JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service
Kim, Donghyun; Kim, Seoksoo;
  PDF(new window)
 Abstract
The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.
 Keywords
Key Management;Health Information;Ubiquitous Healthcare;Key Tree;Information Security;
 Language
Korean
 Cited by
1.
Medical Convergence Analysis of Complaint about Medical Service in an Affiliated Hospital, Journal of the Korea Convergence Society, 2016, 7, 5, 117  crossref(new windwow)
2.
Telemedicine System for Korean Beef Cattle Converging Livestock Farming Practices & ICT, Journal of Digital Convergence, 2016, 14, 12, 217  crossref(new windwow)
3.
The influence of health information source credibility and e health literacy on health information orientation of parents of local hospitalized children, Journal of Digital Convergence, 2016, 14, 6, 295  crossref(new windwow)
4.
The Design and Analysis of a Secure Personal Healthcare System Based on Certificates, Symmetry, 2016, 8, 11, 129  crossref(new windwow)
5.
Development of Prediction Model for Prevalence of Metabolic Syndrome Using Data Mining: Korea National Health and Nutrition Examination Study, Journal of Digital Convergence, 2016, 14, 2, 325  crossref(new windwow)
6.
Secure biometric information delivery scheme of implantable device using code-division multiplexing method, Journal of Digital Convergence, 2016, 14, 3, 235  crossref(new windwow)
7.
Program Develope and Class Design for Convergence ICT and Character Education, Journal of Digital Convergence, 2016, 14, 9, 9  crossref(new windwow)
8.
Personal Health Record System for Efficient Monitoring of Cancer Therapy, Journal of Digital Convergence, 2016, 14, 12, 65  crossref(new windwow)
9.
Development achievement criteria of Creativity and Personality in Expressive Activity, Journal of Digital Convergence, 2016, 14, 6, 519  crossref(new windwow)
 References
1.
A. Berler, S. Pavlopoulos, D. Koutsouris, "Design of an interoperability framework in a regional healthcare system", In:Proceedings of Engineering in Medicine and Biology Society, Vol. 2, pp. 3093-3096, 2004.

2.
R. Heeks, "Health information systems: Failure, success and improvisation", International journal of medical informatics Vol. 75, No. 2, pp. 125-137, 2006. crossref(new window)

3.
S.K. Katsikas, "Health care management and information systems security:awareness, training or education", In:Int. J.Med. Informatics 60, pp. 129-135, 2000. crossref(new window)

4.
S. Rafaeli, D. Hutchison, "A survey of key management for secure group communication", In:ACM Computing Surveys 35, Vol. 3, pp. 309-329, 2003. crossref(new window)

5.
T. Rindfleisch, "Privacy, information technology, and health care", In:Communications of the ACM, Vol. 40, No. 8, pp. 92-100, 1997.

6.
J. Bohn, F. Gartner, H. Vogt, Dependability Issues of Pervasive Computing in a Healthcare Environment", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol.2802, pp.53-70, 2004. crossref(new window)

7.
S. Weis, S. Sarma, R. Rivest, D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2004.

8.
Y.B. Kim, M. Kim, Y.J. Lee, "COSMOS: a middleware platform for sensor networks and a u-healthcare service", Proceedings of the 2008 ACM symposium on Applied computing. pp. 512-513, 2008.

9.
L. Zhang, B. Chu, "A Role-Based Delegation Framework for Healthcare Information Systems", In:ACM Symposium on Access Control Models And Technologies(SACMAT), pp. 125-134, 2002.

10.
C. Wong, M. Gouda, S. Lam, "Secure group communications using key graphs, Networking", IEEE/ACM Transactions on Networking, Vol. 8, No. 1, pp. 16-30, 1998.

11.
S. Muhammad, K. Raazi, S. Lee, Y. Lee, "A Novel Architecture for Efficient Key Management in Humanware Applications", In: Fifth International Joint Conference on INC, IMS and IDC, pp. 1918-1922, 2009.

12.
S. Muhammad, K. Raazi, S. Lee, Y. Lee, "TIMAR: an efficient key management scheme for ubiquitous health care environments", In:Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, United Kingdom, p. 33, 2009.

13.
J.S. Shapiro, G. Kuperman, Health information exchange." Medical informatics: An executive primer, (Ed. Ong, KR) Healthcare Information & Management Systems Society, pp. 147-16, 2011.

14.
M. Das, A. Saxena, V. Gulati, D. Phatak, "Hierarchical key management scheme using polynomial interpolation", SIGOPS Operational Systematic Review, Vol. 39, No. 1, pp. 40-47, 2005. crossref(new window)

15.
D. Dolev, A.C. Yao, On the security of public key protocols." Information Theory, IEEE Transactions on, Vol. 29, No. 2, pp. 198-208, 1983.