Browse > Article
http://dx.doi.org/10.7840/KICS.2012.37C.4.297

U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information  

Jeong, Yoon-Su (목원대학교 정보통신공학과)
Lee, Sang-Ho (충북대학교 소프트웨어학과)
Abstract
IT technology of U-healthcare system is being grafted onto medical services and the use of U-healthcare system are extending steadily. However, in case of patients using Implantable Medical Device (IMD) in U-healthcare system, patients' privacy protection and safe access to system recently has emerged as a major issue. This paper proposes a patients' privacy protection protocol to prevent any illegal accesses from third parties as state value and action value are synchronized after patients' information virtualization. The proposed protocol can limit the access range of patients' information according to authentication information of hospitals, doctors, nurses, and pharmacies registered in the U-healthcare server. Additionally, this protocol can increase management efficiency for patients' privacy by synchronizing state values and action values only for approved information and, by instituting this process, third parties cannot easily access patients' information.
Keywords
u-Healthcare; Privacy; Access Control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D. W. Kim, J. W. Han, and K. I. Chung, "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
2 S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han, "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131, 2008.
3 T. M. Song, S. H, Jang, "u-Healthcare : Issue and Research Trends", Korea Institute for Health and Social Affairs, pp. 119-129, Jan. 2011.
4 D. Halperin, T. S. Heydt-Benjamin, B. Ransford, S. S. Clark, B. Defend, W. Morgan, K. Fu, T. Kohno, and W. H. Maisel, "Pacemarkers and implantable cardiac defibrillators: Software radio attacks and zero-power defenses", In IEEE Symposium on Security and Privacy. IEEE Computer Society, pp. 1-14, May. 2008.
5 D. Halperin, T. S. Heydt-Benjamin, K. Fu, T. Kohno, and W. H. Maisel, "Security and privacy for implantable medical devices", IEEE Pervasive Computing, Vol. 7, No. 1, pp. 30-39, Jan. 2008.   DOI   ScienceOn
6 C. Israel, s. Barold, "Pacemaker systems as implantable cardiac rhythm monitors", In American Journal of Cardiology, pp. 442-445, Feb. 2001.
7 I. Kirschenbaum, A. Wool, "How to build a lowcost, extended-range RFID skimmer", Cryptology ePrint Archive: Report 2006/054, 2006.
8 K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, "Proximity-based Access Control for Implantable Medical Devices", 16th ACM conference on Computer and communications security, pp. 411-419, Nov. 2009.
9 T. Denning, K. Fu, and T. Kohno, "Absence makes the heart grow fonder new directions for implantable medical device security", 3rd USENIX Workshop on Hot Topics in Security, pp. 1-7, Oct. 2008.