Skip to main content
Top
Published in: Journal of Medical Systems 1/2016

01-01-2016 | Mobile Systems

A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems

Authors: Hoon Ko, MoonBae Song

Published in: Journal of Medical Systems | Issue 1/2016

Login to get access

Abstract

Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.
Literature
1.
go back to reference Guo, R., Wen, Q., Jin, Z., and Zhang, H., An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2013(4):1–7, 2013. Guo, R., Wen, Q., Jin, Z., and Zhang, H., An efficient and secure certificateless authentication protocol for healthcare system on wireless medical sensor networks. Int. J. Distrib. Sens. Netw. 2013(4):1–7, 2013.
2.
go back to reference Fragopoulos, A. Gialelis, J. and Serpanos, D. Security framework for pervasive healthcare architectures utilizing MPEG-21 IPMP components, International Journal of Telemedicine and Applications. 2009:1–9, 2009. Fragopoulos, A. Gialelis, J. and Serpanos, D. Security framework for pervasive healthcare architectures utilizing MPEG-21 IPMP components, International Journal of Telemedicine and Applications. 2009:1–9, 2009.
3.
go back to reference Kim, H., Ryu, E.-K., and Lee, S.-W., Security considerations on cognitive radio based on body area networks for u-healthcare. J. Secur. Eng. 10(1):9–20, 2013. Kim, H., Ryu, E.-K., and Lee, S.-W., Security considerations on cognitive radio based on body area networks for u-healthcare. J. Secur. Eng. 10(1):9–20, 2013.
4.
go back to reference Zhang, G.H., Chung, C., Poon, Y., and Zhang, Y.T. A review on body area networks security for healthcare, Int. J. Distrib. Sensors Networks, 2011. Zhang, G.H., Chung, C., Poon, Y., and Zhang, Y.T. A review on body area networks security for healthcare, Int. J. Distrib. Sensors Networks, 2011.
5.
go back to reference Haque, S.A., Aziz, S.M., and Rahman, M. Review of Cyber-Physical System in Healthcare, Int. J. Distrib. Sensors Networks, 2014. Haque, S.A., Aziz, S.M., and Rahman, M. Review of Cyber-Physical System in Healthcare, Int. J. Distrib. Sensors Networks, 2014.
8.
go back to reference Yu, H., He, J., Liu, R., and Ji, D., On the security of data collection and transmission from wireless sensor networks in the context of internet of things. Int. J. Distrib. Sens. Netw. 2013:1–13, 2013. Yu, H., He, J., Liu, R., and Ji, D., On the security of data collection and transmission from wireless sensor networks in the context of internet of things. Int. J. Distrib. Sens. Netw. 2013:1–13, 2013.
10.
go back to reference Ogiela, M. R., and Ogiela, U., Linguistic protocols for secure information management and sharing. Comput. Math. Appl. 63(2):564–572, 2012.CrossRef Ogiela, M. R., and Ogiela, U., Linguistic protocols for secure information management and sharing. Comput. Math. Appl. 63(2):564–572, 2012.CrossRef
11.
go back to reference Ogiela, M.R., Ogiela, U. Linguistic extension for secret sharing (m, n)-threshold Schemes, 2008 International Conference on Security Technology, December 13–15, 2008, Hainan Island, Sanya, China, pp. 125–128, 2008. Ogiela, M.R., Ogiela, U. Linguistic extension for secret sharing (m, n)-threshold Schemes, 2008 International Conference on Security Technology, December 13–15, 2008, Hainan Island, Sanya, China, pp. 125–128, 2008.
12.
go back to reference Ko, H., Chen, N., Marreiros, G., and Ramos, C. Safe high accuracy Context-Aware Matrix (CAM) making based on X.509 proxy certificate, Lecture Notes in Computer Science, pp. 829 ~ 837, Korea University, Seoul, S. Korea, June 25 ~ 27, 2009. Ko, H., Chen, N., Marreiros, G., and Ramos, C. Safe high accuracy Context-Aware Matrix (CAM) making based on X.509 proxy certificate, Lecture Notes in Computer Science, pp. 829 ~ 837, Korea University, Seoul, S. Korea, June 25 ~ 27, 2009.
13.
go back to reference Zhu, Z. A., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.PubMedCrossRef Zhu, Z. A., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.PubMedCrossRef
14.
go back to reference Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.CrossRef Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.CrossRef
15.
go back to reference Cao, T., Zhai, J. Improved dynamic id-based authentication scheme for telecare medical information systems, J. Med. Syst. Vol. 37, No. 2, 2013. Cao, T., Zhai, J. Improved dynamic id-based authentication scheme for telecare medical information systems, J. Med. Syst. Vol. 37, No. 2, 2013.
16.
go back to reference Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.PubMedCrossRef Chen, H.-M., Lo, J.-W., and Yeh, C.-K., An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.PubMedCrossRef
17.
go back to reference Zhang, L., Zhang, F., Wu, Q., and Domingo-Ferrer, J., Simulatable certificateless two-party authenticated key agreement protocol. Inf. Sci. 180(6):1020–1030, 2010.CrossRef Zhang, L., Zhang, F., Wu, Q., and Domingo-Ferrer, J., Simulatable certificateless two-party authenticated key agreement protocol. Inf. Sci. 180(6):1020–1030, 2010.CrossRef
18.
go back to reference Khana, M. K., Kimb, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2010.CrossRef Khana, M. K., Kimb, S.-K., and Alghathbar, K., Cryptanalysis and security enhancement of a more efficient & secure dynamic id-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2010.CrossRef
19.
go back to reference Xiong, H., Chen, Z., and Li, F. G., Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3):1213–1221, 2012.CrossRef Xiong, H., Chen, Z., and Li, F. G., Provably secure and efficient certificateless authenticated tripartite key agreement protocol. Math. Comput. Model. 55(3):1213–1221, 2012.CrossRef
Metadata
Title
A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems
Authors
Hoon Ko
MoonBae Song
Publication date
01-01-2016
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 1/2016
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-015-0365-5

Other articles of this Issue 1/2016

Journal of Medical Systems 1/2016 Go to the issue