skip to main content
10.1145/3472813.3473188acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicmhiConference Proceedingsconference-collections
research-article

A Secure and Efficient Access Control Scheme Based on PUF for Health Information Systems

Published:26 October 2021Publication History

ABSTRACT

Lightweight computing technology is the trend of future information technology. Related research technologies are applied to electronic health records and electronic medical records, and only consider the mutual authentication of users and the confidentiality of data transmission. In addition, most researches still rely on time-consuming modular exponential calculations, elliptic-curve based signatures and encryption algorithms. However, few studies can fully consider the development of lightweight access control mechanisms for health care information database systems. Physically Unclonable Functions (PUF) devices are based on unique physical changes that occur naturally in the semiconductor manufacturing process, resulting in unique identification and unpredictability. They are used in authentication and encryption mechanisms and have significant improvements in performance. This investigation discusses and analyses on the privacy protection, authorization and access control characteristics of the health care information database, and develops a secure and efficient access control scheme by using PUF technology for health information systems. The proposed access control scheme not only improves the privacy and security of patient medical records, but also makes the entire medical process more efficient.

References

  1. The USA government. HIPAA, 1996a; HIPAA, 1996b, pp.104-191.Google ScholarGoogle Scholar
  2. Lee W. B. and Lee C.D. 2008. A cryptographic key management solution for HIPAA privacy/security regulations. IEEE Transactions on Information Technology in Biomedicine 12, 1, 34-41.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Wu J.E. 2011. Improved Cryptographic Key Management Scheme for HIPAA Privacy and Security, Master Thesis, Department of Computer Science and Information Engineering Chung Hua University, (Aug. 2011). http://chur.chu.edu.tw/bitstream/987654321/42464/1/GM097020470.pdfGoogle ScholarGoogle Scholar
  4. Lee T.-F., Chen P.-Q., and Hwang S.-H. 2017. An extended chaotic map-based HIPAA-compliant key management scheme with revocation of authorization. Communications of the CCISA 23 (Oct. 2017), 55-72.Google ScholarGoogle Scholar
  5. R. Maes, "Physically Unclonable Functions: Concept and Constructions" in Physically Unclonable Functions, Springer, pp. 11-48, 2013.Google ScholarGoogle Scholar
  6. Herder C., Yu M. D., Koushanfar F., and Devadas S. 2014. Physical Unclonable Functions and Applications: A Tutorial”, in Proceedings of the IEEE, (August 2014), 1126–1141.Google ScholarGoogle Scholar
  7. Joshi S., Mohanty S. P., Kougianos E. 2017. Everything you wanted to know about PUFs. IEEE Potentials 36, 6 (Nov./Dec. 2017), 38-46.Google ScholarGoogle ScholarCross RefCross Ref
  8. Yanambaka V.P., Mohanty S. P., Kougianos E. 2018. Making Use of Manufacturing Process Variations: A Dopingless Transistor Based-PUF for Hardware-Assisted Security. IEEE Transactions on Semiconductor Manufacturing 31, 2, (May 2018) 285 – 294. DOI: 10.1109/TSM.2018.2818180Google ScholarGoogle ScholarCross RefCross Ref
  9. McGrath T., Bagci I. E., Wang Z. M., Roedig U., Young R. J. 2019. A PUF Taxonomy, Applied Physics Reviews 6 (1), 011303, https://doi.org/10.1063/1.5079407.Google ScholarGoogle ScholarCross RefCross Ref
  1. A Secure and Efficient Access Control Scheme Based on PUF for Health Information Systems

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICMHI '21: Proceedings of the 5th International Conference on Medical and Health Informatics
        May 2021
        347 pages
        ISBN:9781450389846
        DOI:10.1145/3472813

        Copyright © 2021 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 26 October 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)15
        • Downloads (Last 6 weeks)3

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format