNPAY ACYCR M~E |
| ID | FETCH-LOGICAL-c1217-31def2b48defb9b30622007bf267668cbd3bfa7c78071998bac94d064a2481e73 |
| IEDL.DBID | UNPAY |
| ISSN | 2234-8255 2234-8883 |
| IngestDate | Tue Nov 21 21:41:06 EST 2023 Wed Oct 01 16:32:18 EDT 2025 Tue Jul 01 00:57:29 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 5 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1217-31def2b48defb9b30622007bf267668cbd3bfa7c78071998bac94d064a2481e73 |
| Notes | G704-SER000003196.2011.9.5.023 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=http://society.kisti.re.kr/sv/SV_svpsbs03V.do?method=download&cn1=JAKO201104153790172 |
| PageCount | 6 |
| ParticipantIDs | nrf_kci_oai_kci_go_kr_ARTI_1222147 unpaywall_primary_10_6109_jicce_2011_9_5_577 crossref_primary_10_6109_jicce_2011_9_5_577 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2011-10-31 |
| PublicationDateYYYYMMDD | 2011-10-31 |
| PublicationDate_xml | – month: 10 year: 2011 text: 2011-10-31 day: 31 |
| PublicationDecade | 2010 |
| PublicationTitle | Journal of Information and Communication Convergence Engineering, 9(5) |
| PublicationYear | 2011 |
| Publisher | 한국정보통신학회 |
| Publisher_xml | – name: 한국정보통신학회 |
| References | (E1ICAW_2011_v9n5_577_001) 2009; 43 |
| References_xml | – volume: 43 start-page: 49 year: 2009 ident: E1ICAW_2011_v9n5_577_001 publication-title: Communications of the ACM |
| SSID | ssib053376704 ssib044744615 ssib025702295 ssib012146031 |
| Score | 1.7807378 |
| Snippet | EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to... |
| SourceID | nrf unpaywall crossref |
| SourceType | Open Website Open Access Repository Index Database |
| StartPage | 577 |
| SubjectTerms | 전자/정보통신공학 |
| Title | The Scalability and the Strategy for EMR Database Encryption Techniques |
| URI | http://society.kisti.re.kr/sv/SV_svpsbs03V.do?method=download&cn1=JAKO201104153790172 https://www.kci.go.kr/kciportal/ci/sereArticleSearch/ciSereArtiView.kci?sereArticleSearchBean.artiId=ART001599163 |
| UnpaywallVersion | publishedVersion |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| ispartofPNX | Journal of Information and Communication Convergence Engineering, 2011, 9(5), , pp.577-582 |
| journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2234-8883 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044744615 issn: 2234-8255 databaseCode: M~E dateStart: 20110101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Bb9MwFH5auwNcYAgQYzBZCHGBpLOdxM4BoQk6BqgDsXUaJ8t2nKnrlFZJWtQd9tv3XLcTiAtIXOIosiLF39N73xfbnwFeUikzoW0RaVTLUVKWLMKiZyJt9qjR3FG9nC4YHGWHw-TzWXq2Aeu9J01Yqhh78jSKaxeP614z7x2fqmY-bUyzx0_jYvIunK78tvB-8hNdvLIVxST15euymmFJ4iL32qYDm1mKFL0Lm8Ojb_s__EFzjCcRqqL09l5KHjbTeOPx3sXIWhecPfM4jVMhfitYnarG651ZNdWLn_ry8pdadHAf5usdPWEJyjietSa2V38aPP7fz9yCeyv2SvZDuD2ADVc9hI8YauQYsQ6W3wuiq4K0_llwvl0QJMakP_hOPuhW-7JJ-pWtF8tkRU7WJrLNIxge9E_eH0ar8xkiS1HJYPouXMlMIrExuUHxwfyfT1OyTGSZtKbgptTCCok8BmWd0TZPCuRAmiWSOsEfQ7eaVO4JEKlTI2mYVkys8651TJTIx0rLSu7SbXi9BkFNgw2HQvniIVNLyJQfE5WrVCFk2_ACcVJjO1LePdu35xM1rhVqhE-KIiWiCXZ6cwvjX7zz6b9134G7bLVakNNn0G3rmXuO9KU1u9AZXPd3VyF5A9gA7C4 |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PT9swGLWgHMaFgdg02EAWmrhAUmwnsXNACEH5KWACitjJsh0HdUVplaRF5a_nc90iJi6bxCWOIitS_D5933ux_YzQTyJEwpXJAgVqOYjynAZQ9HSg9A7RilmixtMFF5fJSTs6u4_vZ9B070nllyqGjjx1wtKG3bJZDZs3d7Ia9itd7bC7MOvt-dOVdzPnJ99T2aYpCCSp86txNYOSxHjqtM0smktioOgNNNe-_LX_2x00R1kUgCqKX--FYH4zjTMeb_7pGGO9s2caxmHM-V8Fa7Yo4fppUPTV6Ek9Pr6pRUef0XC6o8cvQemGg1qH5vm9wePHfuYiWpiwV7zvw20JzdhiGR1DqOEbwNpbfo-wKjJcu2fe-XaEgRjj1sU1PlS1cmUTtwpTjsbJCt9OTWSrL6h91Lo9OAkm5zMEhoCSgfSd2ZzqSECjUw3ig7o_nzqnCU8SYXTGdK644QJ4DMg6rUwaZcCBFI0EsZx9RY2iV9hvCAsVa0H8tGJkrHOtozwHPpYbmjMbr6CtKQiy7204JMgXB5kcQybdmMhUxhIgW0EbgJPsmo507tmufejJbilBI5xKApSIRNBp-xXGf3jn6v91_47m6WS1ICM_UKMuB3YN6Eut1yfB-AJTd-r9 |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+Scalability+and+the+Strategy+for+EMR+Database+Encryption+Techniques&rft.jtitle=Journal+of+information+and+communication+convergence+engineering&rft.au=Shin%2C+David&rft.au=Sahama%2C+Tony&rft.au=Kim%2C+Steve+Jung-Tae&rft.au=Kim%2C+Ji-Hong&rft.date=2011-10-31&rft.issn=2234-8255&rft.volume=9&rft.issue=5&rft.spage=577&rft.epage=582&rft_id=info:doi/10.6109%2Fjicce.2011.9.5.577&rft.externalDBID=n%2Fa&rft.externalDocID=10_6109_jicce_2011_9_5_577 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2234-8255&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2234-8255&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2234-8255&client=summon |