Skip to main content
Erschienen in: Journal of Medical Systems 11/2014

01.11.2014 | Patient Facing Systems

A Privacy Authentication Scheme Based on Cloud for Medical Environment

verfasst von: Chin-Ling Chen, Tsai-Tung Yang, Mao-Lun Chiang, Tzay-Farn Shih

Erschienen in: Journal of Medical Systems | Ausgabe 11/2014

Einloggen, um Zugang zu erhalten

Abstract

With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients’ privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device’s characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Literatur
1.
Zurück zum Zitat Abor, P. A., and Agrizzi, D., Healthcare governance and patients’ perception of service quality. Annual Conference on Innovations in Business & Management, London, pp. 21–23, 2012. Abor, P. A., and Agrizzi, D., Healthcare governance and patients’ perception of service quality. Annual Conference on Innovations in Business & Management, London, pp. 21–23, 2012.
2.
Zurück zum Zitat Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012. Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012.
3.
Zurück zum Zitat Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011. Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011.
4.
Zurück zum Zitat Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.CrossRef Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.CrossRef
5.
Zurück zum Zitat Hwang, J. J., Chuang, H. K., Hsu, Y. C., and Wu, C. H., A business model for cloud computing based on a Separate encryption and decryption service. International Conference on Information Science and Applications, Jeju Island, pp. 26–29, 2011. Hwang, J. J., Chuang, H. K., Hsu, Y. C., and Wu, C. H., A business model for cloud computing based on a Separate encryption and decryption service. International Conference on Information Science and Applications, Jeju Island, pp. 26–29, 2011.
6.
Zurück zum Zitat Pearson, S., Taking account of privacy when designing cloud computing services. Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, pp. 44–52, 2009. Pearson, S., Taking account of privacy when designing cloud computing services. Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, pp. 44–52, 2009.
7.
Zurück zum Zitat Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.CrossRef Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.CrossRef
8.
Zurück zum Zitat Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., and Loureiro, S., A security analysis of amazon’s elastic compute cloud service. The 27th Annual ACM Symposium on Applied Computing, Trento, pp. 1427–1434, 2012. Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., and Loureiro, S., A security analysis of amazon’s elastic compute cloud service. The 27th Annual ACM Symposium on Applied Computing, Trento, pp. 1427–1434, 2012.
9.
Zurück zum Zitat Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.CrossRef Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.CrossRef
10.
Zurück zum Zitat Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.CrossRef Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.CrossRef
11.
Zurück zum Zitat Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.CrossRef Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.CrossRef
12.
Zurück zum Zitat Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012. Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012.
14.
Zurück zum Zitat Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005. Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005.
15.
Zurück zum Zitat Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef
16.
Zurück zum Zitat Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
17.
Zurück zum Zitat He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
18.
Zurück zum Zitat Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef
19.
Zurück zum Zitat Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
20.
Zurück zum Zitat Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.CrossRef Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.CrossRef
21.
Zurück zum Zitat Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.1007/s10916-013-9952-5, 2013. Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.​1007/​s10916-013-9952-5, 2013.
23.
Zurück zum Zitat Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.1007/s10916-014-0013-5, 2014. Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.​1007/​s10916-014-0013-5, 2014.
24.
Zurück zum Zitat McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://dx.doi.org/10.5210/fm.v5i8.778, 2000. McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://​dx.​doi.​org/​10.​5210/​fm.​v5i8.​778, 2000.
25.
Zurück zum Zitat Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.CrossRef Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.CrossRef
26.
Zurück zum Zitat Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.MathSciNet Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.MathSciNet
27.
Zurück zum Zitat Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.MathSciNet Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.MathSciNet
28.
Zurück zum Zitat Hess, F., Efficient identity based signature schemes based on pairings. Sel. Areas Crypt 2595:310–324, 2003.MathSciNetCrossRef Hess, F., Efficient identity based signature schemes based on pairings. Sel. Areas Crypt 2595:310–324, 2003.MathSciNetCrossRef
29.
Zurück zum Zitat Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.MathSciNetMATH Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.MathSciNetMATH
30.
Zurück zum Zitat Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005. Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005.
31.
32.
Zurück zum Zitat Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T0 spaces. Topol. Appl. 125(3):533–542, 2002.MathSciNetCrossRefMATH Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T0 spaces. Topol. Appl. 125(3):533–542, 2002.MathSciNetCrossRefMATH
Metadaten
Titel
A Privacy Authentication Scheme Based on Cloud for Medical Environment
verfasst von
Chin-Ling Chen
Tsai-Tung Yang
Mao-Lun Chiang
Tzay-Farn Shih
Publikationsdatum
01.11.2014
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 11/2014
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0143-9

Weitere Artikel der Ausgabe 11/2014

Journal of Medical Systems 11/2014 Zur Ausgabe