메뉴 건너뛰기




Volumn 38, Issue 11, 2014, Pages

A Privacy Authentication Scheme Based on Cloud for Medical Environment

Author keywords

Attack; Cloud; Medical treatment; Mobile device; Security

Indexed keywords

ALGORITHM; ARTICLE; CONFIDENTIALITY; EMERGENCY CARE; HUMAN; MEDICAL INFORMATICS; MEDICAL INFORMATION; MEDICAL INFORMATION SYSTEM; MEDICAL RECORD; MEDICAL TECHNOLOGY; MOBILE PHONE; PATIENT SAFETY; PRIVACY; REGISTRATION; COMPUTER SECURITY; DEVICES; ELECTRONIC MEDICAL RECORD; INTERNET; MICROCOMPUTER;

EID: 84919884097     PISSN: 01485598     EISSN: 1573689X     Source Type: Journal    
DOI: 10.1007/s10916-014-0143-9     Document Type: Article
Times cited : (65)

References (35)
  • 2
    • 84904342393 scopus 로고    scopus 로고
    • Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain
    • Ramez, W. S., Patients’ perception of healthcare quality, satisfaction and behavioral Intention: an empirical study in Bahrain. Int. J. Bus. Soc. Sci. 3(18):131–141, 2012.
    • (2012) Int. J. Bus. Soc. Sci. , vol.3 , Issue.18 , pp. 131-141
    • Ramez, W.S.1
  • 3
    • 84904354247 scopus 로고    scopus 로고
    • A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung
    • Lin, C. L., Cheng, C. M., and Ma, C. H., A study of medical service quality and In-patients’ satisfaction by using Kano’s model—An example of certain district hospital in Taichung. Hsiuping J. 23:103–132, 2011.
    • (2011) Hsiuping J. , vol.23 , pp. 103-132
    • Lin, C.L.1    Cheng, C.M.2    Ma, C.H.3
  • 4
    • 84868321086 scopus 로고    scopus 로고
    • Security service level agreements based authentication and authorization model for accessing cloud services
    • Bajpai, D., Vardhan, M., Gupta, S., Kumar, R., and Kushwaha, D. S., Security service level agreements based authentication and authorization model for accessing cloud services. Adv. Intell. Syst. Comput. 176:719–728, 2012.
    • (2012) Adv. Intell. Syst. Comput. , vol.176 , pp. 719-728
    • Bajpai, D.1    Vardhan, M.2    Gupta, S.3    Kumar, R.4    Kushwaha, D.S.5
  • 7
    • 84863353902 scopus 로고    scopus 로고
    • Cloud-based identity attribute service with privacy protection in Cyberspace
    • Zou, X., Chen, B., and Jin, B., Cloud-based identity attribute service with privacy protection in Cyberspace. Procardia Eng. 29:1160–1164, 2012.
    • (2012) Procardia Eng. , vol.29 , pp. 1160-1164
    • Zou, X.1    Chen, B.2    Jin, B.3
  • 9
    • 71749111157 scopus 로고    scopus 로고
    • A service-oriented qos-assured and multi-agent cloud computing architecture
    • Cao, B. Q., Li, B., and Xia, Q. M., A service-oriented qos-assured and multi-agent cloud computing architecture. Cloud Comput. 5931:644–649, 2009.
    • (2009) Cloud Comput. , vol.5931 , pp. 644-649
    • Cao, B.Q.1    Li, B.2    Xia, Q.M.3
  • 10
    • 84875209774 scopus 로고    scopus 로고
    • Mechanisms for SLA provisioning in cloud-based service providers
    • Casalicchio, E., and Silvestri, L., Mechanisms for SLA provisioning in cloud-based service providers. Comput. Netw. 57(3):795–810, 2013.
    • (2013) Comput. Netw. , vol.57 , Issue.3 , pp. 795-810
    • Casalicchio, E.1    Silvestri, L.2
  • 11
    • 84868664144 scopus 로고    scopus 로고
    • Enterprise cloud service architectures
    • Wang, H., He, W., and Wang, F. K., Enterprise cloud service architectures. Inf. Technol. Manag. 13(4):445–454, 2012.
    • (2012) Inf. Technol. Manag. , vol.13 , Issue.4 , pp. 445-454
    • Wang, H.1    He, W.2    Wang, F.K.3
  • 12
    • 84904349651 scopus 로고    scopus 로고
    • Cloud computing security
    • Tsai, Y. L., Cloud computing security. Commun. CCISA 18(2):62–68, 2012.
    • (2012) Commun. CCISA , vol.18 , Issue.2 , pp. 62-68
    • Tsai, Y.L.1
  • 13
    • 84919908479 scopus 로고    scopus 로고
    • IHS iSuppli web site: http://www.ihs.com/products/electronics-media/isuppli.aspx
  • 14
    • 14844333829 scopus 로고    scopus 로고
    • The national healthcare quality and disparities reports: an overview
    • Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med. Care 43:I3–8, 2005.
    • (2005) Med. Care , vol.43 , pp. I3-I8
    • Kelley, E.1    Moy, E.2    Stryer, D.3    Burstin, H.4    Clancy, C.5
  • 15
    • 64249125305 scopus 로고    scopus 로고
    • An improved smart card based password authentication scheme with provable security
    • Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.
    • (2009) Comput. Stand. Interfaces , vol.31 , Issue.4 , pp. 723-728
    • Xu, J.1    Zhu, W.T.2    Feng, D.G.3
  • 16
