Skip to main content
Erschienen in: Journal of Medical Systems 1/2016

01.01.2016 | Mobile Systems

A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems

verfasst von: Hoon Ko, MoonBae Song

Erschienen in: Journal of Medical Systems | Ausgabe 1/2016

Einloggen, um Zugang zu erhalten

Abstract

Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
Literatur
1.
Zurück zum Zitat Guo, R., Wen, Q., Jin, Z., and Zhang, H., An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2013(4):1–7, 2013. Guo, R., Wen, Q., Jin, Z., and Zhang, H., An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2013(4):1–7, 2013.
2.
Zurück zum Zitat Fragopoulos, A. Gialelis, J. and Serpanos, D. Security framework for pervasive healthcare architectures utilizing MPEG-21 IPMP components, International Journal of Telemedicine and Applications. 2009:1–9, 2009. Fragopoulos, A. Gialelis, J. and Serpanos, D. Security framework for pervasive healthcare architectures utilizing MPEG-21 IPMP components, International Journal of Telemedicine and Applications. 2009:1–9, 2009.
3.
Zurück zum Zitat Kim, H., Ryu, E.-K., and Lee, S.-W., Security considerations on cognitive radio based on body area networks for u-healthcare. J. Secur. Eng. 10(1):9–20, 2013. Kim, H., Ryu, E.-K., and Lee, S.-W., Security considerations on cognitive radio based on body area networks for u-healthcare. J. Secur. Eng. 10(1):9–20, 2013.
4.
Zurück zum Zitat Zhang, G.H., Chung, C., Poon, Y., and Zhang, Y.T. A review on body area networks security for healthcare, Int. J. Distrib. Sensors Networks, 2011. Zhang, G.H., Chung, C., Poon, Y., and Zhang, Y.T. A review on body area networks security for healthcare, Int. J. Distrib. Sensors Networks, 2011.
5.
Zurück zum Zitat Haque, S.A., Aziz, S.M., and Rahman, M. Review of Cyber-Physical System in Healthcare, Int. J. Distrib. Sensors Networks, 2014. Haque, S.A., Aziz, S.M., and Rahman, M. Review of Cyber-Physical System in Healthcare, Int. J. Distrib. Sensors Networks, 2014.
8.
Zurück zum Zitat Yu, H., He, J., Liu, R., and Ji, D., On the security of data collection and transmission from wireless sensor networks in the context of internet of things. Int. J. Distrib. Sens. Netw. 2013:1–13, 2013. Yu, H., He, J., Liu, R., and Ji, D., On the security of data collection and transmission from wireless sensor networks in the context of internet of things. Int. J. Distrib. Sens. Netw. 2013:1–13, 2013.
10.
Zurück zum Zitat Ogiela, M. R., and Ogiela, U., Linguistic protocols for secure information management and sharing. Comput. Math. Appl. 63(2):564–572, 2012.CrossRef Ogiela, M. R., and Ogiela, U., Linguistic protocols for secure information management and sharing. Comput. Math. Appl. 63(2):564–572, 2012.CrossRef
11.
Zurück zum Zitat Ogiela, M.R., Ogiela, U. Linguistic extension for secret sharing (m, n)-threshold Schemes, 2008 International Conference on Security Technology, December 13–15, 2008, Hainan Island, Sanya, China, pp. 125–128, 2008. Ogiela, M.R., Ogiela, U. Linguistic extension for secret sharing (m, n)-threshold Schemes, 2008 International Conference on Security Technology, December 13–15, 2008, Hainan Island, Sanya, China, pp. 125–128, 2008.
12.
Zurück zum Zitat Ko, H., Chen, N., Marreiros, G., and Ramos, C. Safe high accuracy Context-Aware Matrix (CAM) making based on X.509 proxy certificate, Lecture Notes in Computer Science, pp. 829 ~ 837, Korea University, Seoul, S. Korea, June 25 ~ 27, 2009. Ko, H., Chen, N., Marreiros, G., and Ramos, C. Safe high accuracy Context-Aware Matrix (CAM) making based on X.509 proxy certificate, Lecture Notes in Computer Science, pp. 829 ~ 837, Korea University, Seoul, S. Korea, June 25 ~ 27, 2009.
13.
Zurück zum Zitat Zhu, Z. A., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.PubMedCrossRef Zhu, Z. A., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.PubMedCrossRef
14.
Zurück zum Zitat Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.CrossRef Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.CrossRef
15.
Zurück zum Zitat Cao, T., Zhai, J. Improved dynamic id-based authentication scheme for telecare medical information systems, J. Med. Syst. Vol. 37, No. 2, 2013. Cao, T., Zhai, J. Improved dynamic id-based authentication scheme for telecare medical information systems, J. Med. Syst. Vol. 37, No. 2, 2013.
16.
Zurück zum Zitat Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.PubMedCrossRef Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.PubMedCrossRef
17.
Zurück zum Zitat Zhang, L., Zhang, F., Wu, Q., and Domingo-Ferrer, J., Simulatable certificateless two-party authenticated key agreement protocol. Inf. Sci. 180(6):1020–1030, 2010.CrossRef Zhang, L., Zhang, F., Wu, Q., and Domingo-Ferrer, J., Simulatable certificateless two-party authenticated key agreement protocol. Inf. Sci. 180(6):1020–1030, 2010.CrossRef
18.
Zurück zum Zitat Khana, M. K., Kimb, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2010.CrossRef Khana, M. K., Kimb, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2010.CrossRef
19.
Zurück zum Zitat Xiong, H., Chen, Z., and Li, F. G., Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3):1213–1221, 2012.CrossRef Xiong, H., Chen, Z., and Li, F. G., Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3):1213–1221, 2012.CrossRef
Metadaten
Titel
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems
verfasst von
Hoon Ko
MoonBae Song
Publikationsdatum
01.01.2016
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 1/2016
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0365-5

Weitere Artikel der Ausgabe 1/2016

Journal of Medical Systems 1/2016 Zur Ausgabe