{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:22:14Z","timestamp":1772065334588,"version":"3.50.1"},"reference-count":59,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T00:00:00Z","timestamp":1579478400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004595","name":"universiti sains malaysia","doi-asserted-by":"publisher","award":["1001\/ PKOMP\/ 8014017, 203\/PKOMP\/6711426"],"award-info":[{"award-number":["1001\/ PKOMP\/ 8014017, 203\/PKOMP\/6711426"]}],"id":[{"id":"10.13039\/501100004595","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Center for Cyber Safety and Education, United States Internal Revenue segregated fund","award":["Inc. Code. EIN: 45-2405127 through the (ISC)2 graduate cybersecurity scholarship award"],"award-info":[{"award-number":["Inc. Code. EIN: 45-2405127 through the (ISC)2 graduate cybersecurity scholarship award"]}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Health Informatics J"],"published-print":{"date-parts":[[2020,9]]},"abstract":"<jats:p> Advancements in electronic health record system allow patients to store and selectively share their medical records as needed with doctors. However, privacy concerns represent one of the major threats facing the electronic health record system. For instance, a cybercriminal may use a brute-force attack to authenticate into a patient\u2019s account to steal the patient\u2019s personal, medical or genetic details. This threat is amplified given that an individual\u2019s genetic content is connected to their family, thus leading to security risks for their family members as well. Several cases of patient\u2019s data theft have been reported where cybercriminals authenticated into the patient\u2019s account, stole the patient\u2019s medical data and assumed the identity of the patients. In some cases, the stolen data were used to access the patient\u2019s accounts on other platforms and in other cases, to make fraudulent health insurance claims. Several measures have been suggested to address the security issues in electronic health record systems. Nevertheless, we emphasize that current measures proffer security in the short-term. This work studies the feasibility of using a decoy-based system named HoneyDetails in the security of the electronic health record system. HoneyDetails will serve fictitious medical data to the adversary during his hacking attempt to steal the patient\u2019s data. However, the adversary will remain oblivious to the deceit due to the realistic structure of the data. Our findings indicate that the proposed system may serve as a potential measure for safeguarding against patient\u2019s information theft. <\/jats:p>","DOI":"10.1177\/1460458219894479","type":"journal-article","created":{"date-parts":[[2020,1,20]],"date-time":"2020-01-20T12:51:59Z","timestamp":1579524719000},"page":"2083-2104","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":19,"title":["HoneyDetails: A prototype for ensuring patient\u2019s information privacy and thwarting electronic health record threats based on decoys"],"prefix":"10.1177","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7801-2541","authenticated-orcid":false,"given":"Abiodun","family":"Esther Omolara","sequence":"first","affiliation":[]},{"given":"Aman","family":"Jantan","sequence":"additional","affiliation":[{"name":"Universiti Sains Malaysia, Malaysia"}]},{"given":"Oludare Isaac","family":"Abiodun","sequence":"additional","affiliation":[{"name":"Bingham University, Nigeria"}]},{"given":"Humaira","family":"Arshad","sequence":"additional","affiliation":[{"name":"Universiti Sains Malaysia, Malaysia"}]},{"given":"Kemi Victoria","family":"Dada","sequence":"additional","affiliation":[{"name":"Ahmadu Bello University, Nigeria"}]},{"given":"Etuh","family":"Emmanuel","sequence":"additional","affiliation":[{"name":"Arthur Jarvis University, Nigeria"}]}],"member":"179","published-online":{"date-parts":[[2020,1,20]]},"reference":[{"key":"bibr1-1460458219894479","first-page":"94","volume-title":"Proceedings of the 2012 22nd international conference on computer theory and applications (ICCTA)","author":"Radwan