Browse > Article
http://dx.doi.org/10.15207/JKCS.2017.8.3.115

User Authentication Key Establishment Scheme based on Color Model for Healthcare Environment  

Jeong, Yoon-Su (Dept. of information Communication Convergence Engineering, Mokwon University)
Publication Information
Journal of the Korea Convergence Society / v.8, no.3, 2017 , pp. 115-121 More about this Journal
Abstract
Hospital medical services are making great efforts to provide prompt medical services to patients or improve the quality of medical services by convergence patient's healthcare information. However, recent research suggests problems about safety and efficiency when trying to transmit patient's healthcare information to hospital server via radio and wireless. In this paper, we propose a color model - based patient authentication key establishment protocol method to securely transmit patient healthcare information. The proposed method extracts randomly three color information used in the color model and vectorizes the extracted arbitrary information to obtain the key information required for user authentication as the sum of orthogonal vectors to improve the efficiency. In addition, the proposed method can securely generate key information used for user authentication without using an additional encryption algorithm. In performance evaluation result, proposed method shows that the server processing time of the sensed information is 8.1% higher than the existing method and 7.7% lower than the existing method.
Keywords
Color Model; Authentication; Protocol; Convergence; Healthcare;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Y. S. Jeong, "Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control", Journal of Digital Convergence, Vol. 14, No. 7, pp. 185-191, Jul. 2016.   DOI
2 Y. S. Jeong, "A Study of An Efficient Clustering Processing Scheme of Patient Disease Information for Cloud Computing Environment", Journal of IT Convergence Society for SMB, Vol. 6, No. 1, pp. 33-38, Mar. 2016.   DOI
3 Y. S. Jeong and S. H. Lee, "A User Privacy Protection Scheme based on Password through User Information Vir tuality in Cloud Computing", Journal of IT Convergence Society for SMB, Vol. 1, No. 1, pp. 29-37, Nov. 2011.
4 Y. S. Jeong, "An Efficient m-Healthcare Service Model using RFID Technique", Journal of Digital Convergence, Vol. 13, No. 11, pp. 149-156, 2015.   DOI
5 J. E. Lee and S. G. NAh, "An Emprircal Study of Usr Perrceptions on EMR Standardization Leading Medical & IT Convergence", Journal of Digital Convergence, Vol. 13, No. 5, pp. 111-118, 2015.   DOI
6 A. T. Barth, M. a. Hanson, H. C. Powell, and J. Lach, "TEMPO 3.1: A body area sensor network platform for continuous movement assessment", Proc. - 2009 6th Int. Work. Wearable Implant. Body Sens. Networks, BSN 2009, pp. 71-76, June. 2009.
7 Y. S. Jeong, "An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP", Journal of Digital Convergence, Vol. 13, No. 4, pp. 227-233, 2015.   DOI
8 Z. Shelby, K. Hartke, C. Bormann, The Constrained Application Protocol (CoAP), IETF RFC 7252, June 2014.
9 C. Wanpeng, B. Wei, "Adaptive and dynamic mobile phone data encryption method", Chian Communications, Vol. 11, Issue. 1, pp. 103-109, Jan. 2014..   DOI
10 R. Madhusudhan, M. Hegde, "Cryptanalysis and Improvement of Remote User Authentication Scheme Using Smart Card", 2016 International conference on Computer and Communication Engineering(ICCCE), pp. 84-89, 2016.
11 C. Chen, Y. Wang, H. Yu, x. H. Qiang, "The RFID mutual authentication scheme based on ECC and OTP authentication", 2016 IEEE International Conference on Ubiquitous Wireless Broadband (ICUWB), pp. 1-4, 2016.
12 G. Yu, Y. Shen, G. Zhang, Y. Yang, "A Chaos-based Color Image Encryption Algorithm", 2013 Sixth International Symposium on Computational Intelligence and Design, pp. 92-95, 2013.
13 S. Som, A. Kotal, A. Chatterjee, S. Dey, S. Palit, "A colour image encryption based on DNA coding and chaotic sequences", 2013 1st International Conference on Emerging Trends and Applications in Computer Science, pp. 108-114, 2013.
14 Man, Shushuang, D. Hong and M. M. Matthews, "A Shoulder-Surfing Resistant Graphical Password Scheme-WiW", Security and Management, 2003.
15 Wiedenbeck, Susan, et. al, "PassPoints: Desing and logigudinal evaluation of a graphical password system", International Journal of Human-Computer Studies Vol. 63, No. 1, pp. 102-127, 2005.   DOI
16 J. Thorpe, P. C. van Oorschot, "Grphical Dictionaries and the Memorable Space of Graphical Passwords", USENIX Security Symposium, 2004.
17 Wiedenbeck, Susan, et al. "Design and evaluation of a shoulder-surfing resistant graphical password scheme", Proceedings of the working conference on Advanced visual interfaces, ACM, 2006.
18 D. Rachna, "Hash visualization in user authentication", CHI'00 Extended Abstracts on Human Factors in Computing Systems, ACM, 2000.
19 M. Sreelatha et. al, "Authentication schemes for session passwords using color and images", International Journal of Netow가 Security & Its Applications 3.3, pp. 111-119, 2011.   DOI
20 S. Leonardo and J. C. Birget, "Graphical passwords", The Rutgers Scholar, an electronic Bulletin for undergraduate research 4, 2002.
21 S. Balaji, "Authentication techniques for engendering session passwords with colors and text", Advances in Computer Science and its Applications 1.3, pp. 189-195, 2012.