Presentation of an Efficient and Secure Architecture for e-Health Services

被引:0
|
作者
Nejadeh, Mohamad [1 ]
Mohamadi, Shahriar [2 ]
机构
[1] Guilan Univ, Dept Informat Technol, Int Pardis Branch, Rasht, Iran
[2] Khajeh Nasir Toosi Univ, Tehran, Iran
关键词
access control; cryptography; digital signature; Log strategy;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays a great number of activities are performed via internet. With increment in such activities, two groups of services are required for providing a secure platform: 1- Access control services, 2- communication security services. In this article we propose a secure and efficient system for establishment of secure communication in e-health. This architecture focuses on five security indicators of authorization, authentication, integrity, non-repudiation and confidentiality. This architecture uses an efficient encryption scheme, which is a combination of the public key and the symmetric key encryption systems, all of which are combined with a log strategy In this article we have used a new role-based control model to provide the security requirement of authorization for user's access to data. Data sensitivity is measured based on the labels given to the roles; and then these data are encrypted with proper cryptography algorithms. In a comparison of these architectures, you will see that this architecture enjoys an efficient mechanism, which is very suitable and practical for communication and interchange of data.
引用
收藏
页码:551 / +
页数:2
相关论文
共 50 条
  • [41] A FRAMEWORK FOR SECURE COMMUNICATION OF MOBILE E-HEALTH APPLICATIONS
    Burgsteiner, H.
    Prietl, J.
    EHEALTH2008 - MEDICAL INFORMATICS MEETS EHEALTH, 2008, : 107 - 113
  • [42] AN ASSESSMENT OF E-HEALTH SERVICES IMPLEMENTATION IN ROMANIA
    Popescu, Alina -Irina
    METALURGIA INTERNATIONAL, 2010, 15 (03): : 62 - 66
  • [43] E-health services and technologies - The way ahead
    Shishkov, Boris
    Konstantas, Dimitri
    Filipe, Joaquim
    ICSOFT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL ISDM/WSEHST/DC, 2007, : 235 - +
  • [44] Understanding the implementation and integration of e-health services
    Mair, Frances S.
    May, Carl
    Finch, Tracy
    Murray, Elizabeth
    Anderson, George
    Sullivan, Frank
    O'Donnell, Catherine
    Wallace, Paul
    Epstein, Owen
    JOURNAL OF TELEMEDICINE AND TELECARE, 2007, 13 : S36 - S37
  • [45] An Area Efficient Architecture of a Novel Chaotic System for High Randomness Security in e-Health
    Tsantikidou, Kyriaki
    Sklavos, Nicolas
    IEEE COMPUTER ARCHITECTURE LETTERS, 2024, 23 (01) : 104 - 107
  • [46] An efficient secure channel establishment through lightweight key distribution in e-health communication systems
    Ebrahimi I.
    Nikooghadam M.
    Multimedia Tools and Applications, 2025, 84 (11) : 9111 - 9131
  • [47] A Web Architecture for E-Health Applications Supporting the Efficient Multipath Transport of Medical Images
    Inamdar, Kibriya
    Pilapprathodi, Oormila Ramanandan Kottayi
    John, Jopaul
    Wolff, Markus
    Grossmann, Marcel
    Krieger, Udo R.
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 136 - 152
  • [48] Secure and Energy Efficient-Based E-Health Care Framework for Green Internet of Things
    Kaur, Manjit
    Singh, Dilbag
    Kumar, Vijay
    Gupta, B. B.
    Abd El-Latif, Ahmed A.
    IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2021, 5 (03): : 1223 - 1231
  • [49] EACS: Expressible Access Control Scheme for Secure Services and Data Delegation in Collaborative E-health System
    Olakanmi O.O.
    Odeyemi K.O.
    Information Security Journal, 2022, 31 (03): : 274 - 288
  • [50] Bridging the Gap between e-Government and e-Health: Recommendations for Deploying e-Health Services in the Public Sector
    Koddebusch, Michael
    Koelmann, Holger
    Friedrich, Ole
    Becker, Joerg
    TOGETHER IN THE UNSTABLE WORLD: DIGITAL GOVERNMENT AND SOLIDARITY, 2023, : 440 - 448