A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records


Securing large amounts of electronic medical records stored in different forms and in many locations, while making availability to authorized users is considered as a great challenge. Maintaining protection and privacy of personal information is a strong motivation in the development of security policies. It is critical for health care organizations to access, analyze, and ensure security policies to meet the challenge and to develop the necessary policies to ensure the security of medical information. The problem, then, is how we can maintain the availability of the electronic medical records and at the same time maintain the privacy of patients’ information. This paper will propose a novel architecture model for the Electronic Medical Record (EMR), in which useful statistical medical records will be available to the interested parties while maintaining the privacy of patients’ information.

Share and Cite:

Bensefia, A. and Zarrad, A. (2014) A Proposed Layered Architecture to Maintain Privacy Issues in Electronic Medical Records. E-Health Telecommunication Systems and Networks, 3, 43-49. doi: 10.4236/etsn.2014.34006.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] Meingast, M., Rossta, T. and Sastry, S. (2006) Security and Privacy Issues with Health Care Information Technology. 28th IEEE EMBS Annual International Conference, 1, 5453-5458.
[2] Middleton, B., Bloomrosen, M., Dente, M.A., Hashmat, B. et al. (2012) Enhancing Patient Safety and Quality of Care by Improving the Usability of Electronic Health Record Systems: Recommendations from AMIA. Journal of the American Medical Informatics Association, 1, 1-7.
[3] Mukherjee, A. and McGinnis, J. (2007) E-Healthcare: An Analysis of Key Themes in Research. International Journal of Pharmaceutical and Healthcare Marketing, 1, 349-363.
[4] Murtaza, M.B. (2012) Risk Management for Health Information Security and Privacy. American Journal of Health Sciences, 3, 125-134.
[5] National Institutes of Health (NIH) (2006) Electronic Health Records Overview, National Center for Research Resources. National Institutes of Health, Bethesda.
[6] Clarke, I., Flaherty, T., Hollis, S. and Tomallo, M. (2009) Consumer Privacy Issues Associated with the Use of Electronic Health Records. Academy of Health Care Management Journal, 5, 364-378.
[7] Ralston, J.D., Revere, D., Robins, L.S. and Goldberg, H.I. (2004) Patients’ Experience with a Diabetes Support Programme Based on an Interactive Electronic Medical Record: Qualitative Study. British Medical Journal, 328, 1159-1163.
[8] Pyper, C., Amery, J., Watson, M. and Crook, C. (2004) Patients’ Experiences When Accessing Their On-Line Electronic Patient Records in Primary Care. British Journal of Genetic Practice, 54, 38-43.
[9] Adams, T., Budden, M., Hoare, C. and Sanderson, H. (2004) Lessons from the Central Hampshire Electronic Health Record Pilot Project: Issues of Data Protection and Consent. British Medical Journal, 328, 871-874.
[10] Bolton Research Group (2000) Patients’ Knowledge and Expectations of Confidentiality in Primary Health Care: A Quantitative Study. British Journal of General Practice, 50, 901-902.
[11] Ray, P. and Wimalasiri, J. (2006) The Need for Technical Solutions for Maintaining the Privacy of HER. 28th IEEE Engineering in Medicine and Biology Society, 1, 4686-4689.
[12] Hadzic, M., Dillon, T. and Chang, E. (2006) Use of Ontology Technology for Standardization of Medical Records and Dealing with Associated Privacy Issues. IEEE 2006, Mumbai, 15-17 December 2006, 2839-2845.
[13] Slamanig, D. and Stingel, C. (2008) Privacy Aspects of eHealth. 3rd International Conference on Availability, Reliability and Security, 1226-1233.
[14] Khadka, S. (2012) Privacy, Security and Storage Issues in Medical Data Management. 3rd Asian Himalays International Conference on Internet, 1-5.
[15] Le, Z., Chang, E., Huang, K. and Lai, F. (2011) A Secure Electronic Medical Record Sharing Mechanism in the Cloud Computing Platform. IEEE 15th International Symposium on Consumer Electronics, Singapore, 14-17 June 2011, 98-103.
[16] Pear, R. (2009) Clinton to Unveil Rules to Protect Medical Privacy. The New York Times, New York.
[17] Van Deursen, N., Buchanan, W. and Duff, A. (2013) Monitoring Information Security within Health Care. Computers and Security, 37, 31-45.
[18] Gallo, R., Hawakami, H. and Dahab, R. (2013) FORTUNA—A Framework for the Design and Development of Hardware-Based Secure Systems. Journal of Systems and Software, 86, 2063-2076.
[19] Ray, P. and Wimalasiri, J. (2006) The Need of Technical Solutions for Maintaining the Privacy of HER. 28th IEEE EMBS Annual International Conference, 1, 4686-4689.

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.