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 17
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.B.1    Chen, J.H.2    Zhang, R.3
  • 18
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3597-3604
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 19
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3833–3838, 2012.
    • (2012) J. Med. Syst. , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1
  • 20
    • 84872108080 scopus 로고    scopus 로고
    • A privacy enhanced authentication scheme for telecare medical information systems
    • Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37:9897, 2013.
    • (2013) J. Med. Syst. , vol.37 , pp. 9897
    • Jiang, Q.1    Ma, J.2    Ma, Z.3    Li, G.4
  • 21
    • 84883251252 scopus 로고    scopus 로고
    • Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952
    • Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4), Article: 9952, DOI: 10.1007/s10916-013-9952-5, 2013.
  • 22
    • 84904272742 scopus 로고    scopus 로고
    • A secure medical data exchange protocol based on cloud environment
    • Chen, C. L., and Yang, T. T., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 2014. doi:10.1007/s10916-014-0112-3.
    • (2014) J. Med. Syst.
    • Chen, C.L.1    Yang, T.T.2
  • 23
    • 84893021026 scopus 로고    scopus 로고
    • Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, 2014
    • Zhao, Z., An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem. J. Med. Syst. 38(2), Article: 13, DOI: 10.1007/s10916-014-0013-5, 2014.
  • 24
    • 33645788387 scopus 로고    scopus 로고
    • McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), 2000
    • McCullagh, A., and Caelli, W., Non-repudiation in the digital environment. First Monday, 5(8), DOI: http://dx.doi.org/10.5210/fm.v5i8.778, 2000.
  • 25
    • 84904297373 scopus 로고    scopus 로고
    • Designing a healthcare authorization model based on cloud authentication
    • Chen, C. L., Yang, T. T., Leu, F. Y., and Huang, Y. L., Designing a healthcare authorization model based on cloud authentication. Intell. Autom. Soft. Comput. 20(3):365–379, 2014.
    • (2014) Intell. Autom. Soft. Comput. , vol.20 , Issue.3 , pp. 365-379
    • Chen, C.L.1    Yang, T.T.2    Leu, F.Y.3    Huang, Y.L.4
  • 26
    • 84946840347 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil pairing. Adv. Cryptol. ASIACRYPT 2248:514–532, 2001.
    • (2001) Adv. Cryptol. ASIACRYPT , vol.2248 , pp. 514-532
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 27
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Boneh, D., and Franklin, M., Identity-based encryption from the Weil pairing. Adv. Cryptol.- Crypto 2139:213–229, 2001.
    • (2001) Adv. Cryptol.- Crypto , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 28
    • 35248867510 scopus 로고    scopus 로고
    • Efficient identity based signature schemes based on pairings
    • Hess, F., Efficient identity based signature schemes based on pairings. Sel. Areas Crypt 2595:310–324, 2003.
    • (2003) Sel. Areas Crypt , vol.2595 , pp. 310-324
    • Hess, F.1
  • 29
    • 0027663154 scopus 로고
    • Elliptic curve cryptosystems and their implementation
    • Menezes, A., and Vanstone, S., Elliptic curve cryptosystems and their implementation. J. Cryptol. 6(4):209–224, 1993.
    • (1993) J. Cryptol. , vol.6 , Issue.4 , pp. 209-224
    • Menezes, A.1    Vanstone, S.2
  • 30
    • 24944443391 scopus 로고    scopus 로고
    • ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo
    • Ertaul, L., and Lu, W., ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). Networking 2005, LCNS 3462, University of Waterloo, Canada, pp. 102–113, May 2005.
    • (2005) Canada , pp. 102-113
    • Ertaul, L.1    Lu, W.2
  • 31
    • 84919908475 scopus 로고    scopus 로고
    • Johnson, D., and Menezes, A., The Elliptic Curve Digital Signature Algorithm (ECDSA). Tech. rep. CORR 99–34, Department of C & O, University of Waterloo, http://cacr.math.waterloo.ca, 1999.
  • 33
    • 84919908474 scopus 로고    scopus 로고
    • X.509 certificate - Wikipedia, http://en.wikipedia.org/wiki/X.509, access available on 10 May 2014.
  • 34
    • 84919908473 scopus 로고    scopus 로고
    • Ministry of Health and Welfare in Taiwan, http://www.mohw.gov.tw/EN/Ministry/Index.aspx, access available on 10 May 2014.
  • 35
    • 84919908472 scopus 로고    scopus 로고
    • Third generation of mobile telecommunications technology - Wikipedia, http://en.wikipedia.org/wiki/3G, access available on 10 May 2014.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.