DOI QR코드

DOI QR Code

Access Control Protocol for Privacy Guarantee of Patient in Emergency Environment

응급 상황에서 환자의 프라이버시를 보장하는 속성기반 접근 제어 프로토콜

  • Jeong, Yoon-Su (Dept. of Information Communication & Engineeringe, Mokwon University) ;
  • Han, Kun-Hee (Dept. of Information Communication & Engineeringe, Baeseok University) ;
  • Lee, Sang-Ho (Dept. of Software, Chungbuk National University)
  • 정윤수 (목원대학교 정보통신공학과) ;
  • 한군희 (백석대학교 정보통신공학과) ;
  • 이상호 (충북대학교 소프트웨어학과)
  • Received : 2014.05.18
  • Accepted : 2014.07.20
  • Published : 2014.07.28

Abstract

Recently, m-health care is be a problem that the patient's information is easily exposed to third parties in case of emergency situation. This paper propose an attribute-based access control protocol to minimize the exposure to patient privacy using patient information in the emergency environment. Proposed protocol, the patient's sensitive information to a third party do not expose sensitive information to the patient's personal health information, including hospital staff and patients on a random number to generate cryptographic keys to sign hash. In addition, patient information from a third party that is in order to prevent the illegal exploitation of the patient and the hospital staff to maintain synchronization between to prevent the leakage of personal health information.

최근 m-헬스케어는 응급상황이 발생할 경우, 환자의 정보가 제 3자에게 쉽게 노출되어 악용될 수 있는 문제가 있다. 본 논문에서는 m-헬스케어의 응급상황 환경에서 환자의 정보를 이용하여 환자의 프라이버시 노출을 최소화하기 위한 속성 기반의 환자 접근 제어 프로토콜을 제안한다. 제안 프로토콜은 환자의 민감한 정보를 제 3자에게 노출시키지 않도록 환자의 민감한 정보를 개인 건강 정보에 포함하여 병원관계자와 환자가 생성한 랜덤수로 해쉬한 서명키로 암호화한다. 또한 제 3자로부터 환자 정보가 불법적으로 악용되는 것을 예방하기 위해서 환자와 병원관계자 사이의 동기화를 유지함으로써 개인 건강 정보의 유출을 예방한다.

Keywords

References

  1. Y. Y. Shieh, F. Y. Tsai, Arash, M. D. Wang, C.-M.C.Lin(2007), "Mobile Healthcare: Opportunities and Challenges", International conference on the Management of Mobile Business(ICMB 2007), pp. 50.
  2. J. Zhou, Z. Cao, X. L. Dong, X. D. Lin(2013), "Securing m-healthcare social networks: challenges, countermeasures and future directions", IEEE Wireless Communications, Vol. 20, No. 4, pp. 12-21.
  3. R. X. Lu, X. D. Lin, X. M. Shen(2013), "SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency", IEEE Transaction on Parallel and Distributed Systems, Vol. 24, No. 3, pp. 614-624. https://doi.org/10.1109/TPDS.2012.146
  4. F. Miao, L. Jiang, Y. Li, Y. T. Zhang(2009), "Biometrics based novel key distribution solution for body sensor networks", 2009. Annual International Conference of the IEEE Engineering in Medicine and Biology Society(2009 EMBC), pp. 2458-2461.
  5. F. Miao, L. Jiang, Y. Li, Y. T. Zhang(2009), "A Novel Biometrics Based Security Solution for Body Sensor Networks", 2nd International conference on biuomedical Engineering and Informatics 2009(BMEI '09), pp. 1-5.
  6. G. Sudha, R. Ganesan(2013), "Secure transmission medical data for pervasive healthcare system using android", 2013 International Conference on Communications and Signal Processing(ICCSP), pp. 433-436
  7. U. Harish, R. Ganesan(2012), "Design and development of secured m-healthcare system", 2012 International conference on Advances in Engineering, Science and Management(ICAESM), pp. 470-473.
  8. M. Y. Hwang, C. H. Jin, U. Yun, K. D. Kim and K. H. Ryu(2012), "Building of prediction model of wind power generation using power ramp rate", Journal of the Korea Society of Computer and Information, vol. 17, pp. 211-218. https://doi.org/10.9708/jksci.2012.17.1.211

Cited by

  1. Trend and Improvement for Privacy Protection of Future Internet vol.14, pp.6, 2016, https://doi.org/10.14400/JDC.2016.14.6.405
  2. A Study of Security Threats in Bluetooth v4.1 Beacon based Coupon Convergence Service vol.6, pp.2, 2015, https://doi.org/10.15207/JKCS.2015.6.2.065