Evidential Modeling For Telemedicine Continual Security
Evidential Modeling For Telemedicine Continual Security
Evidential Modeling For Telemedicine Continual Security
1
U of Tunis El-Manar, ISTMT, Lab of Biophysics and Medical Technologies, Tunisia
2
Seidenberg School of CS & IS, Pace U, New York, USA
Abstract - Telemedicine has not advanced at the same pace as IT and its own medical technologies. The long-awaited progress has
been hindered aggressively by security risks that came with innovative information and communication technologies. One major
technological factor to blame for this tardiness in telemedicine is its information security that lead to patients and doctors attrition and
hence system infeasibility. Given the great deal of uncertainties and ambiguities in the telemedicine environment, Bayesian reasoning
does not offer a sound approach to tackle all the security problems menacing telemedicine. For this article proposes an evidential
reasoning model to manage risks due to security uncertainties and ambiguities characterizing most telemedicine environments.
Dempster and Shafer Theory is used to process security management evidence for the purpose to forecast the overall security risks
associated with the continual feasibility of a telemedicine system. This article also provides a numerical example to demonstrate the
working of the proposed evidential reasoning model.
Keywords - Telemedicine, Dempster and Shafer theory, evidential reasoning, Belief functions, security risk.
T elemedicine has been around now for be the use of satellite technology to broadcast a
several decades, but it is not advancing at consultation between providers at facilities in two
the same pace as other technologies. In fact, countries, using videoconferencing equipment and
telemedicine has shown greater deficiencies despite the robotic technology.
advances in most information and telecommunication
technologies. Most of the risks that continued to rise Telecommunication has been enhanced to allow
with the rise of technology has hit telemedicine very physicians and specialists in remote health to deliver
hard and slowed its adoption and progress. These risks health care, diagnose patients, and provide therapy in a
are mainly associated with lacks in information privacy real-time manner. Telemedicine software systems have
and concerns associated with computer and network been also enhanced to allow for medical diagnostic
security. activities but these have been limited to augmenting the
performance of the communication effort and not
Even though you can see many major telemedicine necessarily the decision support part of the diagnosing
networks, like American Well, MDLIVE, and Teladoc, effort [12].
they are all hit with all types of government regulations
across state borders, in addition to major health Major applications involved in the telemedicine effort
standards like HIPAA, HL7, and regional data include radiology, pathology, cardiology and e-health
protection acts ([3], [4], [6]). education. Telemedicine adopted a variety of
approaches including Store-and-Forward, Home-
The significant progress made in the IT community Health, Real-Time, and other asynchronous methods
should certainly advance the telemedicine field. ([10], [11], [8]).
Advancement in secure data sharing among patients,
health providers, and insurance agencies with assured In this paper we refer to telemedicine simply as the use
mutual trust and information privacy established a of technology to provide health care at a distance, and
robust platform for real-time healthcare delivery. The we are mainly concerned with the security of its
entire nation started to accept the deployment of computing environment. . We see that this recent field
electronic health information systems and the federal is certainly playing a great role in delivering healthcare
government has sponsored it ([1], [10]). nationwide and the entire nation is committed to it.
There are then risks associated with the telemedicine’s
The major part of telemedicine that has seen great own information security that considerably depends on
development is the use of telecommunications to the security of all its subsystems on its network of
provide medical information and services. This includes health service deliveries: Remote patients, remote
simple data transfer among members of the doctors, remote hospitals, remote data resources, mobile
559
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 5, October 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
units, insurance agencies, and its distributed computing sM defining the security postures of all subsystems H1
environment. through HM constituting the telemedicine environment;
and the additional security parameter s0 summarizing
This article proposes an evidential reasoning model the continual security efforts applied by telemedicine
aiming at assuring a continual feasibility of a owners to keep its security risks lower than the
telemedicine system through effective information acceptable level defined in the telemedicine system
security. The security posture of the telemedicine security policy.
system is written in terms of the security postures of all
its subsystems and the effectiveness of owners’ efforts
to assure continual security. While the strength of a
security posture is expressed as the belief function of
adequate security, in contrast, the system security risk is
expressed as the plausibility of ineffective security.
560
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 5, October 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
561
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 5, October 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
562
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 5, October 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
563
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 5, October 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
Computing Env sec posture 0.3 0.4 0.3 0.5 0.3 0.2 0.5 0.4 0.06
Patients sec posture 0.4 0.6 0 0.5 0.4 0.1 0.44 0.55 0
Doctors sec posture 0.6 0.3 0.1 0.6 0.3 0.1 0.75 0.23 0.01
Hospitals sec posture 0.3 0.7 0 0.7 0.1 0.2 0.56 0.43 0
Med Data sec posture 0.5 0.4 0.1 0.6 0.3 0.1 0.67 0.31 0.01
Mobile U sec posture 0.6 0.3 0.1 0.6 0.2 0.2 0.77 0.2 0.02
Ins agencies sec posture 0.7 0.3 0 0.3 0.5 0.2 0.62 0.37 0
Fuse a1-a2 0.5 0.4 0.06 0.44 0.55 0 0.46 0.48 0.04
Fuse a1-a3 0.46 0.48 0.04 0.75 0.23 0.01 0.74 0.24 0.01
Fuse a1-a5 0.79 0.209 0 0.67 0.31 0.01 0.87 0.1 0.01
Fuse a1-a6 0.87 0.1 0.01 0.77 0.2 0.02 0.95 0.03 0.01
Fuse a1-a7 0.95 0.03 0.01 0.62 0.375 0.01 0.98 0.02 0.01
a0 = Fusion of e0 and a1-a7 0.98 0.02 0 0.43 0.53 0.04 0.975 0.02 0
PS: Due to the approximations used in all computations, the m-values did not add to 1.
564
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.