메뉴 건너뛰기




Volumn 26, Issue 6, 2015, Pages 1693-1703

PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system

Author keywords

access control; Authentication; distributed cloud computing; m healthcare system; security and privacy

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CLOUD COMPUTING; DATA PRIVACY; DIGITAL STORAGE; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; FORESTRY; HEALTH CARE; MEDICAL INFORMATION SYSTEMS; MOBILE SECURITY; PATIENT TREATMENT;

EID: 84929376476     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2014.2314119     Document Type: Article
Times cited : (91)

References (32)
  • 1
    • 34748903407 scopus 로고    scopus 로고
    • Wearable and portable E-health systems
    • Sep.-Oct.
    • L. Gatzoulis and I. Iakovidis, "Wearable and portable E-health systems," IEEE Eng. Med. Biol. Mag., vol. 26, no. 5, pp. 51-56, Sep.-Oct. 2007.
    • (2007) IEEE Eng. Med. Biol. Mag. , vol.26 , Issue.5 , pp. 51-56
    • Gatzoulis, L.1    Iakovidis, I.2
  • 2
    • 0032191802 scopus 로고    scopus 로고
    • Towards personal health record: Current situation, obstacles and trends in implementation of electronic healthcare records in europe
    • I. Iakovidis, "Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare records in europe," Int. J. Med. Inf., vol. 52, no. 1, pp. 105-115, 1998.
    • (1998) Int. J. Med. Inf. , vol.52 , Issue.1 , pp. 105-115
    • Iakovidis, I.1
  • 4
    • 24344478593 scopus 로고    scopus 로고
    • Efficient remote user authentication scheme using smart card
    • R. Lu and Z. Cao, "Efficient remote user authentication scheme using smart card," Comput. Netw., vol. 49, no. 4, pp. 535-540, 2005.
    • (2005) Comput. Netw. , vol.49 , Issue.4 , pp. 535-540
    • Lu, R.1    Cao, Z.2
  • 5
    • 68349133104 scopus 로고    scopus 로고
    • A privacy management architecture for patient-controlled personal health record system
    • M. D. N. Huda, N. Sonehara, and S. Yamada, "A privacy management architecture for patient-controlled personal health record system," J. Eng. Sci. Technol., vol. 4, no. 2, pp. 154-170, 2009.
    • (2009) J. Eng. Sci. Technol. , vol.4 , Issue.2 , pp. 154-170
    • Huda, M.D.N.1    Sonehara, N.2    Yamada, S.3
  • 7
    • 70350662926 scopus 로고    scopus 로고
    • Anonymity and application privacy in context of mobile computing in eHealth
    • New York, NY, USA: Springer
    • D. Slamanig, C. Stingl, C. Menard, M. Heiligenbrunner, and J. Thierry, "Anonymity and application privacy in context of mobile computing in eHealth," in Mobile Response, New York, NY, USA: Springer, 2009 pp. 148-157.
    • (2009) Mobile Response , pp. 148-157
    • Slamanig, D.1    Stingl, C.2    Menard, C.3    Heiligenbrunner, M.4    Thierry, J.5
  • 8
    • 84877645780 scopus 로고    scopus 로고
    • TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks
    • J. Zhou and Z. Cao, "TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks," in Proc. IEEE Global Commun. Conf., 2012, pp. 985-990.
    • (2012) Proc. IEEE Global Commun. Conf. , pp. 985-990
    • Zhou, J.1    Cao, Z.2
  • 9
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," in Proc. IEEE Conf. Comput. Commun., 2009, pp. 963-971.
    • (2009) Proc. IEEE Conf. Comput. Commun. , pp. 963-971
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 11
    • 77649172678 scopus 로고    scopus 로고
    • Privacy and emergency response in e-healthcare leveraging wireless body sensor networks
