Browse > Article
http://dx.doi.org/10.15207/JKCS.2015.6.6.081

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service  

Kim, Donghyun (Department of Multimedia, Hannam University)
Kim, Seoksoo (Department of Multimedia, Hannam University)
Publication Information
Journal of the Korea Convergence Society / v.6, no.6, 2015 , pp. 81-86 More about this Journal
Abstract
The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.
Keywords
Key Management; Health Information; Ubiquitous Healthcare; Key Tree; Information Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Berler, S. Pavlopoulos, D. Koutsouris, "Design of an interoperability framework in a regional healthcare system", In:Proceedings of Engineering in Medicine and Biology Society, Vol. 2, pp. 3093-3096, 2004.
2 R. Heeks, "Health information systems: Failure, success and improvisation", International journal of medical informatics Vol. 75, No. 2, pp. 125-137, 2006.   DOI
3 S.K. Katsikas, "Health care management and information systems security:awareness, training or education", In:Int. J.Med. Informatics 60, pp. 129-135, 2000.   DOI
4 S. Rafaeli, D. Hutchison, "A survey of key management for secure group communication", In:ACM Computing Surveys 35, Vol. 3, pp. 309-329, 2003.   DOI
5 T. Rindfleisch, "Privacy, information technology, and health care", In:Communications of the ACM, Vol. 40, No. 8, pp. 92-100, 1997.   DOI
6 J. Bohn, F. Gartner, H. Vogt, Dependability Issues of Pervasive Computing in a Healthcare Environment", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol.2802, pp.53-70, 2004.   DOI
7 S. Weis, S. Sarma, R. Rivest, D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2004.
8 Y.B. Kim, M. Kim, Y.J. Lee, "COSMOS: a middleware platform for sensor networks and a u-healthcare service", Proceedings of the 2008 ACM symposium on Applied computing. pp. 512-513, 2008.
9 L. Zhang, B. Chu, "A Role-Based Delegation Framework for Healthcare Information Systems", In:ACM Symposium on Access Control Models And Technologies(SACMAT), pp. 125-134, 2002.
10 C. Wong, M. Gouda, S. Lam, "Secure group communications using key graphs, Networking", IEEE/ACM Transactions on Networking, Vol. 8, No. 1, pp. 16-30, 1998.
11 S. Muhammad, K. Raazi, S. Lee, Y. Lee, "A Novel Architecture for Efficient Key Management in Humanware Applications", In: Fifth International Joint Conference on INC, IMS and IDC, pp. 1918-1922, 2009.
12 S. Muhammad, K. Raazi, S. Lee, Y. Lee, "TIMAR: an efficient key management scheme for ubiquitous health care environments", In:Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, United Kingdom, p. 33, 2009.
13 J.S. Shapiro, G. Kuperman, Health information exchange." Medical informatics: An executive primer, (Ed. Ong, KR) Healthcare Information & Management Systems Society, pp. 147-16, 2011.
14 M. Das, A. Saxena, V. Gulati, D. Phatak, "Hierarchical key management scheme using polynomial interpolation", SIGOPS Operational Systematic Review, Vol. 39, No. 1, pp. 40-47, 2005.   DOI
15 D. Dolev, A.C. Yao, On the security of public key protocols." Information Theory, IEEE Transactions on, Vol. 29, No. 2, pp. 198-208, 1983.