scispace - formally typeset
Open AccessJournal ArticleDOI

The Scalability and the Strategy for EMR Database Encryption Techniques

TLDR
In this article, the authors constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard).
Abstract
EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial department and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) . DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some technique like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues.

read more

Citations
More filters
Journal ArticleDOI

A Comparison of the Query Execution Algorithms in Secure Database System

TL;DR: This paper proposes the selective tuple encryption method using Bloom Filter which could tell us the existence of the data and compares the search performance between the proposed method and the other encryption methods the authors know.
References
More filters
Journal ArticleDOI

Affordances, motivation, and the design of user interfaces

TL;DR: In this paper, the goal of a tool is to "serve" the user in the context of the task it is intended for, and every tool should feel like it was custom designed for that user.
Related Papers (5)