Research on Patient Privacy-Preservation for Wireless Health Monitoring System

Article Preview

Abstract:

With research and development of the telemedicine and the electronic patient information, the remote wireless health monitoring system is facing the challenge of patient privacy protection. This paper proposes an effective patient privacy protection protocol, which protect the privacy of patient information with the encryption algorithm based on identity-based cryptography (IBC) and digital signature during the process of sending, receiving and accessing the patient information, and resist the path monitoring attack of identifying the contact between patients and doctors with the network stream analysis.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

938-942

Citation:

Online since:

August 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Rash, M.C. Privacy concerns hinder electronic medical records. The Business Journal of the Greater Triad Area (Apr. 4, 2005).

Google Scholar

[2] Lin X, Lu R, Shen X, Nemoto Y, Kato N. SAGE: a strong privacy preserving scheme against global eavesdropping for ehealth systems. IEEE Journal of Selected Areas of Communications.

DOI: 10.1109/jsac.2009.090502

Google Scholar

[3] Ou, C. -M. and Ou, C. R., A High-Level 3G Wireless PKI Solution for Secure Healthcare Communications, EuroPKI 2006, Lecture Notes in Computer Science 4043, Springer-Verlag, 2006, pp.254-256.

DOI: 10.1007/11774716_22

Google Scholar

[4] Yuhai Zhang, Yongyong Xu, Lei Shang, etc. An investigation into health informatics and related standards in China. International Journal of Medical Informatics[J]. 2007(76), 614–620.

DOI: 10.1016/j.ijmedinf.2006.05.003

Google Scholar

[5] M. Layouni, K. Verslype, M. T. Sandikkaya. Privacy-Preserving Telemonitoring for eHealth. Data and Applications Security 2009, LNCS 5645, p.95–110, (2009).

DOI: 10.1007/978-3-642-03007-9_7

Google Scholar

[6] Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, Securing U-Healthcare Sensor Networks using Public Key Based Scheme, ICACT 2008:17-20.

DOI: 10.1109/icact.2008.4493960

Google Scholar

[7] U. Sax, I. Kohane, and K.D. Mandl, Wireless Technology Infrastructures for Authentication of Patients: PKI That Rings, J. Am. Medical Informatics Assoc., vol. 12, no. 3, pp.263-268, (2005).

DOI: 10.1197/jamia.m1681

Google Scholar

[8] D. Boneh and M. Franklin, Identity-based encryption from the weil pairings. Advances in Cryptology-Asiacrypt Springer-Verlag, 2001. LNCS 2248, pp.514-532.

Google Scholar

[9] J. Cha and J. Cheon, An identity-based signature from gap diffie-hellman groups. in Prof. Practice and Theory in Public Key Cryptography– PKC'2003, Springer-Verlag, 2003. LNCS 21392567 pp.18-30.

DOI: 10.1007/3-540-36288-6_2

Google Scholar