Patient Family Binding and Authentication Scheme with Privacy Protection for E-Health System
نویسندگان
چکیده
The emergence of the E-health system has brought convenience to many chronically ill patients and elderly people with limited mobility. With help system, can upload their physiological data timely get a diagnosis at home, which is more convenient efficient as they do not have line up in hospitals. In order ensure this while protecting patients’ privacy, schemes been proposed patient medical server authenticate each other. However, considering these inconvenience, sometimes family members need participate patient’s treatment process. So, needs provide secure communication platform for members. At present, most authentication only focus on between server, ignoring participation Moreover, permissions should be different, distinguish efficiently. overcome problems, we propose binding privacy protection scheme system. by us, efficiently assign different member patient. And our allow authorize freely, increase number will impose additional burden server. same time, does require addition, comparing other related schemes, prove that suitable efficiency security performance
منابع مشابه
Reliable Biometric Authentication with Privacy Protection
We propose a new scheme for reliable authentication of physical objects. The scheme allows not only the combination of noisy data with cryptographic functions but has the additional property that the stored reference information is non-revealing. By breaking into the database and retrieving the stored data, the attacker will not be able to obtain any realistic approximation of the original phys...
متن کاملA Quantum Copy-Protection Scheme with Authentication
We propose a quantum copy-protection system which protects classical information in the form of non-orthogonal quantum states. The decryption of the stored information is not possible in the classical representation and the decryption mechanism of data qubits is realized by secret unitary rotations. We define an authentication method for the proposed copy-protection scheme and analyse the succe...
متن کاملLightweight Security and Privacy Scheme for Wireless Body Area Network in E-Health System
Low computational power of wireless sensors and the multicast form of transmission exhibited by WBAN make it susceptible to several security and privacy issues. Due to these, many security and privacy preservation approaches had been proposed to secure and preserve privacy of wearable WBAN systems. However, the inherent low computational power which characterises WBAN nodes made most of these a...
متن کاملEfficient User Authentication and Key Agreement with User Privacy Protection
Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel user authentication and key agreement schemes with privacy protection. We first propose...
متن کاملsimulation and design of electronic processing circuit for restaurants e-procurement system
the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2022
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2022/1883293