Skip to main content
Top
Published in: Journal of Medical Systems 11/2014

01-11-2014 | Patient Facing Systems

A Privacy Authentication Scheme Based on Cloud for Medical Environment

Authors: Chin-Ling Chen, Tsai-Tung Yang, Mao-Lun Chiang, Tzay-Farn Shih

Published in: Journal of Medical Systems | Issue 11/2014

Login to get access

Abstract

With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients’ privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device’s characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Literature
1.
go back to reference Abor, P. A., and Agrizzi, D., Healthcare governance and patients’ perception of service quality. Annual Conference on Innovations in Business & Management, London, pp. 21–23, 2012. Abor, P. A., and Agrizzi, D., Healthcare governance and patients’ perception of service quality. Annual Conference on Innovations in Business & Management, London, pp. 21–23, 2012.
2.
go back to reference Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012. Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012.
3.
go back to reference Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011. Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011.
4.
go back to reference Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.CrossRef Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.CrossRef
5.
go back to reference Hwang, J. J., Chuang, H. K., Hsu, Y. C., and Wu, C. H., A business model for cloud computing based on a Separate encryption and decryption service. International Conference on Information Science and Applications, Jeju Island, pp. 26–29, 2011. Hwang, J. J., Chuang, H. K., Hsu, Y. C., and Wu, C. H., A business model for cloud computing based on a Separate encryption and decryption service. International Conference on Information Science and Applications, Jeju Island, pp. 26–29, 2011.
6.
go back to reference Pearson, S., Taking account of privacy when designing cloud computing services. Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, pp. 44–52, 2009. Pearson, S., Taking account of privacy when designing cloud computing services. Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, pp. 44–52, 2009.
7.
go back to reference Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.CrossRef Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.CrossRef
8.
go back to reference Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., and Loureiro, S., A security analysis of amazon’s elastic compute cloud service. The 27th Annual ACM Symposium on Applied Computing, Trento, pp. 1427–1434, 2012. Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., and Loureiro, S., A security analysis of amazon’s elastic compute cloud service. The 27th Annual ACM Symposium on Applied Computing, Trento, pp. 1427–1434, 2012.
9.
go back to reference Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.CrossRef Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.CrossRef
10.
go back to reference Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.CrossRef Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.CrossRef
11.
go back to reference Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.CrossRef Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.CrossRef
12.
go back to reference Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012. Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012.
14.
go back to reference Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005. Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005.
15.
go back to reference Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef
16.
go back to reference Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
17.
go back to reference He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
18.
go back to reference Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRef
19.
go back to reference Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.CrossRef
20.
go back to reference Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.CrossRef Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.CrossRef
21.
go back to reference Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.1007/s10916-013-9952-5, 2013. Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.​1007/​s10916-013-9952-5, 2013.
23.
go back to reference Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.1007/s10916-014-0013-5, 2014. Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.​1007/​s10916-014-0013-5, 2014.
24.
go back to reference McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://dx.doi.org/10.5210/fm.v5i8.778, 2000. McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://​dx.​doi.​org/​10.​5210/​fm.​v5i8.​778, 2000.
25.
go back to reference Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.CrossRef Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.CrossRef
26.
go back to reference Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.MathSciNet Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.MathSciNet
27.
go back to reference Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.MathSciNet Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.MathSciNet
28.
29.
go back to reference Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.MathSciNetMATH Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.MathSciNetMATH
30.
go back to reference Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005. Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005.
32.
go back to reference Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T0 spaces. Topol. Appl. 125(3):533–542, 2002.MathSciNetCrossRefMATH Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T0 spaces. Topol. Appl. 125(3):533–542, 2002.MathSciNetCrossRefMATH
Metadata
Title
A Privacy Authentication Scheme Based on Cloud for Medical Environment
Authors
Chin-Ling Chen
Tsai-Tung Yang
Mao-Lun Chiang
Tzay-Farn Shih
Publication date
01-11-2014
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 11/2014
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-014-0143-9

Other articles of this Issue 11/2014

Journal of Medical Systems 11/2014 Go to the issue