    • Feb.
    • J. Sun, Y. Fang, and X. Zhu, "Privacy and emergency response in e-healthcare leveraging wireless body sensor networks," IEEE Wireless Commun., vol. 17, no. 1, pp. 66-73, Feb. 2010.
    • (2010) IEEE Wireless Commun. , vol.17 , Issue.1 , pp. 66-73
    • Sun, J.1    Fang, Y.2    Zhu, X.3
  • 12
    • 67349253018 scopus 로고    scopus 로고
    • SAGE: A strong privacy-preserving scheme against global eavesdropping for ehealth systems
    • May
    • X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, "SAGE: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems," IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365-378, May 2009.
    • (2009) IEEE J. Sel. Areas Commun. , vol.27 , Issue.4 , pp. 365-378
    • Lin, X.1    Lu, R.2    Shen, X.3    Nemoto, Y.4    Kato, N.5
  • 13
    • 80051864290 scopus 로고    scopus 로고
    • HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare
    • J. Sun, X. Zhu, C. Zhang, and Y. Fang, "HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare," in Proc. 31st Int. Conf. Distrib. Comput. Syst., 2011, pp. 373-382.
    • (2011) Proc. 31st Int. Conf. Distrib. Comput. Syst. , pp. 373-382
    • Sun, J.1    Zhu, X.2    Zhang, C.3    Fang, Y.4
  • 14
    • 51649110861 scopus 로고    scopus 로고
    • Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
    • Oct.
    • L. Lu, J. Han, Y. Liu, L. Hu, J. Huai, L. M. Ni, and J. Ma, "Pseudo trust: Zero-knowledge authentication in anonymous P2Ps," IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 10, pp. 1325-1337, Oct. 2008.
    • (2008) IEEE Trans. Parallel Distrib. Syst. , vol.19 , Issue.10 , pp. 1325-1337
    • Lu, L.1    Han, J.2    Liu, Y.3    Hu, L.4    Huai, J.5    Ni, L.M.6    Ma, J.7
  • 15
    • 70350623095 scopus 로고    scopus 로고
    • An improved distributed key management scheme in wireless sensor networks
    • J. Zhou and M. He, "An improved distributed key management scheme in wireless sensor networks," in Proc. 9th Int. Workshop Inf. Security Appl., 2008, pp. 305-319.
    • (2008) Proc. 9th Int. Workshop Inf. Security Appl. , pp. 305-319
    • Zhou, J.1    He, M.2
  • 16
    • 84884572913 scopus 로고    scopus 로고
    • Securing mhealthcare social networks: Challenges, countermeasures and future directions
    • Aug.
    • J. Zhou, Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos, "Securing mhealthcare social networks: challenges, countermeasures and future directions," IEEE Wireless Commun., vol. 20, no. 4, pp. 12-21, Aug. 2013.
    • (2013) IEEE Wireless Commun. , vol.20 , Issue.4 , pp. 12-21
    • Zhou, J.1    Cao, Z.2    Dong, X.3    Lin, X.4    Vasilakos, A.V.5
  • 17
    • 74049163235 scopus 로고    scopus 로고
    • Improving privacy and security in multi-authority attribute-based encryption
    • M. Chase and S. S. Chow, "Improving privacy and security in multi-authority attribute-based encryption," in Proc. 16th ACM Conf. Comput. Commun. Security, 2009, pp. 121-130.
    • (2009) Proc. 16th ACM Conf. Comput. Commun. Security , pp. 121-130
    • Chase, M.1    Chow, S.S.2
  • 20
    • 57849092101 scopus 로고    scopus 로고
    • A secure identity-based multi-proxy signature scheme
    • F. Cao and Z. Cao, "A secure identity-based multi-proxy signature scheme," Comput. Electr. Eng., vol. 35, pp. 86-95, 2009.
    • (2009) Comput. Electr. Eng. , vol.35 , pp. 86-95
    • Cao, F.1    Cao, Z.2
  • 21
