Browse > Article
http://dx.doi.org/10.5762/KAIS.2019.20.6.1

An Fingerprint Authentication Model of ERM System using Private Key Escrow Management Server  

Lee, Yong-Joon (Defense Security Institute)
Jeon, Taeyeol (AlphaBit)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.20, no.6, 2019 , pp. 1-8 More about this Journal
Abstract
Medical information is an important personal information for patients, and it must be protected. In particular, when medical personnel approach electronic medical records, authentication for enhanced security is essential. However, the existing public certificate-based certification model did not reflect the security characteristics of the electronic medical record(EMR) due to problems such as personal key management and authority delegation. In this study, we propose a fingerprint recognition-based authentication model with enhanced security to solve problems in the approach of the existing electronic medical record system. The proposed authentication model is an EMR system based on fingerprint recognition using PEMS (Private-key Escrow Management Server), which is applied with the private key commission protocol and the private key withdrawal protocol, enabling the problem of personal key management and authority delegation to be resolved at source. The performance experiment of the proposed certification model confirmed that the performance time was improved compared to the existing public certificate-based authentication, and the user's convenience was increased by recognizing fingerprints by replacing the electronic signature password.
Keywords
Electronic Medical Records; Fingerprint Recognition; Certification; Private Key; Escrow Management;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 M. Vigil, D. Cabarcas, J. Buchmann, J. Huang, "Assessing trust in the long-term protection of documents", 2013 IEEE Symposium on Computers and Communication(ISCC),Split, Croatia, 7-10 July 2013. DOI: https://doi.org/10.1109/ISCC.2013.6754943
2 W. Lei, Y. Li, Y. Sang, H. Shen, "A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems", 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), pp. 48-55, Macau, China, Nov. 2016. DOI: https://doi.org/10.1109/ICEBE.2016.019
3 V. Liu, M. Musen,T. Chou, "Data Breaches of Protected Health Information in the United States", Journal of the American Medical Association, Vol.313, No.14, pp.1471-1473, 2015. DOI: https://doi.org/10.1001/jama.2015.2252   DOI
4 H. Ma, R. Zhang, G. Yang, Z. Song, K. He, Y. Xiao, "Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices", IEEE Transactions on Dependable and Secure Computing, pp.1-11, June 2018. DOI: https://doi.org/10.1109/TDSC.2018.2844814
5 C. S. Kruse, B. Smith, H. Vanderlinden, A. Nealand, "Security Techniques for the Electronic Health Records", Journal of Medical Systems, Vol.41, No.8, pp.127-139, July 2017. DOI: https://doi.org/10.1007/s10916-017-0778-4   DOI
6 J. S. Lee, H. J. Kim, M. S. Jun, "A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad," Journal of the Korea Academia-Industrial, Vol.14, No.3, pp.1428-1438, 2015. DOI: http://dx.doi.org/10.5762/KAIS.2013.14.3.1428
7 J. W. Kim, J. H. Park, M. S. Jun, "A Design of Smart Banking System using Digital Signature based on Biometric Authentication", Journal of the Korea Academia-Industrial, Vol.16, No.9, pp.6282-6289, 2015. DOI: http://dx.doi.org/10.5762/KAIS.2015.16.9.6282   DOI
8 G. D. Mogli, "Fingerprint-based crypto-biometric system for network security", Journal on Information Security, Vol.2, No.4, pp.156-165, 2011. DOI: http://dx.doi.org/10.4038/sljbmi.v2i4.2245
9 S. Y. Min, B. W. Jin, "Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment," Journal of the Korea Academia-Industrial, Vol.15, No.6, pp.3865-3871, 2014. DOI: http://dx.doi.org/10.5762/KAIS.2014.15.6.3865   DOI
10 S. Barman, D. Samanta, S. Chattopadhyay, "Role of Biometrics in healthcare privacy and security management system", Journal of Bio-Medical Informatics, Vol.2015, No.3, pp.1-12, April 2015. DOI: https://doi.org/10.1186/s13635-015-0020-1
11 Zhou, X. Lin, X. Dong, Z. Cao, "PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System", IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.6, pp.1693-1703, 2015. DOI: https://doi.org/10.1109/TPDS.2014.2314119   DOI
12 H. Chao, S. Twu, C. Hsu, "A Patient-Identity Security Mechanism For Electronic Medical Records (EMRs) During Transit and At Rest", Journal of Medical Informatics and the Internet in Medicine, Vol.30, No.3, pp.227-240, July 2009. DOI: https://doi.org/10.1080/14639230500209443
13 W. Yang, S. Wang, J. Hu, G. Zheng, C. Valli, "Security and accuracy of fingerprint-based biometrics: A review", International Journal of Symmetry, Vol.11, No.2, pp.141-150, 2019. DOI: https://doi.org/10.3390/sym11020141   DOI
14 N. Lo, C. Wu, Yo. Chuang, "An authentication and authorization mechanism for long-term electronic health records management", Journal of Procedia Computer Science, Vol.111, pp.145-453, 2017. DOI: https://doi.org/10.1016/j.procs.2017.06.021   DOI