Network Security Framework Design for Campus Health Management Systems: A Case Study of Xiamen Nanyang Vocational College
DOI:
https://doi.org/10.71222/3c45ja70Keywords:
multi-layered defense, compliance, campus health management system, data encryption, deep defense, Xiamen Nanyang Vocational CollegeAbstract
In recent years, campus health management systems have become essential for managing the health and well-being of students. However, with the increasing digitization of student health data, these systems have become prime targets for cyberattacks. This paper designs a robust network security framework to protect sensitive health data, emphasizing a multi-layered, deep defense approach. The framework incorporates advanced technologies such as Multi-Factor Authentication (MFA), data encryption, and real-time monitoring, ensuring that campus health management systems can safeguard data integrity and privacy effectively. The study also demonstrates how this framework significantly enhances system security and data protection, with a case study from Xiamen Nanyang Vocational College showing a 30% reduction in data breaches post-implementation. By integrating compliance and dynamic adaptation into the design, this framework offers an innovative solution to campus health management security challenges.
References
1. M. K. Kabier, A. A. Yassin, and Z. A. Abduljabbar, "Towards designing educational systems using role-based access control," Int. J. Intell. Eng. Syst., vol. 16, no. 2, pp. 50-63, 2023, doi: 10.22266/ijies2023.0430.05.
2. M. Khan, T. Naz, and M. A. H. Medani, "A multi-layered security model for learning management system," Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 12, 2019, doi: 10.14569/IJACSA.2019.0101229.
3. P. R. Naidu, V. D. Gowda, U. S. Mali, S. Mallikarjun, and S. R. Kawale, "Cloud-based multi-layer security framework for pro-tecting e-health records," in Proc. 2023 Int. Conf. Artif. Intell. Innov. Healthcare Ind. (ICAIIHI), vol. 1, pp. 1-7, Dec. 2023, doi: 10.1109/ICAIIHI57871.2023.10489781.
4. F. K. B. Ablao and R. N. Monreal, "A framework for the development of sharing and collaboration of cyber threat intelligence for colleges in Camarines Norte," Nanotechnol. Percept., vol. 20, no. S2, pp. 369–376, May 2024, doi: 10.62441/nano-ntp.v20iS2.27.
5. Y. Zheng and Y. Chen, "Design and implementation of college students' physical health management platform based on mobile internet," in Proc. 2021 16th Int. Conf. Comput. Sci. Educ. (ICCSE), Aug. 2021, pp. 988-993. IEEE, doi: 10.1109/ICCSE51940.2021.9569572.
6. S. Parveen, A. Sultan, and M. A. Khan, "Integration of identity governance and management framework within universities for privileged users," Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 6, 2021, doi: 10.14569/IJACSA.2021.0120664.
7. A. Rehman, K. Haseeb, T. Saba, G. Jeon, and S. Al-Otaibi, "Multi-layer secured edge-AI enabled model for consumer health systems," IEEE Trans. Consum. Electron., 2025, doi: 10.1109/TCE.2025.3555957.
8. G. Andronikidis, C. Eleftheriadis, Z. Batzos, K. Kyranou, N. Maropoulos, G. Sargsyan, and P. Sarigiannidis, "AI-driven anom-aly and intrusion detection in energy systems: Current trends and future direction," in Proc. 2024 IEEE Int. Conf. Cyber Security Resil. (CSR), Sept. 2024, pp. 777-782, doi: 10.1109/CSR61664.2024.10679380.
9. S. Safdar and S. Gabrael, "The integration of blockchain and artificial intelligence for secure healthcare systems," arXiv preprint arXiv:2501.02169, 2025, doi: 10.48550/arXiv.2501.02169.
10. R. Shinde, S. Patil, K. Kotecha, V. Potdar, G. Selvachandran, and A. Abraham, "Securing AI-based healthcare systems using blockchain technology: A state-of-the-art systematic literature review and future research directions," Trans. Emerg. Telecommun. Technol., vol. 35, no. 1, p. e4884, 2024, doi: 10.1002/ett.4884.
11. A. M. Perumal and E. R. S. Nadar, "Architectural framework of a group key management system for enhancing e-healthcare data security," Healthcare Technol. Lett., vol. 7, no. 1, pp. 13-17, 2020, doi: 10.1049/htl.2018.5114.
12. O. Pantelic, K. Jovic, and S. Krstovic, "Cookies implementation analysis and the impact on user privacy regarding GDPR and CCPA regulations," Sustainability, vol. 14, no. 9, p. 5015, 2022, doi: 10.3390/su14095015.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Mengxian Wang, Shigen Zhong (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.