Presentation of an Efficient and Secure Architecture for e-Health Services

被引:0
|
作者
Nejadeh, Mohamad [1 ]
Mohamadi, Shahriar [2 ]
机构
[1] Guilan Univ, Dept Informat Technol, Int Pardis Branch, Rasht, Iran
[2] Khajeh Nasir Toosi Univ, Tehran, Iran
关键词
access control; cryptography; digital signature; Log strategy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays a great number of activities are performed via internet. With increment in such activities, two groups of services are required for providing a secure platform: 1- Access control services, 2- communication security services. In this article we propose a secure and efficient system for establishment of secure communication in e-health. This architecture focuses on five security indicators of authorization, authentication, integrity, non-repudiation and confidentiality. This architecture uses an efficient encryption scheme, which is a combination of the public key and the symmetric key encryption systems, all of which are combined with a log strategy In this article we have used a new role-based control model to provide the security requirement of authorization for user's access to data. Data sensitivity is measured based on the labels given to the roles; and then these data are encrypted with proper cryptography algorithms. In a comparison of these architectures, you will see that this architecture enjoys an efficient mechanism, which is very suitable and practical for communication and interchange of data.
引用
收藏
页码:551 / +
页数:2
相关论文
共 50 条
  • [1] A security architecture for e-health services
    Sulaiman, Rossilawati
    Sharma, Dharmendra
    Ma, Wanli
    Tran, Dat
    10TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III: INNOVATIONS TOWARD FUTURE NETWORKS AND SERVICES, 2008, : 999 - 1004
  • [2] Secure Document Circulation: An Architecture for e-Health
    Bracher, Shane
    Krishnan, Padmanabhan
    ELECTRONIC JOURNAL OF HEALTH INFORMATICS, 2008, 3 (01):
  • [3] E-health Services with Secure Mobile Agent
    Sulaiman, Rossilawati
    Huang, Xu
    Sharma, Dharmendra
    2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE, 2009, : 270 - 277
  • [4] Authentication and Secure Key Management in E-Health Services: A Robust and Efficient Protocol Using Biometrics
    Mehmood, Zahid
    Ghani, Anwar
    Chen, Gongliang
    Alghamdi, Ahmed S.
    IEEE ACCESS, 2019, 7 : 113385 - 113397
  • [5] E-health Services Architecture for Health Chacao on Metropolitan Wireless Networks
    Fuenmayor, Claudia
    Morales, B.
    Ana, V
    INNOVATION AND KNOWLEDGE MANAGEMENT IN BUSINESS GLOBALIZATION: THEORY & PRACTICE, VOLS 1 AND 2, 2008, : 283 - 291
  • [6] Secure and Efficient E-health Scheme Based on the Internet of Things
    Hussien, Zaid Alaa
    Jin, Hai
    Abduljabbar, Zaid Ameen
    Hussain, Mohammed Abdulridha
    Yassin, Ali A.
    Abbdal, Salah H.
    Al Sibahee, Mustafa A.
    Zou, Deqing
    2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2016,
  • [7] On secure e-health systems
    Markovic, Milan
    Privacy in Statistical Databases, Proceedings, 2006, 4302 : 360 - 374
  • [8] A New Framework Architecture for Next Generation e-Health Services
    Fengou, Maria-Anna
    Mantas, Georgios
    Lymberopoulos, Dimitrios
    Komninos, Nikos
    Fengos, Spyros
    Lazarou, Nikolaos
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2013, 17 (01) : 9 - 18
  • [9] SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks
    Zhang, Liping
    Wei, Zhen
    Ren, Wei
    Zheng, Xianghan
    Choo, Kim-Kwang Raymond
    Xiong, Neal N.
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (02): : 1502 - 1516
  • [10] SEECC: A Secure and Efficient Elliptic Curve Cryptosystem for E-health Applications
    Sahebi, Golnaz
    Majd, Amin
    Ebrahimi, Masoumeh
    Plosila, Juha
    Karimpour, Japer
    Tenhunen, Hannu
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 492 - 500