Patient Family Binding and Authentication Scheme with Privacy Protection for E-Health System

نویسندگان

چکیده

The emergence of the E-health system has brought convenience to many chronically ill patients and elderly people with limited mobility. With help system, can upload their physiological data timely get a diagnosis at home, which is more convenient efficient as they do not have line up in hospitals. In order ensure this while protecting patients’ privacy, schemes been proposed patient medical server authenticate each other. However, considering these inconvenience, sometimes family members need participate patient’s treatment process. So, needs provide secure communication platform for members. At present, most authentication only focus on between server, ignoring participation Moreover, permissions should be different, distinguish efficiently. overcome problems, we propose binding privacy protection scheme system. by us, efficiently assign different member patient. And our allow authorize freely, increase number will impose additional burden server. same time, does require addition, comparing other related schemes, prove that suitable efficiency security performance

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reliable Biometric Authentication with Privacy Protection

We propose a new scheme for reliable authentication of physical objects. The scheme allows not only the combination of noisy data with cryptographic functions but has the additional property that the stored reference information is non-revealing. By breaking into the database and retrieving the stored data, the attacker will not be able to obtain any realistic approximation of the original phys...

متن کامل

A Quantum Copy-Protection Scheme with Authentication

We propose a quantum copy-protection system which protects classical information in the form of non-orthogonal quantum states. The decryption of the stored information is not possible in the classical representation and the decryption mechanism of data qubits is realized by secret unitary rotations. We define an authentication method for the proposed copy-protection scheme and analyse the succe...

متن کامل

Lightweight Security and Privacy Scheme for Wireless Body Area Network in E-Health System

Low computational power of wireless sensors and the multicast form of transmission exhibited by WBAN make it susceptible to several security and privacy issues. Due to these, many security and privacy preservation approaches had been proposed to secure and preserve privacy of wearable WBAN systems. However, the inherent low computational power which characterises WBAN nodes made most of these a...

متن کامل

Efficient User Authentication and Key Agreement with User Privacy Protection

Using smart cards, remote user authentication and key agreement can be simplified, flexible, and efficient for creating a secure distributed computers environment. Addition to user authentication and key distribution, it is very useful for providing identity privacy for users. In this paper, we propose novel user authentication and key agreement schemes with privacy protection. We first propose...

متن کامل

simulation and design of electronic processing circuit for restaurants e-procurement system

the poor orientation of the restaurants toward the information technology has yet many unsolved issues in regards to the customers. one of these problems which lead the appeal list of later, and have a negative impact on the prestige of the restaurant is the case when the later does not respond on time to the customers’ needs, and which causes their dissatisfaction. this issue is really sensiti...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2022

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2022/1883293