Secure and auditable agent-based communication protocol for e-health system framework
نویسنده
چکیده
Security is essential for e-health system as it provides highly sensitive distributed medical data and exchanged among the healthcare professionals, customers and providers over Internet. Internet is an open access system that allows anyone to participate and access the data. Hence, it is necessary to protect the data, service from the unauthorized visibility, use and also maintain a high degree of accessibility. It is achieved using suitable access control policies and techniques that enforce differentiated levels of service visibility and access to the users. This paper introduces a Secure and Auditable Agentbased Communication Protocol (SAACP) which performs on key exchange mechanism with mobile agents to reduce the delay in communication. Intelligent mobile agents are proposed for dynamically negotiating the policy of the users. This protocol offers user friendly, privacy and safe communication through well-built secure mechanism that gives confident to the users and healthcare professional to access the e-health system.
منابع مشابه
New Secure Communication Protocols for Mobile E-Health System
E-health system has been used as communication system that enables to deliver medical service over the Internet. The medical information‟s accessible in e-health systems are highly sensitive and distributed that demands strong authentication and authorization mechanisms for communication between the healthcare professionals, consumers and providers. Internet is an open system that provides glob...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملA Secure and Trustworthy Framework for Mobile Agent-Based E-Marketplace with Digital Forensics and Security Protocols
Mobile agents raise security issues such as the protection of platform/host that runs the mobile agent against attacks which can harm or use its resources without permission, and another is the need for protection to guard mobile agents and their supporting systems against the malicious attacks from a variety of intervening sources that might alter information it carries and processes when it v...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملA review and future research directions of secure and trustworthy mobile agent-based e-marketplace systems
Purpose – Agent technology has generated a lot of interest in recent years, including mobile agent technology with its advantage of being able to support mobility, which can reduce network latency and dependency on network availability. Therefore, a number of mobile agent-based e-commerce applications have been constructed. Mobile agent-based e-marketplaces are e-commerce trading platforms whic...
متن کامل