Browse > Article
http://dx.doi.org/10.5391/JKIIS.2010.20.5.659

Personal Information Protection for Biometric Verification based TeleHealth Services  

Shin, Yong-Nyuo (한양사이버대학교 컴퓨터공학과)
Chun, Myung-Geun (충북대학교 전자공학부)
Publication Information
Journal of the Korean Institute of Intelligent Systems / v.20, no.5, 2010 , pp. 659-664 More about this Journal
Abstract
This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.
Keywords
Biometrics; Telehealth; Information Security; Privacy;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 신용녀, 전명근, 개인 식별 정보와 바이오인식정보의 보호기법, 한국지능시스템학회논문지, Vol.19, No.2, pp 160-167, 2009
2 ISO/IEC JTC1 SC27, Information technology-security techniques - A privacy reference architecture, 2007
3 MobiHealth 프로젝트, http://www.mobihealth.org
4 전명근, 생체인식(Biometrics) 총론, 한국정보통신교육원, 2004.
5 GE 헬스케어, http://www.gehealthcare.com
6 S.Y. Kung, M.W.Mak, S.H. Lin, Biometric Authentication, Prentice Hall, 2005.
7 Arun A. Ross, K. Nandakumar, Anil K. Jain, Handbook of Multibiometrics, Springer, 2006.
8 IDC, “IDC Expects Healthy Worldwide Investmentsin IT with Highest U.S. Growth Rates in Healthcare and Communications and Media,” 2006.
9 HIPAA, “Summary of the HIPAA Privacy Rule,” http://www.hhs.gov/ocr/hipaa/privrulepd.pdf
10 박건희, “보건의료정보화와 개인정보보호,” 서울대의대 2006년 상반기 토픽 리뷰, 2006. 6.
11 ISO/IEC JTC1 SC37 N2486, Standing Document 2, Harmonized Biometric Vocaburuary, 2008
12 FIDIS(Future of Identity in the Information Society), D3.10: Biometrics in identity management, 2007."
13 ITU-T Recommendation X.tsm-part1:Telebiometric system mechanism -General biometric authentication protocol and system model profile for telecommunication systems, ITU-TSG17 Q.9, 2009.
14 ITU-T Recommendation X.tif: TeleHelath Integrated framework, ITU-T SG17 Q.9, 2009.
15 신용녀, 전명근, “개인정보 보호를 위한 바이오인식 템플릿 보안”, 한국지능시스템학회논문지, Vol.18, No.4, pp 437-444, 2008.   과학기술학회마을
16 전명근, 문기영, “생체정보 이용과 프라이버시 보호”, 정보보호학회지, 제 15권 6호, pp.11-18, 2005.   과학기술학회마을