Skip to main content
Top
Published in: Journal of Medical Systems 4/2016

01-04-2016 | Patient Facing Systems

Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment

Authors: Shin-Yan Chiou, Zhaoqin Ying, Junqiang Liu

Published in: Journal of Medical Systems | Issue 4/2016

Login to get access

Abstract

Medical systems allow patients to receive care at different hospitals. However, this entails considerable inconvenience through the need to transport patients and their medical records between hospitals. The development of Telecare Medicine Information Systems (TMIS) makes it easier for patients to seek medical treatment and to store and access medical records. However, medical data stored in TMIS is not encrypted, leaving patients’ private data vulnerable to external leaks. In 2014, scholars proposed a new cloud-based medical information model and authentication scheme which would not only allow patients to remotely access medical services but also protects patient privacy. However, this scheme still fails to provide patient anonymity and message authentication. Furthermore, this scheme only stores patient medical data, without allowing patients to directly access medical advice. Therefore, we propose a new authentication scheme, which provides anonymity, unlinkability, and message authentication, and allows patients to directly and remotely consult with doctors. In addition, our proposed scheme is more efficient in terms of computation cost. The proposed system was implemented in Android system to demonstrate its workability.
Literature
1.
go back to reference He, C. H., Jin, X., Zhao, Z.X., and Xiang, T., A Cloud Computing Solution for Hospital Information System. Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on. 2:517–520, 2010. He, C. H., Jin, X., Zhao, Z.X., and Xiang, T., A Cloud Computing Solution for Hospital Information System. Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on. 2:517–520, 2010.
2.
go back to reference Toyoda, K., Standardization and security for the EMR. Int. J. Med. Inform. 48(1–3):57–60, 1998.CrossRefPubMed Toyoda, K., Standardization and security for the EMR. Int. J. Med. Inform. 48(1–3):57–60, 1998.CrossRefPubMed
3.
go back to reference Yeo, K., Lee, K., Kim, J. M., Kim, T. H., Choi, Y. H., Jeong, W. J., Hwang, H., Baek, R. M. and Yoo, S., Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities. Healthcare Inform. Res. 18(2):125–135, 2012. doi:10.4258/hir.2012.18.2.125. Yeo, K., Lee, K., Kim, J. M., Kim, T. H., Choi, Y. H., Jeong, W. J., Hwang, H., Baek, R. M. and Yoo, S., Pitfalls and Security Measures for the Mobile EMR System in Medical Facilities. Healthcare Inform. Res. 18(2):125–135, 2012. doi:10.​4258/​hir.​2012.​18.​2.​125.
4.
go back to reference Mishra, D., On the security flaws in ID-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2015.CrossRefPubMed Mishra, D., On the security flaws in ID-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2015.CrossRefPubMed
5.
go back to reference Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):1–8, 2015.CrossRef Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):1–8, 2015.CrossRef
6.
go back to reference Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRefPubMed Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRefPubMed
7.
go back to reference He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
8.
go back to reference Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRefPubMed Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRefPubMed
9.
go back to reference Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.CrossRefPubMed Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.CrossRefPubMed
11.
go back to reference Jiang, Q., Ma, J., Lu, X., et al., Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38(2):1–8, 2014.CrossRef Jiang, Q., Ma, J., Lu, X., et al., Robust Chaotic Map-based Authentication and Key Agreement Scheme with Strong Anonymity for Telecare Medicine Information Systems. J. Med. Syst. 38(2):1–8, 2014.CrossRef
12.
go back to reference Mishra, D., Srinivas, J., and Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):1–10, 2014.CrossRef Mishra, D., Srinivas, J., and Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10):1–10, 2014.CrossRef
13.
go back to reference Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200–204, 2013. Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200–204, 2013.
14.
go back to reference Yan, P., Li, W., Li, P., et al., A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37(5):537–550, 2013.CrossRef Yan, P., Li, W., Li, P., et al., A Secure Biometrics-based Authentication Scheme for Telecare Medicine Information Systems. J. Med. Syst. 37(5):537–550, 2013.CrossRef
15.
go back to reference Mishra, D., Mukhopadhyay, S., Chaturvedi, A., et al., Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1–12, 2014.CrossRef Mishra, D., Mukhopadhyay, S., Chaturvedi, A., et al., Cryptanalysis and improvement of Yan et al.’s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1–12, 2014.CrossRef
16.
go back to reference Padhy, R. P., Patra, M. R., and Satapathy, S. C., Design and Implementation of a Cloud based Rural Healthcare Information System Model. Univ. J. Appl. Comput. Sci. Technol. 2(1):149–157, 2012. Padhy, R. P., Patra, M. R., and Satapathy, S. C., Design and Implementation of a Cloud based Rural Healthcare Information System Model. Univ. J. Appl. Comput. Sci. Technol. 2(1):149–157, 2012.
17.
go back to reference Banerjee, A., Agrawal, P., and Rajkumar, R., Design of a Cloud Based Emergency Healthcare Service Model. Int. J. Appl. Eng. Res. 8(19):2013, (2013). Banerjee, A., Agrawal, P., and Rajkumar, R., Design of a Cloud Based Emergency Healthcare Service Model. Int. J. Appl. Eng. Res. 8(19):2013, (2013).
18.
go back to reference Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.CrossRef Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.CrossRef
21.
go back to reference Amin, R., and Biswas, G. P., A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3):1–17, 2015.CrossRef Amin, R., and Biswas, G. P., A novel user authentication and key agreement protocol for accessing multi-medical server usable in TMIS. J. Med. Syst. 39(3):1–17, 2015.CrossRef
22.
23.
go back to reference Bellare, M., and Rogaway, P., Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the First ACM conference on Computer and communications security. 62–73, 1993. Bellare, M., and Rogaway, P., Random oracles are practical: A paradigm for designing efficient protocols. Proceedings of the First ACM conference on Computer and communications security. 62–73, 1993.
24.
go back to reference Mishra D., Das A. K., and Mukhopadhyay S., A secure and efficient ECC-based user anonymitypreserving session initiation authentication protocol using smart card. Peer-to-peer networking and applications. 9(1):171–192, 2016. Mishra D., Das A. K., and Mukhopadhyay S., A secure and efficient ECC-based user anonymitypreserving session initiation authentication protocol using smart card. Peer-to-peer networking and applications. 9(1):171–192, 2016.
Metadata
Title
Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment
Authors
Shin-Yan Chiou
Zhaoqin Ying
Junqiang Liu
Publication date
01-04-2016
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 4/2016
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-016-0453-1

Other articles of this Issue 4/2016

Journal of Medical Systems 4/2016 Go to the issue