Outline of the Report
The constant development of the technological world demands the professionals in the medical field to be understandable to the impact of it as well. Data generated in the medical field is huge in amount, given the raw data generated by EHR and other data producing devices as well. Therefore, there is a huge risk of the data being hacked by malicious hackers over the cyberworld. It is therefore essential that the medical professionals be accustomed to the understanding of cryptosystem to handle patient’s data with utmost care. There are many ways that Electronic Medical Records are handled, such as, ECC or Elliptic Curved Cryptography based Recording Systems and EHRs (Tsai et al., 2014). In addition, the medical professionals should also be accustomed to handle light-weight cryptography that keeps the medical data stored in Internet of Things or IoT systems (Sicari et al., 2015). These systems are portable and use wireless connections for data propagations. Although, there are certainly few demerits that the system possesses, this is why use of cryptography in these devices is more essential. The background history of the evolution of cryptography will be explained in details in the report consisting of the overview of the use of cryptography in medical field. The report would then consist of the current link between modern cryptosystems and the recently developed medical field. In addition, the limitations of the systems would also be explained in details. The major points of utilization of Cryptosystems in the Medical world would then be explained in details following up the major points concluding with the thesis restatement and recommended steps.
Reference
Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer networks, 76, 146-164.
Tsai, K. L., Leu, F. Y., Wu, T. H., Chiou, S. S., Liu, Y. W., & Liu, H. Y. (2014). A Secure ECC-based Electronic Medical Record System. J. Internet Serv. Inf. Secur., 4(1), 47-57. A. (2015). Security, privacy Grieco, L. A., & Coen-Porisini, Computer networks, 76, 146-164. Leu, F. Y., Wu, T. H., Chiou, S. S., Liu, Y. W., & Liu, H. Y. (2014)