AS"},{"key":"bibr2-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1177\/1460458218813640"},{"key":"bibr3-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1504\/IJEH.2015.071637"},{"key":"bibr4-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23294-2_2"},{"key":"bibr5-1460458219894479","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2471"},{"key":"bibr6-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1001\/virtualmentor.2012.14.9.stas1-1209"},{"key":"bibr7-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1093\/bjaceaccp\/mkt032"},{"key":"bibr8-1460458219894479","unstructured":"Heather L. 2017 Breach report: 477 breaches, 5.6M patient records affected, 29 January 2018, https:\/\/www.healthcare-informatics.com\/news-item\/cybersecurity\/2017-breach-report-477-breaches-56m-patient-records-affected (accessed 10 June 2018)."},{"key":"bibr9-1460458219894479","first-page":"109","volume-title":"Proceedings of the 2014 IEEE international conference on healthcare informatics (ICHI)","author":"Ahmed M"},{"key":"bibr10-1460458219894479","unstructured":"Enterprise.verizon.com. Protected health information data, 2019, https:\/\/enterprise.verizon.com\/resources\/reports\/2018\/protected_health_information_data_breach_report.pdf (accessed 7 July 2019)."},{"issue":"1","key":"bibr11-1460458219894479","first-page":"69","volume":"27","author":"Ponemon IR.","year":"2011","journal-title":"J Healthc Prot Manage"},{"key":"bibr12-1460458219894479","unstructured":"Stallings W. Cryptography and network security: principles and practice. Upper Saddle River, NJ: Pearson, 2017, pp. 92\u201395."},{"key":"bibr13-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9971-2"},{"key":"bibr14-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"bibr15-1460458219894479","first-page":"538","volume-title":"Proceedings of the 2012 IEEE symposium on security and privacy (SP)","author":"Bonneau J"},{"key":"bibr16-1460458219894479","first-page":"657","volume-title":"Proceedings of the 16th international conference on World Wide Web","author":"Florencio D"},{"key":"bibr17-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-010-9614-9"},{"key":"bibr18-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9658-5"},{"key":"bibr19-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9835-1"},{"key":"bibr20-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1504\/IJEH.2017.085800"},{"key":"bibr21-1460458219894479","first-page":"642","volume-title":"Proceedings of the 2012 international conference on high-performance computing and simulation (HPCS)","author":"Yu Z"},{"key":"bibr22-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0221-7"},{"key":"bibr23-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0422-0"},{"key":"bibr24-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757844"},{"issue":"3","key":"bibr25-1460458219894479","first-page":"281","volume":"29","author":"Deshmukh P.","year":"2017","journal-title":"J King Saud Univ: Comput Inform Sci"},{"key":"bibr26-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0597-z"},{"key":"bibr27-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.113"},{"issue":"6","key":"bibr28-1460458219894479","first-page":"3385","volume":"7","author":"Boussif M","year":"2017","journal-title":"Int J Elect Comput Eng"},{"key":"bibr29-1460458219894479","first-page":"1","volume-title":"Proceedings of the 2016 annual IEEE systems conference (SysCon)","author":"De Luca G"},{"key":"bibr30-1460458219894479","first-page":"281","volume-title":"Proceedings of the 2015 33rd IEEE international conference on computer design (ICCD)","author":"Luo C"},{"key":"bibr31-1460458219894479","doi-asserted-by":"publisher","DOI":"10.3233\/FI-2012-626"},{"key":"bibr32-1460458219894479","doi-asserted-by":"publisher","DOI":"10.11591\/ijeecs.v13.i2.pp649-656"},{"key":"bibr33-1460458219894479","first-page":"394","volume-title":"Proceedings of the 2016 IEEE international symposium on high-performance computer architecture (HPCA)","author":"Jiang ZH"},{"key":"bibr34-1460458219894479","first-page":"1","volume-title":"Proceedings of the 2010 international conference on computing communication and networking technologies (ICCCNT)","author":"Thangavel TS"},{"key":"bibr35-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1038\/414883a"},{"key":"bibr36-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.1870866"},{"key":"bibr37-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2928359"},{"key":"bibr38-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264861"},{"key":"bibr39-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.67"},{"key":"bibr40-1460458219894479","unstructured":"Omolara