Fig. 1. Process for issuing public certificate of EMR system
Fig. 2. Process for authentication based on public certificate of EMR system
Fig. 3. Fingerprint registration process for fingerprint recognition-based EMR system
Fig. 4. Fingerprint Certification Process of the fingerprint recognition-based EMR system
Fig. 5. Private Key Escrow Protocol
Fig. 6. Private key fetch protocol
Table 1. Result of EMR digital signature
Table 2. Result of EMR fingerprint recognition
References
- C. S. Kruse, B. Smith, H. Vanderlinden, A. Nealand, "Security Techniques for the Electronic Health Records", Journal of Medical Systems, Vol.41, No.8, pp.127-139, July 2017. DOI: https://doi.org/10.1007/s10916-017-0778-4
- J. S. Lee, H. J. Kim, M. S. Jun, "A Study on a Secure Internet Service Provider Model Using Smart Secure-Pad," Journal of the Korea Academia-Industrial, Vol.14, No.3, pp.1428-1438, 2015. DOI: http://dx.doi.org/10.5762/KAIS.2013.14.3.1428
- J. W. Kim, J. H. Park, M. S. Jun, "A Design of Smart Banking System using Digital Signature based on Biometric Authentication", Journal of the Korea Academia-Industrial, Vol.16, No.9, pp.6282-6289, 2015. DOI: http://dx.doi.org/10.5762/KAIS.2015.16.9.6282
- G. D. Mogli, "Fingerprint-based crypto-biometric system for network security", Journal on Information Security, Vol.2, No.4, pp.156-165, 2011. DOI: http://dx.doi.org/10.4038/sljbmi.v2i4.2245
- S. Y. Min, B. W. Jin, "Design of Integrated Authentication Scheme for Safe Personal Information Management in a U-Health Environment," Journal of the Korea Academia-Industrial, Vol.15, No.6, pp.3865-3871, 2014. DOI: http://dx.doi.org/10.5762/KAIS.2014.15.6.3865
- S. Barman, D. Samanta, S. Chattopadhyay, "Role of Biometrics in healthcare privacy and security management system", Journal of Bio-Medical Informatics, Vol.2015, No.3, pp.1-12, April 2015. DOI: https://doi.org/10.1186/s13635-015-0020-1
- H. Chao, S. Twu, C. Hsu, "A Patient-Identity Security Mechanism For Electronic Medical Records (EMRs) During Transit and At Rest", Journal of Medical Informatics and the Internet in Medicine, Vol.30, No.3, pp.227-240, July 2009. DOI: https://doi.org/10.1080/14639230500209443
- W. Yang, S. Wang, J. Hu, G. Zheng, C. Valli, "Security and accuracy of fingerprint-based biometrics: A review", International Journal of Symmetry, Vol.11, No.2, pp.141-150, 2019. DOI: https://doi.org/10.3390/sym11020141
- N. Lo, C. Wu, Yo. Chuang, "An authentication and authorization mechanism for long-term electronic health records management", Journal of Procedia Computer Science, Vol.111, pp.145-453, 2017. DOI: https://doi.org/10.1016/j.procs.2017.06.021
- Zhou, X. Lin, X. Dong, Z. Cao, "PSMPA: Patient Self-controllable and Multi-level Privacy-preserving Cooperative Authentication in Distributed m-Healthcare Cloud Computing System", IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.6, pp.1693-1703, 2015. DOI: https://doi.org/10.1109/TPDS.2014.2314119
- M. Vigil, D. Cabarcas, J. Buchmann, J. Huang, "Assessing trust in the long-term protection of documents", 2013 IEEE Symposium on Computers and Communication(ISCC),Split, Croatia, 7-10 July 2013. DOI: https://doi.org/10.1109/ISCC.2013.6754943
- W. Lei, Y. Li, Y. Sang, H. Shen, "A Secure Anonymous Authentication Scheme for Electronic Medical Records Systems", 2016 IEEE 13th International Conference on e-Business Engineering (ICEBE), pp. 48-55, Macau, China, Nov. 2016. DOI: https://doi.org/10.1109/ICEBE.2016.019
- V. Liu, M. Musen,T. Chou, "Data Breaches of Protected Health Information in the United States", Journal of the American Medical Association, Vol.313, No.14, pp.1471-1473, 2015. DOI: https://doi.org/10.1001/jama.2015.2252
- H. Ma, R. Zhang, G. Yang, Z. Song, K. He, Y. Xiao, "Efficient Fine-Grained Data Sharing Mechanism for Electronic Medical Record Systems with Mobile Devices", IEEE Transactions on Dependable and Secure Computing, pp.1-11, June 2018. DOI: https://doi.org/10.1109/TDSC.2018.2844814