    • 49549102632 scopus 로고    scopus 로고
    • Short designated verifier signature scheme and its identity-based variant
    • Jan.
    • X. Huang, W. Susilo, Y. Mu, and F. Zhang, "Short designated verifier signature scheme and its identity-based variant," Int. J. Netw. Security, vol. 6, no. 1, pp. 82-93, Jan. 2008.
    • (2008) Int. J. Netw. Security , vol.6 , Issue.1 , pp. 82-93
    • Huang, X.1    Susilo, W.2    Mu, Y.3    Zhang, F.4
  • 24
    • 84929380626 scopus 로고    scopus 로고
    • [online]
    • PBC Library, [online] http://crypto.stanford.edu/pbc/times.html, 2006.
    • (2006)
  • 25
    • 67650522224 scopus 로고    scopus 로고
    • A secure e-health architecture based on the appliance of pseudonymization
    • Feb.
    • B. Riedl, V. Grascher, and T. Neubauer, "A secure e-health architecture based on the appliance of pseudonymization," J. Softw., vol. 3, no. 2, pp. 23-32, Feb. 2008.
    • (2008) J. Softw. , vol.3 , Issue.2 , pp. 23-32
    • Riedl, B.1    Grascher, V.2    Neubauer, T.3
  • 27
    • 84929380627 scopus 로고    scopus 로고
    • [online]
    • De-identified Health Inf., [online] http://aspe.hhs.gov/admnsimp/bannerps.htm, 2007.
    • (2007) De-identified Health Inf.
  • 28
    • 84855674646 scopus 로고    scopus 로고
    • A secure handshake scheme with symptoms-matching for mhealthcare social network
    • Dec.
    • R. Lu, X. Lin, X. Liang, and X. Shen, "A secure handshake scheme with symptoms-matching for mhealthcare social network," J. Mobile Netw. Applications, vol. 16, no. 6, pp. 683-694, Dec. 2011.
    • (2011) J. Mobile Netw. Applications , vol.16 , Issue.6 , pp. 683-694
    • Lu, R.1    Lin, X.2    Liang, X.3    Shen, X.4
  • 29
    • 77956230334 scopus 로고    scopus 로고
    • Cross-domain data sharing in distributed electronic health record system
    • Jun.
    • J. Sun and Y. Fang, "Cross-domain data sharing in distributed electronic health record system," IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 6, pp. 754-764, Jun. 2010.
    • (2010) IEEE Trans. Parallel Distrib. Syst. , vol.21 , Issue.6 , pp. 754-764
    • Sun, J.1    Fang, Y.2
  • 30
    • 84872006849 scopus 로고    scopus 로고
    • Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings
    • M. Li, S. Yu, K. Ren, and W. Lou, "Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings," in Proc. 6th Int. ICST Conf. Security Privacy Comm. Netw., 2010, pp. 89-106.
    • (2010) Proc. 6th Int. ICST Conf. Security Privacy Comm. Netw. , pp. 89-106
    • Li, M.1    Yu, S.2    Ren, K.3    Lou, W.4
  • 31
    • 80055091218 scopus 로고    scopus 로고
    • Enforcing patient privacy in healthcare WSNs through key distribution algorithms
    • J. Misic and V. Misic, "Enforcing patient privacy in healthcare WSNs through key distribution algorithms," Security Commun. Netw. J., vol. 1, no. 5, pp. 417-429, 2008.
    • (2008) Security Commun. Netw. J. , vol.1 , Issue.5 , pp. 417-429
    • Misic, J.1    Misic, V.2
  • 32
    • 33750030809 scopus 로고    scopus 로고
    • Implementation of security policy for clinical information systems over wireless sensor network
    • Jan.
    • J. Misic and V. B. Misic, "Implementation of security policy for clinical information systems over wireless sensor network," Ad Hoc Netw., vol. 5, no. 1, pp. 134-144, Jan. 2007.
    • (2007) Ad Hoc Netw. , vol.5 , Issue.1 , pp. 134-144
    • Misic, J.1    Misic, V.B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.