Browse > Article
http://dx.doi.org/10.6109/jkiice.2015.19.10.2481

On the HIDE based Group Signature for Secure Personal Healthcare Record Service  

Cho, Young-bok (Department of Computer Science, Chungbuk National University)
Woo, Sung-hee (Department of Medical Information&Engineering, Korea National University of TransportationDepartment of Computer Science, Chungbuk National University)
Lee, Sang-ho (Department of Computer Science, Chungbuk National University)
Park, Jong-bae (Department of Radiology, Chungbuk Health&Science University)
Abstract
The issue of PHR is maintained on the server will be in the hospital. PHR information stored on the server, such as a patient's illness and treatment is very sensitive information. Therefore, patients should be guaranteed the protection of privacy. In addition, the PHR should be allowed to group access of it's approach. Therefore, in this paper the proposed group signature using hierarchical identity-based encryption schemes into can guarantee the PHR data privacy. The session key generated by group signature, it is use a tiered approach. The generated session keys safe PHR data transmission is possible. The proposed method is average 80% than the PKI encryption and ID-based encryption rather than average 50% the algorithm processing is more efficient
Keywords
Personal Healthcare Record:PHR; Hospital Information System:HIS; Key Management System; Hierarchical;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Y. B. Cho, and S. H Lee, “An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol. 37B, no.3, pp. 149-157, 2013.
2 J. E. Song, S. H. Kim, M. A. Jung and K. I. Jung, “Medical information securiey of u-Healthcare service” Journal of The Korean Institute of Communications and Information Sciences, vol. 17, no. 1, pp. 47~56, 2007.
3 K. J. Kim and S. P. Hong, “Privacy Information Protection Model in e-Healthcare Environment” Journal of The Korean Society for Internet Informatin, vol. 10, no. 2, 2008.
4 Wong, K. Chung, G. Mohamed, and S. L. Simon,Lam. "Secure group communications using key graphs." in Proceeding of the IEEE/ACM Transactions, vol. 8. no. 1, pp.16-30, 2000.
5 Y. B. Cho, S. H. Woo and S. H Lee, “ IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol 38B, no. 10, pp. 801-807, 2013.   DOI
6 Y. D. Joo and Y. H. An, “Improvements of a Dynamic ID-Based Remote User Authentication Scheme” Journal of The Institute of Webcasting, Internet and Telecommunication, vol. 11, no. 6, pp. 303-310, 2011.
7 Q. D Vu, B. N. Thai, and Een-Kee Hong. "A New Scheme for Multi-user Cooperation System Based on Iterative Decoder"in Proceeding of the KICIS Transactions. pp. 39-40. 2011.
8 J. H. Lee, J. S. Yu, H. J. Yoon and H.J Jang, “ System for Protecting Medical Informatio” Journal of The Korean Society for Internet Informatin, pp. 429-434, 2010.
9 Q. Jiang, J. Ma, Z. Ma and G. Li, “A privacy enhanced authentication scheme for telecare medical information systems” Journal of Medical Systems, vol. 36, no. 3, pp 1529-1535, 2012.   DOI
10 P. Kumar, S. G. Lee and H. J. Lee, "E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks" in Proceeding of the Sensors2012 Transactions, pp. 1625-1647, 2012.
11 Y. D. Joo, “Security Improvements on Smart-Card Based Mutual Authentication Scheme” Webcasting, Journal of The Internet and Telecommunication, vol. 12, no. 6, pp. 91-98, 2012.   DOI
12 K. Y. Choi, J. Y.Hwang and D. H.Lee, "ID-based Authenticated Group Key Agreement Secure against insider Attacks" in Proceeding of the IEICE Transactions. Fundamentals, vol. E91-A, no. 7, pp. 1828-1830, 2008.
13 Y. Yu,. "Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage" in Proceeding of the Network and System Security Transactions, Springer International Publishing, pp. 28-40, 2014.
14 A. Shamir, "How to share a secret." , in Proceeding of the Communications of the ACM Transactions, pp. 612-613, Nov, 1979.
15 B. Libert and J. Quisquater, “New Identity Based Signcryption Schemes from Pairings” IEEE Information Theory Workshop, http://eprint.iacr.org/2003/023, 2003.
16 H. L. Chae, and P. J. Lee. "Remarks on convertible group signatures of Asiacrypt'96." Electronics Letters vol.33, no.5, pp383-384, 1997.   DOI