Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.3.605

Privacy Model based on RBAC for U-Healthcare Service Environment  

Rhee, Bong-Keun (부산경상대학 소방안전계열)
Jeong, Yoon-Su (목원대학교 정보통신공학과)
Lee, Sang-Ho (충북대학교 소프트웨어학과)
Abstract
Nowadays u-healthcare which is very sensitive to the character of user's information among other ubiquitous computing field is popular in medical field. u-healthcare deals extremely personal information including personal health/medical information so it is exposed to various weaknees and threats in the part of security and privacy. In this paper, RFID based patient's information protecting protocol that prevents to damage the information using his or her mobile unit illegally by others is proposed. The protocol separates the authority of hospital(doctor, nurse, pharmacy) to access to patient's information by level of access authority of hospital which is registered to management server and makes the hospital do the minimum task. Specially, the management server which plays the role of gateway makes access permission key periodically not to be accessed by others about unauthorized information except authorized information and improves patient's certification and management.
Keywords
u-Healthcare; RFID; Protocol; Confidence;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 D. W. Kim, J. W. Han, and K. I. Chung, "Trend of Home Device Authentication/Authorization Technology", Weekly IT BRIEF, No. 1329, pp. 1-11, 2008.
2 S.Y. Lee, K.B. Yim, K.J. Bae, Taeyoung Jeong, and Jong-Wook Han, "Counterplan of Ubiquitous Home Network Privacy based on Device Authentication and Authorization," Korea Institute of Information Security & Cryptology, Review of KIISC, 18(5), pp.125-131, 2008.
3 IronKey, https://www.ironkey.com/
4 P. J. Bakker et al. "Investing Secure USB sticks", Nov. 2007.
5 J. H. Kim, J. W. Gi, and C. K. Kim, "A User Authentication Method between Domains Using Privilege Certificates", Korea Institute of Information Security&Cryptology, Journal of KIISC, 18(6A), pp. 75-83, 2008.   과학기술학회마을
6 J. S. Moon, D. G. Lee, I. Y. Lee, "Device Authentication/Authorization PRotocol for Home Network in Next Generation Security", Advances in Information Security and Assurance(ISA 2009), LNCS 5576, pp. 760-768, 2009.
7 STEALTH MXP FAMILY MXI Security, http://www.mxisecurity.com/
8 W. R. Jeon, Y. S. Choi, H. J. Jeong, F. Yang, D. H. Won and S. J. Kim, "Vulnerability Analysis on SanDisk Cruzer Micro Flash Memory", CISCW'07 Proceedings, Vol. 17, No. 2, Dec. 2007.
9 W.J. Lee, and I.S. Jeon, "Attribute-base Authenticated Key Agreement Protocol over Home Network", Journal of Korea Institute of Information Security & Cryptology (KIISC), 18(5), pp.49-57, 2008   과학기술학회마을
10 "Device Certificate Profile for the Home Network", TTAS.KO-12.0052, 2007.
11 E. J. Yoon and K. Y. Yoo, "Patient Authentication System for Mediacal Information Security using RFID", Korea Inforamtion and Communication Society, Vol. 35, No. 6, pp. 962-969, Jun. 2010.