Skip to main content

Advertisement

Log in

Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

In mobile healthcare (“m-healthcare”), a lot of attention is being paid nowadays to the construction of a better healthcare environment than the existing health monitoring system provided by connecting the smart phone to an implantable medical device. In the case of m-healthcare, however, the problem of a patient’s information easily exposed to a third party and misused in an emergency situation still persists. This research paper proposed the attribute-based patient access control protocol to minimize violation of a patient’s privacy using the patient’s information saved in a smart phone in the environment of an emergency situation of m-healthcare. The proposed protocol, to prevent the exposure of a patient’s sensitive information to a third party, includes sensitive information of the patient in Personal Health Information (PHI) and encodes the information with a signature key hashed by a random number created by the u-healthcare service center and the patient in question. In addition, to prevent misuse of patient information by a third party, the leak of PHI can be prevented by maintaining synchronization between the patient and officials at a hospital.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Agoulmine, N., Ray, P., & Wu, T. H. (2012). Efficient and cost-effective communications in ubiquitous healthcare: Wireless sensors, devices and solutions. IEEE Communications Magazine, 50(5), 90–91.

    Article  Google Scholar 

  2. Zhou, J., Cao, Z., Dong, X., Lin, X., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12–21.

    Article  Google Scholar 

  3. Prasad, N. R., Mihovska, A., & Nielsen, R. H. (2012). Guest editorial: Special issue on opportunities, goals and challenges in next generation ICT-based systems. Wireless Personal Communications, 66(3), 489–491.

    Article  Google Scholar 

  4. Arumugam, S., Kalle, R. K., & Prasad, A. R. (2013). Wireless robitics: Opportunities and challenges. Wireless Personal Communications, 70(3), 1033–1058.

    Article  Google Scholar 

  5. Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387–399.

    Article  Google Scholar 

  6. Rongxing, L., Xiaodong, L., & Xuemin, S. (2013). SPOC : A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.

    Article  Google Scholar 

  7. Ren, Y., Pazzi, R. W. N., & Boukerche, A. (2010). Monitoring patients via a secure and mobile healthcare system. IEEE Wireless Communications, 17(1), 59–65.

    Article  Google Scholar 

  8. Misra, S., Tiwari, V., & Obaidat, M. S. (2009). Lacas: Learning automata-based congestion avoidance scheme for healthcare wireless sensor networks. IEEE Journal on Selected Areas in Communications, 27(4), 466–479.

    Article  Google Scholar 

  9. Bao, S. D., Poon, C. C. Y., Zhang, Y. T., & Shen, L. F. (2008). Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Transactions on Information Technology in Biomedicine, 12(6), 772–779.

    Article  Google Scholar 

  10. Jun, Z., Zhenfu, C., Xiaolei, D., Xiaodong, L., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12–21.

    Article  Google Scholar 

  11. Toninelli, A., Montanari, R., & Corradi, A. (2009). Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wireless Communications, 16(3), 24–32.

    Article  Google Scholar 

  12. Wang, W., Wang, H., Hempel, M., Peng, D., Sharif, H., & Chen, H. H. (2011). Secure stochastic ECG signals based on Gaussian mixture model for e-Healthcare systems. IEEE Systems Journal, 5(4), 564–573.

    Article  Google Scholar 

  13. Yu, S., Ren, K., & Lou, W. (2011). FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(4), 673–686.

    Article  Google Scholar 

  14. Hoque, M. D. E., Rahman, F., Ahamed, S. I., & Park, J. H. (2010). Enhancing privacy and security of RFID system with serverless authentication and serarch protocols in pervasive environments. Wireless Personal Communications, 55(1), 65–79.

    Article  Google Scholar 

  15. Yun, S. H., Lim, H. S., Jeong, S. S., Jung, S. Y., & Chang, J. K. (2011). The biometric based convertible undeniable multi-signature scheme to ensure multi-author copyrights and profits. Wireless Personal Communications, 60(3), 405–418.

    Article  Google Scholar 

  16. Liang, X., Barua, M., Lu, R., Lin, x, & Shen, X. (2012). HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks. Computer Communications, 35(15), 1910–1920.

    Article  Google Scholar 

  17. Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yoon-Su Jeong.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jeong, YS., Lee, SH. & Shin, SS. Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency. Wireless Pers Commun 79, 2565–2578 (2014). https://doi.org/10.1007/s11277-014-1767-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-014-1767-2

Keywords