Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2011.18C.6.379

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System  

Lee, Yong-Joon (한국인터넷진흥원 인터넷침해대응센터)
Abstract
Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.
Keywords
EMR(Electronic Medical Record); Digital Certificate; Fingerprint Recognition;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Kholmatov and B.A. Yanikoglu, "Biometric Authentication using Online Signatures," In Proceedings of ISCIS, pp.373-380, 2004.
2 S. Krawczyk and A.K. Jain, "Securing Electronic Medical Records Using Biometric Authentication," In Proceedings of AVBPA, pp.1110-1119, 2005.
3 A. Kholmatov and B. Yanikoglu, "Identity authentication using improved online signature verification method," Pattern Recognition Letters, Vol.26, Issue 15, pp.2400-2408, 2005.   DOI   ScienceOn
4 Chao LI, Yi-xian YANG and Xin-xin NIU, "Biometric-based personal identity-authentication system and security analysis," The Journal of China Universities of Posts and Telecommunications, Vol.13, Issue 4, pp.43-47, 2006.   DOI   ScienceOn
5 A. Bhargav-Spantzel, A.C. Squicciarini and E. Bertino, "Privacy Preserving Multi-Factor Authentication with Biometrics," In Proceedings of Digital Identity Management, pp.63-72, 2006.
6 R. Agrawal and C. Johnson, "Securing electronic health records without impeding the flow of information," International Journal of Medical Informatics, Vol.76, Issues 5-6, pp.471-479, 2007.   DOI   ScienceOn
7 A. Salaiwarakul and M. Ryan, "Analysis of a Biometric Authentication Protocol for Signature Creation Application," In Proceedings of IWSEC, pp.231-245, 2008.
8 Despina Polemi, "TTPs and biometrics for securing the payment of telemedical services." Future Generation Computer Systems, Vol.15, Issue 2, pp.265-276, 1999.   DOI   ScienceOn
9 D.H. Yum and P.J. Lee, "Identity-Based Cryptography in Public Key Management," In Proceedings of EuroPKI, pp.71-84, 2004
10 Michael Fritscher, "Towards A Unique World-wide Digital Certificate," Proceedings of the Fifth Americas Conference on Information Systems, 1999.