Browse > Article
http://dx.doi.org/10.7472/jksii.2020.21.4.25

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation  

Ham, Gyu-Sung (Department of Computer Engineering, Wonkwang University)
Joo, Su-Chong (Department of Computer.Software Engineering, Wonkwang University)
Publication Information
Journal of Internet Computing and Services / v.21, no.4, 2020 , pp. 25-34 More about this Journal
Abstract
In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.
Keywords
Automatic Authentication System; Patient's Situation; Authentication Service application; Medical Information System Emergency Decisions; Executability Verification;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 Sihyung No, Gyusung Ham, Changwon Jeong and Suchong Joo, "Construction of Medical Image Information Viewer-Matiching System Based by Diseases", JICS, Vol. 20, No. 5, pp.37-47, 2019. http://dx.doi.org/10.7472/jksii.2019.20.5.37
2 SY Park, SY Lee, and YN Chen, "The Effects of EMR Deployment on Doctors' work practices: A qualitative study in the emergency department of a teaching hospital", International Journal of Medical Informatics, Vol. 81, Issue 3, 2012. https://doi.org/10.1016/j.ijmedinf.2011.12.001
3 KW Seo, HN Kim, HS Kim, "Current Status of the Adoption, Utilization and Helpfulness of Health Information Systems in Korea", International Jornal of Environmental Research and Public Health 2019, Vol. 16, No. 2122, 2019. https://doi.org/10.3390/ijerph16122122
4 P. G. Goldschmidt, "HIT and MIS: implications of health information technology and medical information systems", Communications of the ACM, Vol. 48, No. 10, pp.68-74, 2005. https://doi.org/10.1145/1089107.1089141   DOI
5 Cheng Xie, Po Yang and Yun Yang "Open Knowledge Accessing Method in IoT-Based Hospital Information System for Medical Record Enrichment", IEEE Access, Vol. 6, pp.15202-15211, 2018. https://doi.org/10.1109/ACCESS.2018.2810837   DOI
6 TG Lee, SH, Lee, "Dynamic Bio-sensing Process Design in Mobile Wellness Information System for Smart Healthcare", Wireless Personal Communications, Vol. 86, Issue 1, pp.201-215, 2016. https://doi.org/10.1007/s11277-015-2967-0   DOI
7 D. A. M. Budida and R. S. Mangrulkar, "Design and implementation of smart HealthCare system using IoT," 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp.1-7, 2017. https://doi.org/10.1109/ICIIECS.2017.8275903
8 A. M. Ghosh, D. Halder and S. K. A. Hossain, "Remote Health Monitoring System through IoT," 2016 5th International Conference on Informatics, Electronics and Vision (ICIEV), pp.921-926, 2016. https://doi.org/10.1109/ICIEV.2016.7760135
9 Ganiga, Raghavendra; Pai, M. M. Manohara; Pai, M. Radhika, "Emergency Medical Service for Patients with Cardiovascular Disease Based on Internet of Things", Advanced Science Letters, Vol. 23, No. 4, pp.3714-3717, 2017. https://doi.org/10.1166/asl.2017.9019   DOI
10 S. Yadav, T. V. Pulekar, A. N. Cheeran and V. D. Awandekar, "Wireless Emergency Patient Monitoring System", 2018 Fourth International Conference on Biosignals, Images and Instrumentation (ICBSII), pp. 206-212, 2018. https://doi.org/10.1109/ICBSII.2018.8524734
11 D. Murali, D. R. Rao, S. R. Rao and M. Ananda, "Pulse Oximetry and IOT based Cardiac Monitoring Integrated Alert System". 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp.2237-2243, 2018. https://doi.org/10.1109/ICACCI.2018.8554425
12 MY Bae, SK Lee, SH Yoo and HN Kim, "FASE: Fast authentication system for e-health," 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 648-649, 2013. https://doi.org/10.1109/ICUFN.2013.6614898
13 GyuSung Ham, Ownjeong Seo, Hoill Jung and Suchong Joo, "Implementation of Dynamic Situation Authentication System for Accessing medical Information, JICS, Vol. 19, No. 6, pp.31-40. 2018. https://doi.org/10.7472/jksii.2018.19.6.31
14 YH Park, YH Park, "A Selective Group Authentication Scheme for IoT-Based medical Information System", Journal of Medical Systems, Vol. 41, No. 48. 2017. https://doi.org/10.1007/s10916-017-0692-9
15 SY Chiou, Z Ying, J Liu, "Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment", journal of Medical Systems, Vol 40. No. 101, 2016. https://doi.org/10.1007/s10916-016-0453-1
16 SS Kim, JH Lee, "Study on Protection and Access Control of Personal Bioinformation in Telemecine Environment", Smart Media Journal, Vol. 5, No. 4, pp.57-62, 2016. http://kism.or.kr/file/memoir/5_4_6.pdf
17 Tong Yi, Minyong Shi, Wenqian Shang and Jianxiang Cao, "Graded medical data publishing based on clustering", 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Zhangjiajie, pp. 1647-1652, 2015. https://doi.org/10.1109/FSKD.2015.7382192.
18 Suchong Joo, "Automatic Authentication Method based on Dynamic Context for Transparent Access for Medical Information", Patent Number : 10-2026018, Registration Data : 2019.9.20. https://doi.org/10.8080/1020260180000