Affiliation(s)
1. Laboratory of Electrical Engineering and Energetic Systems Ibn Tofail University, Faculty of Sciences, Kenitra, Morocco
2. Laboratory of Genetics and Biometry, Faculty of Sciences Ibn Tofail University, Faculty of Sciences, Kenitra, Morocco
3. Moroccan Poison Control and Pharmacovigilance Center, Rabat, Morocco
4. Faculty of Medicine and Pharmacy, University Mohammed V, Rabat, Morocco
ABSTRACT
In a previous study, we suggested an
information system to store, manage and treat millions of gathered patient’s
information. The application is able to fulfill
the most important criterions, mainly measurement, monitoring, guidance, Data
management and their analysis. The developed e-Health system can be
accessed via the Internet. Availability,
confidentiality and security issues arise that have to be considered carefully. The
highest level of availability of these services is required. The main objective
of this paper is to improve and enhance the both aspects of an information
system: availability and
reliability. The information system should be reachable constantly to satisfy the professional requirements. Today, the new
technologies could help to resolve some infrastructure and connection problems.
Connected machines are increasingly being introduced into safety-critical
health care systems. Concretely in this study, we introduced replication,
backup and restoration procedures to obtain a safe and continuous data management system in order to guarantee a highly
reliable concept. By integrating the new technologies, we profited from the
innovative connection utility—Internet of things -,
which offers several possibilities to ensure the continued and desirable
service. By implementing a distributed information system, we were able to
increase the percentage of uptime to 99.8% (down time less than 20 mins/week). The vulnerability and the penetration tests were also successful and demonstrate the
efficiency of the implemented redundancy, replication and restoration
procedures.
KEYWORDS
E-Health, replication, system vulnerability, backup and restoration, availability.
Cite this paper
References