Browse > Article
http://dx.doi.org/10.9708/jksci.2011.16.11.189

Design of Personal Information Security Model in U-Healthcare Service Environment  

Lee, Bong-Keun (Division of Fire Protection&Safety, College of Busan Kyungsang)
Jeong, Yoon-Su (Industry Technical Research Institute, Hannam University)
Lee, Sang-Ho (Dep. Computer Science, College of Electrical & Computer Engineering, Chungbuk National University)
Abstract
With rapid development and contribution of IT technology IT fushion healthcare service which is a form of future care has been changed a lot. Specially, as IT technology unites with healthcare, because delicate personal medical information is exposed and user's privacy is invaded, we need preperation. In this paper, u-healthcare service model which can manage patient's ID information as user's condition and access level is proposed to protect user's privacy. The proposed model is distinguished by identification, certification of hospital, access control of medical record, and diagnosis of patient to utilize it efficiently in real life. Also, it prevents leak of medical record and invasion of privacy by others by adapting user's ID as divided by user's security level and authority to protect privacy on user's information shared by hospitals.
Keywords
u-Healthcare; Privacy Protection; RBAC;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Z. Omary, f. Mtenzi, B. Wu, C. O'Driscoll, "Accessing sensitive patient information in ubiquitous healthcare systems", 2010 International conference for internet Technology and Secured Transactions(ICITST), pp. 1-3, Nov. 2010.
2 D. W. Bang, J. S. Jeong, J. H. Lee, "An imple mentation of privacy security for PHR framework supporting u-healthcare service", 2010 6th International conference on Networked Computing(INC), pp. 1-4, May. 2010.
3 E. Y. Kim, M. Lee, "Multi-agent-based U-healthcare system for Managing Hypertension", International Conference on convergence Information Technology, pp. 1694-1699, Nov. 2007.
4 Crypto++ 5.6.0 Benchmarks, http://www.cryptopp.com/benchmarks.html
5 Q. Ni, A. Trombetta, E. Bertino and J. Lobo, "Privacy-aware Role Based Access Control", The Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, pp. 41-50, Jun. 2007.
6 Q. Ni, D. Lin, E. Bertino and J. Lobo, "Conditional Privacy-aware Role Based Access Control", The Proceedings of the 12th European Symposium on Research in Computer Security, LNCS 4734, pp. 72-89, 2007.
7 T. M. Song, S. H, Jang, "u-Healthcare : Issue and Research Trends", Korea Institute for Health and Social Affairs, pp. 119-129, Jan. 2011.
8 K. J. Kim, S. P. Hong, "Privacy Information Prot ection Model in e-Healthcare Environment", Korean Society for Internet Information, Vol. 10, N., 2, pp. 29-40, Apr. 2009.
9 D. G. Kim, I. G. Song, "Need and Development of u-Healthcare Service", Korean Society for Internet Information, Vol. 1, No. 3, pp. 9-17, Sep. 2009.
10 D. H. Sin, B. J. Han, H. J. Lee, H. C. Jung, "Analysis of Security Threat in u-Healthcare Service", The Korean Institute of Information Scientists and Engineers 2010 Conferences, Vol. 37, No. 1(D), pp. 52-55, Jun. 2010.
11 S. Y. Song, H. J. Hwang, "u-Healthcare Application Framework for Medical Gateway", Korean Society for Internet Information Conference, pp. 349-353, May. 2009.
12 IHE, http://www.himss.org.
13 ITI Technical Committee, "IHE Security-XDS as a Case Study", IHE, 2006.
14 J. E. Song, S. H. Kim, M. A. Chung, K. I. Chung, "Security Issues and Its Technology Trends in u-Healthcare", Electronics and Telecommunications Trend Analysis Vol. 22, No. 1, pp. 70-86, Feb. 2007.
15 N. Gustaf, S. Mark, "An Approach to Engineer and Enforce Context Constraints in an RBAC Environment", Symposium on Access Control Models and Technologies(SACMAT 2003), pp. 65-79, Jun. 2003.
16 J. W. Byun, E. Bertino and N. Li, "Purpose based access control of complex data for privacy protection", Proceedings of the tenth ACM symposium on Access control models and technologies (SACMAT'05), pp. 102-110. Jun. 2005.