Abstract
In mobile healthcare (“m-healthcare”), a lot of attention is being paid nowadays to the construction of a better healthcare environment than the existing health monitoring system provided by connecting the smart phone to an implantable medical device. In the case of m-healthcare, however, the problem of a patient’s information easily exposed to a third party and misused in an emergency situation still persists. This research paper proposed the attribute-based patient access control protocol to minimize violation of a patient’s privacy using the patient’s information saved in a smart phone in the environment of an emergency situation of m-healthcare. The proposed protocol, to prevent the exposure of a patient’s sensitive information to a third party, includes sensitive information of the patient in Personal Health Information (PHI) and encodes the information with a signature key hashed by a random number created by the u-healthcare service center and the patient in question. In addition, to prevent misuse of patient information by a third party, the leak of PHI can be prevented by maintaining synchronization between the patient and officials at a hospital.




Similar content being viewed by others
References
Agoulmine, N., Ray, P., & Wu, T. H. (2012). Efficient and cost-effective communications in ubiquitous healthcare: Wireless sensors, devices and solutions. IEEE Communications Magazine, 50(5), 90–91.
Zhou, J., Cao, Z., Dong, X., Lin, X., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12–21.
Prasad, N. R., Mihovska, A., & Nielsen, R. H. (2012). Guest editorial: Special issue on opportunities, goals and challenges in next generation ICT-based systems. Wireless Personal Communications, 66(3), 489–491.
Arumugam, S., Kalle, R. K., & Prasad, A. R. (2013). Wireless robitics: Opportunities and challenges. Wireless Personal Communications, 70(3), 1033–1058.
Boukerche, A., & Ren, Y. (2009). A secure mobile healthcare system using trust-based multicast scheme. IEEE Journal on Selected Areas in Communications, 27(4), 387–399.
Rongxing, L., Xiaodong, L., & Xuemin, S. (2013). SPOC : A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.
Ren, Y., Pazzi, R. W. N., & Boukerche, A. (2010). Monitoring patients via a secure and mobile healthcare system. IEEE Wireless Communications, 17(1), 59–65.
Misra, S., Tiwari, V., & Obaidat, M. S. (2009). Lacas: Learning automata-based congestion avoidance scheme for healthcare wireless sensor networks. IEEE Journal on Selected Areas in Communications, 27(4), 466–479.
Bao, S. D., Poon, C. C. Y., Zhang, Y. T., & Shen, L. F. (2008). Using the timing information of heartbeats as an entity identifier to secure body sensor network. IEEE Transactions on Information Technology in Biomedicine, 12(6), 772–779.
Jun, Z., Zhenfu, C., Xiaolei, D., Xiaodong, L., & Vasilakos, A. V. (2013). Securing m-healthcare social networks: Challenges, countermeasures and future directions. IEEE Wireless Communications, 20(4), 12–21.
Toninelli, A., Montanari, R., & Corradi, A. (2009). Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wireless Communications, 16(3), 24–32.
Wang, W., Wang, H., Hempel, M., Peng, D., Sharif, H., & Chen, H. H. (2011). Secure stochastic ECG signals based on Gaussian mixture model for e-Healthcare systems. IEEE Systems Journal, 5(4), 564–573.
Yu, S., Ren, K., & Lou, W. (2011). FDAC: Toward fine-grained distributed data access control in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 22(4), 673–686.
Hoque, M. D. E., Rahman, F., Ahamed, S. I., & Park, J. H. (2010). Enhancing privacy and security of RFID system with serverless authentication and serarch protocols in pervasive environments. Wireless Personal Communications, 55(1), 65–79.
Yun, S. H., Lim, H. S., Jeong, S. S., Jung, S. Y., & Chang, J. K. (2011). The biometric based convertible undeniable multi-signature scheme to ensure multi-author copyrights and profits. Wireless Personal Communications, 60(3), 405–418.
Liang, X., Barua, M., Lu, R., Lin, x, & Shen, X. (2012). HealthShare: Achieving secure and privacy-preserving health information sharing through health social networks. Computer Communications, 35(15), 1910–1920.
Lu, R., Lin, X., & Shen, X. (2013). SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614–624.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jeong, YS., Lee, SH. & Shin, SS. Access Control Protocol Based on Privacy Property of Patient in m-Healthcare Emergency. Wireless Pers Commun 79, 2565–2578 (2014). https://doi.org/10.1007/s11277-014-1767-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-014-1767-2