A Study on the Secure User Profiling Structure and Procedure for Home Healthcare Systems
Top Cited Papers
- 29 October 2015
- journal article
- Published by Springer Science and Business Media LLC in Journal of Medical Systems
- Vol. 40 (1), 1-9
- https://doi.org/10.1007/s10916-015-0365-5
Abstract
Despite of various benefits such as a convenience and efficiency, home healthcare systems have some inherent security risks that may cause a serious leak on personal health information. This work presents a Secure User Profiling Structure which has the patient information including their health information. A patient and a hospital keep it at that same time, they share the updated data. While they share the data and communicate, the data can be leaked. To solve the security problems, a secure communication channel with a hash function and an One-Time Password between a client and a hospital should be established and to generate an input value to an OTP, it uses a dual hash-function. This work presents a dual hash function-based approach to generate the One-Time Password ensuring a secure communication channel with the secured key. In result, attackers are unable to decrypt the leaked information because of the secured key; in addition, the proposed method outperforms the existing methods in terms of computation cost.Keywords
This publication has 15 references indexed in Scilit:
- Improved Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 2013
- A Privacy Enhanced Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 2013
- An Efficient and Secure Certificateless Authentication Protocol for Healthcare System on Wireless Medical Sensor NetworksThe Scientific World Journal, 2013
- An Efficient and Secure Dynamic ID-based Authentication Scheme for Telecare Medical Information SystemsJournal of Medical Systems, 2012
- An Efficient Authentication Scheme for Telecare Medicine Information SystemsJournal of Medical Systems, 2012
- Provably secure and efficient certificateless authenticated tripartite key agreement protocolMathematical and Computer Modelling, 2012
- Linguistic protocols for secure information management and sharingComputers & Mathematics with Applications, 2012
- Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme’Computer Communications, 2011
- Simulatable certificateless two-party authenticated key agreement protocolInformation Sciences, 2010
- Security Framework for Pervasive Healthcare Architectures Utilizing MPEG-21 IPMP ComponentsInternational Journal of Telemedicine and Applications, 2008