Skip to main content
Top
Published in: Journal of Medical Systems 2/2012

01-04-2012 | Original Paper

A Password-Based User Authentication Scheme for the Integrated EPR Information System

Authors: Zhen-Yu Wu, Yufang Chung, Feipei Lai, Tzer-Shyong Chen

Published in: Journal of Medical Systems | Issue 2/2012

Login to get access

Abstract

With the rapid development of the Internet, digitization and electronic orientation are required in various applications of our daily life. For e-medicine, establishing Electronic patient records (EPRs) for all the patients has become the top issue during the last decade. Simultaneously, constructing an integrated EPR information system of all the patients is beneficial because it can provide medical institutions and the academia with most of the patients’ information in details for them to make correct decisions and clinical decisions, to maintain and analyze patients’ health. Also beneficial to doctors and scholars, the EPR system can give them record linkage for researches, payment audits, or other services bound to be developed and integrated into medicine. To tackle the illegal access and to prevent the information from theft during transmission over the insecure Internet, we propose a password-based user authentication scheme suitable for information integration.
Literature
1.
go back to reference Takeda, H., Matsumura, Y., and Kuwata, S., Architecture for networked electronic patient record systems. Int. J. Med. Inform. 60(2):161–167, 2000.CrossRef Takeda, H., Matsumura, Y., and Kuwata, S., Architecture for networked electronic patient record systems. Int. J. Med. Inform. 60(2):161–167, 2000.CrossRef
2.
go back to reference Chan, A. T. S., Cao, J., Chan, H., and Young, G., A web-enabled framework for smart card application in health services. Commun. ACM 44(9):77–82, 2001.CrossRef Chan, A. T. S., Cao, J., Chan, H., and Young, G., A web-enabled framework for smart card application in health services. Commun. ACM 44(9):77–82, 2001.CrossRef
3.
go back to reference Wang, D. W., Liu, D. R., and Chen, Y. C., A mechanism to verify the integrity of computer-based patient records. J. China Assoc. Med. Inform. 10:71–84, 1999. Wang, D. W., Liu, D. R., and Chen, Y. C., A mechanism to verify the integrity of computer-based patient records. J. China Assoc. Med. Inform. 10:71–84, 1999.
4.
go back to reference Gritzalis, S., Lambrinoudakis, C., Lekkas, D., and Deftereos, S., Technicl guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. 9(3):413–423, 2005.CrossRef Gritzalis, S., Lambrinoudakis, C., Lekkas, D., and Deftereos, S., Technicl guidelines for enhancing privacy and data protection in modern electronic medical environments. IEEE Trans. Inf. Technol. Biomed. 9(3):413–423, 2005.CrossRef
5.
go back to reference Dolin, R. H., Alschuler, L., Beebe, C., Biron, P. V., Boyer, S. L., Essin, D., Kimber, E., Lincoln, T., and Mattison, J. E., The HL7 clinical document architecture. J. Am. Med. Inform. Assoc. 8(6), 2001. Dolin, R. H., Alschuler, L., Beebe, C., Biron, P. V., Boyer, S. L., Essin, D., Kimber, E., Lincoln, T., and Mattison, J. E., The HL7 clinical document architecture. J. Am. Med. Inform. Assoc. 8(6), 2001.
6.
go back to reference Huston, T., Security issues for implementation of E-Medical records. Commun ACM 44(9), 2001. Huston, T., Security issues for implementation of E-Medical records. Commun ACM 44(9), 2001.
7.
go back to reference Ball, E., Chadwick, D. W., and Mundy, D., Patient privacy in electronic prescription transfer. IEEE Secur. & Privacy Mag. 1(2):77–80, 2003.CrossRef Ball, E., Chadwick, D. W., and Mundy, D., Patient privacy in electronic prescription transfer. IEEE Secur. & Privacy Mag. 1(2):77–80, 2003.CrossRef
8.
