Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A Privacy Authentication Scheme Based on Cloud for Medical Environment

  • Patient Facing Systems
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients’ privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device’s characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Abor, P. A., and Agrizzi, D., Healthcare governance and patients’ perception of service quality. Annual Conference on Innovations in Business & Management, London, pp. 21–23, 2012.

    Google Scholar 

  2. Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012.

    Google Scholar 

  3. Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011.

    Google Scholar 

  4. Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.

    Article  Google Scholar 

  5. Hwang, J. J., Chuang, H. K., Hsu, Y. C., and Wu, C. H., A business model for cloud computing based on a Separate encryption and decryption service. International Conference on Information Science and Applications, Jeju Island, pp. 26–29, 2011.

    Google Scholar 

  6. Pearson, S., Taking account of privacy when designing cloud computing services. Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, pp. 44–52, 2009.

    Google Scholar 

  7. Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.

    Article  Google Scholar 

  8. Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., and Loureiro, S., A security analysis of amazon’s elastic compute cloud service. The 27th Annual ACM Symposium on Applied Computing, Trento, pp. 1427–1434, 2012.

    Google Scholar 

  9. Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.

    Article  Google Scholar 

  10. Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.

    Article  Google Scholar 

  11. Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.

    Article  Google Scholar 

  12. Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012.

    Google Scholar 

  13. IHS iSuppli web site: http://www.ihs.com/products/electronics-media/isuppli.aspx

  14. Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005.

    Google Scholar 

  15. Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.

    Article  Google Scholar 

  16. Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.

    Article  Google Scholar 

  17. He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.

    Article  Google Scholar 

  18. Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.

    Article  Google Scholar 

  19. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.

    Article  Google Scholar 

  20. Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.

    Article  Google Scholar 

  21. Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.1007/s10916-013-9952-5, 2013.

  22. Chen, C. L., and Yang, T. T., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 2014. doi:10.1007/s10916-014-0112-3.

    Google Scholar 

  23. Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.1007/s10916-014-0013-5, 2014.

  24. McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://dx.doi.org/10.5210/fm.v5i8.778, 2000.

  25. Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.

    Article  Google Scholar 

  26. Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.

    MathSciNet  Google Scholar 

  27. Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.

    MathSciNet  Google Scholar 

  28. Hess, F., Efficient identity based signature schemes based on pairings. Sel. Areas Crypt 2595:310–324, 2003.

    Article  MathSciNet  Google Scholar 

  29. Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.

    MathSciNet  MATH  Google Scholar 

  30. Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005.

  31. Johnson, D., and Menezes, A., The Elliptic Curve Digital Signature Algorithm (ECDSA). Tech. rep. CORR 99–34, Department of C & O, University of Waterloo, http://cacr.math.waterloo.ca, 1999.

  32. Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T0 spaces. Topol. Appl. 125(3):533–542, 2002.

    Article  MathSciNet  MATH  Google Scholar 

  33. X.509 certificate - Wikipedia, http://en.wikipedia.org/wiki/X.509, access available on 10 May 2014.

  34. Ministry of Health and Welfare in Taiwan, http://www.mohw.gov.tw/EN/Ministry/Index.aspx, access available on 10 May 2014.

  35. Third generation of mobile telecommunications technology - Wikipedia, http://en.wikipedia.org/wiki/3G, access available on 10 May 2014.

Download references

Acknowledgments

This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract number MOST 103-2221-E-324-023, MOST103-2632-E-324-001-MY3 and MOST 103-2221-E-324-022.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Ling Chen.

Additional information

This article is part of the Topical Collection on Patient Facing Systems

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, CL., Yang, TT., Chiang, ML. et al. A Privacy Authentication Scheme Based on Cloud for Medical Environment. J Med Syst 38, 143 (2014). https://doi.org/10.1007/s10916-014-0143-9

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-014-0143-9

Keywords

Navigation