JOURNAL BROWSE
Search
Advanced SearchSearch Tips
On the HIDE based Group Signature for Secure Personal Healthcare Record Service
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
On the HIDE based Group Signature for Secure Personal Healthcare Record Service
Cho, Young-bok; Woo, Sung-hee; Lee, Sang-ho; Park, Jong-bae;
  PDF(new window)
 Abstract
The issue of PHR is maintained on the server will be in the hospital. PHR information stored on the server, such as a patient`s illness and treatment is very sensitive information. Therefore, patients should be guaranteed the protection of privacy. In addition, the PHR should be allowed to group access of it`s approach. Therefore, in this paper the proposed group signature using hierarchical identity-based encryption schemes into can guarantee the PHR data privacy. The session key generated by group signature, it is use a tiered approach. The generated session keys safe PHR data transmission is possible. The proposed method is average 80% than the PKI encryption and ID-based encryption rather than average 50% the algorithm processing is more efficient
 Keywords
Personal Healthcare Record:PHR;Hospital Information System:HIS;Key Management System;Hierarchical;
 Language
Korean
 Cited by
 References
1.
J. E. Song, S. H. Kim, M. A. Jung and K. I. Jung, “Medical information securiey of u-Healthcare service” Journal of The Korean Institute of Communications and Information Sciences, vol. 17, no. 1, pp. 47~56, 2007.

2.
K. J. Kim and S. P. Hong, “Privacy Information Protection Model in e-Healthcare Environment” Journal of The Korean Society for Internet Informatin, vol. 10, no. 2, 2008.

3.
Wong, K. Chung, G. Mohamed, and S. L. Simon,Lam. "Secure group communications using key graphs." in Proceeding of the IEEE/ACM Transactions, vol. 8. no. 1, pp.16-30, 2000.

4.
Q. D Vu, B. N. Thai, and Een-Kee Hong. "A New Scheme for Multi-user Cooperation System Based on Iterative Decoder"in Proceeding of the KICIS Transactions. pp. 39-40. 2011.

5.
J. H. Lee, J. S. Yu, H. J. Yoon and H.J Jang, “ System for Protecting Medical Informatio” Journal of The Korean Society for Internet Informatin, pp. 429-434, 2010.

6.
Q. Jiang, J. Ma, Z. Ma and G. Li, “A privacy enhanced authentication scheme for telecare medical information systems” Journal of Medical Systems, vol. 36, no. 3, pp 1529-1535, 2012. crossref(new window)

7.
P. Kumar, S. G. Lee and H. J. Lee, "E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks" in Proceeding of the Sensors2012 Transactions, pp. 1625-1647, 2012.

8.
Y. D. Joo, “Security Improvements on Smart-Card Based Mutual Authentication Scheme” Webcasting, Journal of The Internet and Telecommunication, vol. 12, no. 6, pp. 91-98, 2012. crossref(new window)

9.
Y. B. Cho, S. H. Woo and S. H Lee, “ IDE-LEACH Protocol for Trust and Energy Efficient Operation of WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol 38B, no. 10, pp. 801-807, 2013. crossref(new window)

10.
Y. D. Joo and Y. H. An, “Improvements of a Dynamic ID-Based Remote User Authentication Scheme” Journal of The Institute of Webcasting, Internet and Telecommunication, vol. 11, no. 6, pp. 303-310, 2011.

11.
Y. B. Cho, and S. H Lee, “An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment” Journal of The Korean Institute of Communications and Information Sciences, vol. 37B, no.3, pp. 149-157, 2013.

12.
K. Y. Choi, J. Y.Hwang and D. H.Lee, "ID-based Authenticated Group Key Agreement Secure against insider Attacks" in Proceeding of the IEICE Transactions. Fundamentals, vol. E91-A, no. 7, pp. 1828-1830, 2008.

13.
Y. Yu,. "Identity Privacy-Preserving Public Auditing with Dynamic Group for Secure Mobile Cloud Storage" in Proceeding of the Network and System Security Transactions, Springer International Publishing, pp. 28-40, 2014.

14.
A. Shamir, "How to share a secret." , in Proceeding of the Communications of the ACM Transactions, pp. 612-613, Nov, 1979.

15.
B. Libert and J. Quisquater, “New Identity Based Signcryption Schemes from Pairings” IEEE Information Theory Workshop, http://eprint.iacr.org/2003/023, 2003.

16.
H. L. Chae, and P. J. Lee. "Remarks on convertible group signatures of Asiacrypt'96." Electronics Letters vol.33, no.5, pp383-384, 1997. crossref(new window)