Abstract
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients’ privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device’s characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Similar content being viewed by others
References
Abor, P. A., and Agrizzi, D., Healthcare governance and patients’ perception of service quality. Annual Conference on Innovations in Business & Management, London, pp. 21–23, 2012.
Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012.
Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011.
Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.
Hwang, J. J., Chuang, H. K., Hsu, Y. C., and Wu, C. H., A business model for cloud computing based on a Separate encryption and decryption service. International Conference on Information Science and Applications, Jeju Island, pp. 26–29, 2011.
Pearson, S., Taking account of privacy when designing cloud computing services. Workshop on Software Engineering Challenges of Cloud Computing, Vancouver, pp. 44–52, 2009.
Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.
Balduzzi, M., Zaddach, J., Balzarotti, D., Kirda, E., and Loureiro, S., A security analysis of amazon’s elastic compute cloud service. The 27th Annual ACM Symposium on Applied Computing, Trento, pp. 1427–1434, 2012.
Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.
Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.
Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.
Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012.
IHS iSuppli web site: http://www.ihs.com/products/electronics-media/isuppli.aspx
Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005.
Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.
Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.1007/s10916-013-9952-5, 2013.
Chen, C. L., and Yang, T. T., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 2014. doi:10.1007/s10916-014-0112-3.
Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.1007/s10916-014-0013-5, 2014.
McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://dx.doi.org/10.5210/fm.v5i8.778, 2000.
Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.
Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.
Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.
Hess, F., Efficient identity based signature schemes based on pairings. Sel. Areas Crypt 2595:310–324, 2003.
Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.
Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005.
Johnson, D., and Menezes, A., The Elliptic Curve Digital Signature Algorithm (ECDSA). Tech. rep. CORR 99–34, Department of C & O, University of Waterloo, http://cacr.math.waterloo.ca, 1999.
Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T0 spaces. Topol. Appl. 125(3):533–542, 2002.
X.509 certificate - Wikipedia, http://en.wikipedia.org/wiki/X.509, access available on 10 May 2014.
Ministry of Health and Welfare in Taiwan, http://www.mohw.gov.tw/EN/Ministry/Index.aspx, access available on 10 May 2014.
Third generation of mobile telecommunications technology - Wikipedia, http://en.wikipedia.org/wiki/3G, access available on 10 May 2014.
Acknowledgments
This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract number MOST 103-2221-E-324-023, MOST103-2632-E-324-001-MY3 and MOST 103-2221-E-324-022.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Patient Facing Systems
Rights and permissions
About this article
Cite this article
Chen, CL., Yang, TT., Chiang, ML. et al. A Privacy Authentication Scheme Based on Cloud for Medical Environment. J Med Syst 38, 143 (2014). https://doi.org/10.1007/s10916-014-0143-9
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-014-0143-9