Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2012.19C.1.063

Remote Healthcare Monitoring System Using Attribute based Encryption  

Song, You-Jin (동국대학교 정보경영학과)
Do, Jeong-Min (동국대학교 전자상거래협동과정)
Abstract
To ensure privacy of individual information in remote healthcare service, health data should be protected through a secure technology such as encryption scheme. Only user who delegated decryption right can access to sensitive health data and delegator needs capability for revocating access privilege. Recently, in ubiquitous environment, CP-ABTD(Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes) which extends CP-ABE(Ciphertext-Policy Attribute-Based Encryption) has been proposed for these requirements. In this paper, we construct remote healthcare monitoring system with delegation and revocation capability for attribute in CP-ABTD. Finally, we analyze collusion attack between users in our system.
Keywords
Remote Healthcare; Attribute Based Encryption; Delegation; Revocation; Access Privilege Management; Collusion Attack;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 P. Robinson, H. Vogt and W. Wagealla, "Privacy, Security, and Trust Within the Context of Pervasive Computing," The Springer International Series in Engineering and Computer Science, Vol.780, 2005.
2 L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel and W. Jonker, "Ciphertext-Policy Attribute-Based Threshold Decryption with Flexible Delegation and Revocation of User Attributes," 2009 University of Twente, Centre for Telematics and Information Technology, Internal Report, 2009.
3 EHR핵심연구개발사업단, "건강정보보호 및 보안 체계 개발," 5세부, 2009.
4 김주한, "개인정보 암호화 한 평생기록 추진," 메디칼 업저버, 창간 5주년 기념 정책토론회, 2006.
5 X. Liang, Z. Cao, H. Lin and J. Shao, "Attribute Based Proxy Re-encryption with Delegating Capabilities," ASIACCS 2009, ACM, pp.276-286, 2009.
6 L. Ibraimi, Q. Tang, P. Hartel and W. Jonker, "A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare," 5th VLDB Workshop on Secure Data Management, SDM, pp.185-198, 2008.
7 오정연, "의료정보화 현황 및 과제," NCA CIO REPORT, 05-11 호, 한국전산원, 2006.
8 S. Y. Lim, T. H. Oh, Y. B. Choi and T. Lakshman, "Security Issues on Wireless Body Area Network for Remote Healthcare Monitoring," Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), 2010 IEEE International Conference, pp.327-332, 2010.
9 박건희, "보건의료정보화와 개인정보보호," 서울대의대 2006년 상반기 토픽 리뷰, 2006.
10 송지은, 김신효, 정명애, 정교일, "u-헬스케어 보안 이슈 및 기술 동향," 전자통신동향분석, 제 22권 제 1호, 한국전자통신연구원, 2007.
11 M. Tentori, J. Favela and M. D. Rodriguez, "Privacy-Aware Autonomous Agents for Pervasive Healthcare," IEEE Intelligent Systems, pp.55-62, 2006.   DOI
12 J. Sun and Y. Fang, "Cross-Domain Data Sharing in Distributed Electronic Health Record System," IEEE Transactions on Parallel and Distributed Systems, pp.754-764, 2010.
13 박광용, 송유진, "속성기반 암호기술," 한국정보보호학회, 정보 보호학회지, 제20권 제2호, pp.85-92, 2010.