The Design and Analysis of a Secure Personal Healthcare System Based on Certificates
نویسندگان
چکیده
Due to the development of information technology (IT), it has been applied to various fields such as the smart home, medicine, healthcare, and the smart car. For these fields, IT has been providing continuous prevention and management, including health conditions beyond the mere prevention of disease, improving the quality of life. e-Healthcare is a health management and medical service to provide prevention, diagnosis, treatment, and the follow-up management of diseases at any time and place in connection with information communication technology, without requiring patients to visit hospitals. However, e-Healthcare has been exposed to eavesdropping, manipulation, and the forgery of information that is personal, biological, medical, etc., and is a security threat from malicious attackers. This study suggests a security service model to exchange personal health records (PHRs) for e-Healthcare environments. To be specific, this study suggests a scheme in which communicators are able to securely authorize and establish security channels by constituting the infrastructure each organization relies on. In addition, the possibility of establishing a security service model is indicated by suggesting an e-Healthcare system for a secure e-Healthcare environment as a secure personal health record system. This is anticipated to provide securer communication in e-Healthcare environments in the future through the scheme suggested in this study.
منابع مشابه
Analysis of implementation of Tradable Green Certificates system in a competitive electricity market: a game theory approach
This paper investigates three models to implement Tradable Green Certificates (TGC) system with aid of game theory approach. In particular, the competition between thermal and renewable power plants is formulated in three models: namely cooperative, Nash and Stackelberg game models. The price of TGC is assumed to be determined by the legislative body (government) which is fixed. Numerical examp...
متن کاملمطالعه تطبیقی الزامات شبکه اجتماعی سلامت به عنوان سامانه پرونده سلامت شخصی
Background: Patient-centered care improves the quality of life and health care, and reduces the costs of care. The advent of new technologies such as health social networks, and personal health records (PHR), have significant impact on the patient-centered care. The aim of this article is to analyze and provide a set of features and requirements needed by the users of health social network serv...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملAdoption of Electronic Personal Health Records in Canada: Perceptions of Stakeholders
Background Healthcare stakeholders have a great interest in the adoption and use of electronic personal health records (ePHRs) because of the potential benefits associated with them. Little is known, however, about the level of adoption of ePHRs in Canada and there is limited evidence concerning their benefits and implications for the healthcare system. This study aimed to describe the current ...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Symmetry
دوره 8 شماره
صفحات -
تاریخ انتشار 2016