go back to reference Yang, Y., Han, X., Bao, F., and Deng, R. H., A smart-card-enabled privacy preserving E-Prescription system. IEEE Trans. Inf. Technol. Biomed. 8(1):47–58, 2004.CrossRef Yang, Y., Han, X., Bao, F., and Deng, R. H., A smart-card-enabled privacy preserving E-Prescription system. IEEE Trans. Inf. Technol. Biomed. 8(1):47–58, 2004.CrossRef
9.
go back to reference Um, K. S., Kwak, Y. S., Cho, H., and Kim, I. K., Development of an HL7 interface engine, based on tree structure and streaming algorithm, for large-size messages which include image data. Comput. Meth. Programs Biomed. 80:126–140, 2005.CrossRef Um, K. S., Kwak, Y. S., Cho, H., and Kim, I. K., Development of an HL7 interface engine, based on tree structure and streaming algorithm, for large-size messages which include image data. Comput. Meth. Programs Biomed. 80:126–140, 2005.CrossRef
10.
go back to reference Ping, X.-O., Ko, L.-F., Shang, R.-J., and Lai, F., Dynamic Messages Creation Method for HL7 Based Healthcare Information System. HEALTHCOM 2007, 2007. Ping, X.-O., Ko, L.-F., Shang, R.-J., and Lai, F., Dynamic Messages Creation Method for HL7 Based Healthcare Information System. HEALTHCOM 2007, 2007.
11.
go back to reference Hsieh, J.-C., A novel DICOM-based 12-lead electrocardiogram documentary system. J. Electrocardiol. 40:S81–S87, 2007. Hsieh, J.-C., A novel DICOM-based 12-lead electrocardiogram documentary system. J. Electrocardiol. 40:S81–S87, 2007.
12.
go back to reference Dolin, R. H., Rishel, W., Biron, P. V., Spinosa, J., and Mattison, J. E., SGML and XML as Interchange Formats for HL7 Messages. J. Am. Med. Inform. Assoc. 1998. Dolin, R. H., Rishel, W., Biron, P. V., Spinosa, J., and Mattison, J. E., SGML and XML as Interchange Formats for HL7 Messages. J. Am. Med. Inform. Assoc. 1998.
13.
go back to reference McAuliffe, M. J., Lalonde, F. M., McGarry, D., Gandler, W., Csaky, K., and Trus, B. L., Medical image processing, Analysis and visualization in clinical research. CBMS 2001. Proceedings. 14th IEEE Symposium.:381–386, 2001. McAuliffe, M. J., Lalonde, F. M., McGarry, D., Gandler, W., Csaky, K., and Trus, B. L., Medical image processing, Analysis and visualization in clinical research. CBMS 2001. Proceedings. 14th IEEE Symposium.:381–386, 2001.
14.
go back to reference Pereira, J., Lamelo, A., and Vazquez-Naya, I. M., Design and implementation of a DICOM PACS with secure access via Internet. Proceedings of the 23 rd Annual EMBS International Conference.:3724–3727, 2001. Pereira, J., Lamelo, A., and Vazquez-Naya, I. M., Design and implementation of a DICOM PACS with secure access via Internet. Proceedings of the 23 rd Annual EMBS International Conference.:3724–3727, 2001.
15.
go back to reference Lu, R., Cao, Z., Chai, Z., and Liang, X., A simple user authentication scheme for grid computing. Int. J. Netw. Secur. 7(2):202–206, 2008. Lu, R., Cao, Z., Chai, Z., and Liang, X., A simple user authentication scheme for grid computing. Int. J. Netw. Secur. 7(2):202–206, 2008.
16.
go back to reference Chen, C.-L., Chen, Y.-Y., and Chen, Y.-H., Group-based authentication to protect digital content for business applications. Int. J. Innovative Comput. Inf. Control 5(5):1243–1251, 2009. Chen, C.-L., Chen, Y.-Y., and Chen, Y.-H., Group-based authentication to protect digital content for business applications. Int. J. Innovative Comput. Inf. Control 5(5):1243–1251, 2009.
17.
go back to reference Zhang, L.-J., and Zhou, Q., CCOA: Cloud computing open architecture. ICWS 2009:607–616, 2009. Zhang, L.-J., and Zhou, Q., CCOA: Cloud computing open architecture. ICWS 2009:607–616, 2009.
18.
go back to reference Lamport, L., Password authentication with insecure communication. Commun. ACM. 24, 1981. Lamport, L., Password authentication with insecure communication. Commun. ACM. 24, 1981.
19.