AE, Jantan A, Abiodun OI, et al. A novel approach for the adaptation of honey encryption to support natural language message. In: Proceedings of the international multi conference of engineers and computer scientists (vol. 1), Hong Kong, 14\u201316 March 2018, http:\/\/www.iaeng.org\/publication\/IMECS2018\/IMECS2018_pp134-139.pdf"},{"key":"bibr41-1460458219894479","first-page":"447","volume-title":"Proceedings of the 2015 IEEE symposium on security and privacy (SP)","author":"Huang Z"},{"key":"bibr42-1460458219894479","first-page":"453","volume-title":"International conference on broadband and wireless computing, communication and applications","author":"Park HS","year":"2016"},{"key":"bibr43-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2017.2748421"},{"key":"bibr44-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2013.02.007"},{"key":"bibr45-1460458219894479","unstructured":"Naseem S. Malware may have compromised some Florida Hospital Patient Information. Orlando Sentinel, 5 May 2018, https:\/\/www.orlandosentinel.com\/health\/os-florida-hospital-malware-websites-20180502-story.html (accessed 20 June 2018)."},{"key":"bibr46-1460458219894479","unstructured":"Winton R. Hollywood hospital pays $17,000 in bitcoin to hackers; FBI investigating, https:\/\/www.latimes.com\/business\/technology\/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html (accessed 6 February 2019)."},{"key":"bibr47-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2406707"},{"key":"bibr48-1460458219894479","first-page":"145","volume-title":"Proceedings of the 2013 ACM SIGSAC conference on computer & communications security","author":"Juels A"},{"key":"bibr49-1460458219894479","first-page":"1","volume-title":"Proceedings of the 19th ACM symposium on access control models and technologies","author":"Juels A"},{"key":"bibr50-1460458219894479","first-page":"187","volume-title":"Proceedings of the 2015 international conference on high performance computing & simulation (HPCS)","author":"Catuogno L"},{"key":"bibr51-1460458219894479","unstructured":"Generate massive amounts of realistic fake data in Node.js and the browser, https:\/\/github.com\/marak\/Faker.js\/"},{"key":"bibr52-1460458219894479","unstructured":"A library for generating fake data such as names, addresses, and phone numbers, https:\/\/github.com\/stympy\/faker\/"},{"key":"bibr53-1460458219894479","unstructured":"Changes for version 0.07 - 2005-07-14, https:\/\/metacpan.org\/release\/JASONK\/Data-Faker-0.07"},{"key":"bibr54-1460458219894479","unstructured":"The faker.js tutorial, http:\/\/zetcode.com\/javascript\/fakerjs\/"},{"key":"bibr55-1460458219894479","doi-asserted-by":"crossref","unstructured":"Turing AM. Computing machinery and intelligence. Mind 1950; 59: 433\u2013460, https:\/\/phil415.pbworks.com\/f\/TuringComputing.pdf","DOI":"10.1093\/mind\/LIX.236.433"},{"key":"bibr56-1460458219894479","volume-title":"Understanding cryptography: a textbook for students and practitioners","author":"Paar C","year":"2009"},{"key":"bibr57-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"bibr58-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1038\/30687"},{"key":"bibr59-1460458219894479","doi-asserted-by":"publisher","DOI":"10.1038\/nature15263"}],"container-title":["Health Informatics Journal"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1460458219894479","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1460458219894479","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1460458219894479","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T02:25:12Z","timestamp":1740795912000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/1460458219894479"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,20]]},"references-count":59,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["10.1177\/1460458219894479"],"URL":"https:\/\/doi.org\/10.1177\/1460458219894479","relation":{},"ISSN":["1460-4582","1741-2811"],"issn-type":[{"value":"1460-4582","type":"print"},{"value":"1741-2811","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,20]]}}}