DOI QR코드

DOI QR Code

An Enhanced Secure Health Data Transmission Protocol using Key Insulation in Remote Healthcare Monitoring System

원격 헬스케어 모니터링 시스템에서 키 격리기법을 이용한 개선된 건강정보 전송 보안 프로토콜

  • Noh, Si-Wan (Interdisciplinary Program of Information Security, Graduate School Pukyong National University) ;
  • Park, Youngho (Department of IT Convergence and Application Engineering, Pukyong National University) ;
  • Rhee, Kyung-Hyune (Department of IT Convergence and Application Engineering, Pukyong National University)
  • Received : 2016.10.10
  • Accepted : 2016.12.01
  • Published : 2016.12.30

Abstract

In recent, the advancement of wearable devices and wireless body area networking technologies motivate researchers to pay attention to remote healthcare system for monitoring patients health and disease progression effectively. However, in order to implement a practical remote healthcare system, we must consider the security and privacy of patient's personal health information transmitted to healthcare servers through the network. Hence, in this paper, we propose a secure health data transmission protocol in remote healthcare monitoring system to protect patient's health information and prevent privacy from eavesdropping on the network. To achieve our security goals, we design an efficient secure protocol based on the identity-based cryptography with key evolution technique, and then confirm the superiority and the efficiency of the proposed protocol as compared with the existing protocol of Yang et al.

Keywords

References

  1. G. Kim, and M. Park, "A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors," Journal of Korea Multimedia Society, Vol. 17, No. 2, pp. 170-179, 2014. https://doi.org/10.9717/kmms.2014.17.2.170
  2. K.S. Kwak, S. Ullah, and N. Ullah, "An Overview of IEEE 802.15.6 Standard," Proceeding of IEEE International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1-6, 2010.
  3. H.M. Chen, J.W. Lo, and C.K. Yeh, "An Efficient and Secure Dynamic ID-Based Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 36, No. 6, pp. 3907-3915, 2012. https://doi.org/10.1007/s10916-012-9862-y
  4. T. Cao, and J. Zhai, "Improved Dynamic IDBased Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 2, pp. 1-7, 2013.
  5. Q. Jiang, J. Ma, Z. Ma, and G. Li, "A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems," Journal of Medical Systems, Vol. 37, No. 1, pp. 1-8, 2013.
  6. X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A Strong Privacy-Preserving Scheme Against Global Eavesdropping for eHealth Systems," IEEE Journal on Selected Areas in Communications, Vol. 27, No. 4, pp. 365-378, 2009. https://doi.org/10.1109/JSAC.2009.090502
  7. H. Yang, H. Kim, and K. Mtonga, "An Efficient Privacy-Preserving Authentication Scheme with Adaptive Key Evolution in Remote Health Monitoring System," Peer-to-Peer Networking and Applications, Vol. 8, No. 6, pp. 1059-1069, 2014.
  8. P. Gopal, and P.V. Reddy, "Efficient ID-Based Key-Insulated Signature Scheme with Batch Verifications using Bilinear Pairings over Elliptic Curve," Journal of Discrete Mathematical Sciences and Cryptography, Vol. 18, No. 4, pp. 385-402, 2015. https://doi.org/10.1080/09720529.2014.1001586
  9. D. Boneh, and M. Franklin, "Identity-Based Encryption from the Weil Pairing," Proceeding of Advances in Cryptology-CRYPTO 2001, pp. 213-229, 2001.
  10. J.C. Choon and J.H. Cheon, "An Identity-Based Signature from Gap Diffie-Hellman Groups," Proceeding of Public Key Cryptography-PKC 2003, pp. 18-30, 2003.
  11. R. Dupont and A. Enge, "Provably Secure Non-Interactive Key Distribution Based on Pairings," Discrete Applied Mathematics, Vol. 154, No. 2, pp. 270-276, 2006. https://doi.org/10.1016/j.dam.2005.03.024
  12. J. Weng, S. Liu, K. Chen, and X. Li, "Identity-Based Key-Insulated Signature with Secure Key-Updates," Proceeding of Information Security and Cryptology-Inscrypt 2006, pp. 13-26, 2006.
  13. A. De Caro, and V. Iovino, "jPBC: Java Pairing Based Cryptography," Proceedings of the 16th IEEE Symposium on Computers and Communications, pp. 850-855, 2011.
  14. The Pairing-Based Cryptography Library, https://crypto.stanford.edu/pbc/ (accessed Dec., 26, 2016).