go back to reference Ateniese, G., Cutmola, R., de Meideiros, B., and Davis, D., Medical information privacy assurance: Cryptographic and system aspects. Third Conference on Security in Communication Networks, 2002. Ateniese, G., Cutmola, R., de Meideiros, B., and Davis, D., Medical information privacy assurance: Cryptographic and system aspects. Third Conference on Security in Communication Networks, 2002.
20.
go back to reference Rash, M. C., Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area, April 4, 2005. Rash, M. C., Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area, April 4, 2005.
21.
go back to reference Yee, G., Korba, L., and Song, R., Ensuring privacy for E-health services, In Proceedings of the First International Conference on Availability, Reliability and Security, 2006. Yee, G., Korba, L., and Song, R., Ensuring privacy for E-health services, In Proceedings of the First International Conference on Availability, Reliability and Security, 2006.
22.
go back to reference Lin, C. H., and Lai, Y. Y., A flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces 27(1):19–23, 2004.CrossRef Lin, C. H., and Lai, Y. Y., A flexible biometrics remote user authentication scheme. Comput. Stand. Interfaces 27(1):19–23, 2004.CrossRef
23.
go back to reference Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef Lee, N. Y., and Chiu, Y. C., Improved remote authentication scheme with smart card. Comput. Stand. Interfaces 27(2):177–180, 2005.CrossRef
24.
go back to reference Wang, Y. Y., Liu, J. Y., Xiao, F. X., and Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32:583–585, 2009.CrossRef Wang, Y. Y., Liu, J. Y., Xiao, F. X., and Dan, J., A more efficient and secure dynamic ID-based remote user authentication scheme. Comput. Commun. 32:583–585, 2009.CrossRef
25.
go back to reference Yoon, E., and Yoo, K., An efficient password authentication schemes without using the server public key for grid computing. GCC 2005, LNCS 3795, 149–154, 2005. Yoon, E., and Yoo, K., An efficient password authentication schemes without using the server public key for grid computing. GCC 2005, LNCS 3795, 149–154, 2005.
26.
go back to reference Foster, I., and Kesselman, C., The grid: Blueprint for a new computing infrastructure. 2nd revised edition, Morgan Kaufmann Publishers In, 2003. Foster, I., and Kesselman, C., The grid: Blueprint for a new computing infrastructure. 2nd revised edition, Morgan Kaufmann Publishers In, 2003.
27.
go back to reference Schneier, B., and Shostack, A., Breaking up is hard to do: Modeling security threats for smart cards. Proceedings of USENIX Workshop on Smart Card Technology. 175–185, 1999. Schneier, B., and Shostack, A., Breaking up is hard to do: Modeling security threats for smart cards. Proceedings of USENIX Workshop on Smart Card Technology. 175–185, 1999.
28.
go back to reference Stallings, W., Cryptography and network security, principles and practice. 3 rd Edition. Prentice Hall, 2003. Stallings, W., Cryptography and network security, principles and practice. 3 rd Edition. Prentice Hall, 2003.
29.
go back to reference Snyder, A. M., and Weaver, A. C., The e-logistics of securing distributed medical data. INDIN 2003. 207–216, 2003. Snyder, A. M., and Weaver, A. C., The e-logistics of securing distributed medical data. INDIN 2003. 207–216, 2003.
30.
go back to reference Rankl, W., and Effing, W., Smart card handbook. John Wiley & Sons, ISBN 0-471-96720-3, 1997. Rankl, W., and Effing, W., Smart card handbook. John Wiley & Sons, ISBN 0-471-96720-3, 1997.
31.
Metadata
Title
A Password-Based User Authentication Scheme for the Integrated EPR Information System
Authors
Zhen-Yu Wu
Yufang Chung
Feipei Lai
Tzer-Shyong Chen
Publication date
01-04-2012
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2012
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-010-9527-7

Other articles of this Issue 2/2012

Journal of Medical Systems 2/2012 Go to the issue