Author: Sil, R.; Debnath, N.; Roy, A.
Title: Study on Resource Monitoring of E-Healthcare System Cord-id: 5w7rcf9f Document date: 2021_1_1
ID: 5w7rcf9f
Snippet: The recent outbreak of global pandemic of coronavirus (COVID-19) has shown us a wide scope of improvement in electronic healthcare management. It is very much visible since the patients have to avail medical facilities thereby maintaining the rules of social distancing and isolation to break the chain of virus transmission within the society. To achieve this objective, advanced information and communication, technology-based video conferencing tools may be widely used to deliver medical consulta
Document: The recent outbreak of global pandemic of coronavirus (COVID-19) has shown us a wide scope of improvement in electronic healthcare management. It is very much visible since the patients have to avail medical facilities thereby maintaining the rules of social distancing and isolation to break the chain of virus transmission within the society. To achieve this objective, advanced information and communication, technology-based video conferencing tools may be widely used to deliver medical consultancy to the patients in this pandemic situation. Since this entire electronic communication is dependent on the internet, which is itself an open digital space, this electronic communication between the patients and the medical practitioners are highly susceptible to infringement attempt of the adversary. Even the hardware component used by the patients during this electronic healthcare transaction like the camera, speaker, etc. of the end-devices may remain under the control of adversary even after the completion of the electronic transaction. As a result, the adversary may record any personal moment or personal file system of the user without its knowledge. To de-escalate and arrest the access of adversary over the resources of user, it is pertinent to study the risk factors and their security protocols in similar cases to manage the vulnerabilities and to propose the enhanced security model to ensure the integrity of the electronic healthcare transaction. In this paper, authors have studied those existing security protocols to propose a secured audio and video conferencing system through wired and wireless network with control and command of all the resources with the actual user only. The objective of this study is to maintain a logfile in a secure manner to note down the access and release of resources during the audio and video conference. © 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
Search related documents:
Co phrase search for related documents- Try single phrases listed below for: 1
Co phrase search for related documents, hyperlinks ordered by date