메뉴 건너뛰기




Volumn 9532, Issue , 2015, Pages 435-444

Design flaws in a secure medical data exchange protocol based on cloud environments

Author keywords

Anonymity; Authentication; Body sensors; Cloud; Medical data; Mobile device; Security

Indexed keywords

AUTHENTICATION; CLOUDS; COMPUTER ARCHITECTURE; ELECTRONIC DATA INTERCHANGE; MEDICAL COMPUTING; MOBILE DEVICES; NETWORK ARCHITECTURE; PARALLEL ARCHITECTURES;

EID: 84951986324     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-27161-3_39     Document Type: Conference Paper
Times cited : (8)

References (25)
  • 1
    • 84904272742 scopus 로고    scopus 로고
    • A secure medical data exchange protocol based on cloud environments
    • Chen, C.L., Yang, T.T., Shih, T.F.: A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38, 112 (2014)
    • (2014) J. Med. Syst , vol.38 , pp. 112
    • Chen, C.L.1    Yang, T.T.2    Shih, T.F.3
  • 2
    • 84883733928 scopus 로고    scopus 로고
    • A study of attribute-based proxy reencryption scheme in cloud environments
    • Chung, P.S., Liu, C.W., Hwang, M.S.: A study of attribute-based proxy reencryption scheme in cloud environments. Int. J. Netw. Secur. 16(1), 1-13 (2014)
    • (2014) Int. J. Netw. Secur , vol.16 , Issue.1 , pp. 1-13
    • Chung, P.S.1    Liu, C.W.2    Hwang, M.S.3
  • 3
    • 84872265840 scopus 로고    scopus 로고
    • A chaotic map-based authentication scheme for telecare medicine information systems
    • Hao, X., Wang, J., Yang, Q., Yan, X., Li, P.: A chaotic map-based authentication scheme for telecare medicine information systems. J. Med. Syst. 37(2), 9919 (2013)
    • (2013) J. Med. Syst , vol.37 , Issue.2 , pp. 9919
    • Hao, X.1    Wang, J.2    Yang, Q.3    Yan, X.4    Li, P.5
  • 4
    • 84951941478 scopus 로고    scopus 로고
    • Accessed 18 April 2015
    • HAVO. http://www.hvc.com.tw/lang/HAVO-E/Home%20HAVO.html. Accessed 18 April 2015
    • HAVO
  • 5
    • 84864058187 scopus 로고    scopus 로고
    • A more secure authentication scheme for telecare medicine information systems
    • He, D., Chen, J., Zhang, R.: A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1989-1995 (2012)
    • (2012) J. Med. Syst , vol.36 , Issue.3 , pp. 1989-1995
    • He, D.1    Chen, J.2    Zhang, R.3
  • 6
    • 84911167162 scopus 로고    scopus 로고
    • A novel group key transfer for big data security
    • Hsu, C., Zeng, B., Zhang, M.: A novel group key transfer for big data security. Appl. Math. Comput. 249(15), 436-443 (2014)
    • (2014) Appl. Math. Comput , vol.249 , Issue.15 , pp. 436-443
    • Hsu, C.1    Zeng, B.2    Zhang, M.3
  • 7
    • 84872108080 scopus 로고    scopus 로고
    • A privacy enhanced authentication scheme for telecare medical information systems
    • Jiang, Q., Ma, J., Ma, Z., Li, G.: A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37, 9897 (2013)
    • (2013) J. Med. Syst , vol.37 , pp. 9897
    • Jiang, Q.1    Ma, J.2    Ma, Z.3    Li, G.4
  • 8
    • 84893187211 scopus 로고    scopus 로고
    • Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems
    • Jiang, Q., Ma, J., Lu, X., Tian, Y.: Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2), 12 (2014)
    • (2014) J. Med. Syst , vol.38 , Issue.2 , pp. 12
    • Jiang, Q.1    Ma, J.2    Lu, X.3    Tian, Y.4
  • 9
    • 84883251252 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems
    • Kumari, S., Khan, M.K., Kumar, R.: Cryptanalysis and improvement of 'A privacy enhanced scheme for telecare medical information systems. J. Med. Syst. 37, 9952 (2013)
    • (2013) J. Med. Syst , vol.37 , pp. 9952
    • Kumari, S.1    Khan, M.K.2    Kumar, R.3
  • 10
    • 84881510395 scopus 로고    scopus 로고
    • A survey on attribute-based encryption schemes of access control in cloud environments
    • Lee, C.C., Chung, P.S., Hwang, M.S.: A survey on attribute-based encryption schemes of access control in cloud environments. Int. J. Netw. Secur. 15(4), 231- 240 (2013)
    • (2013) Int. J. Netw. Secur , vol.15 , Issue.4 , pp. 231-240
    • Lee, C.C.1    Chung, P.S.2    Hwang, M.S.3
  • 11
    • 70349792182 scopus 로고    scopus 로고
    • An efficient biometrics-based remote user authentication scheme using smart cards
    • Li, C.T., Hwang, M.S.: An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1), 1-5 (2010)
    • (2010) J. Netw. Comput. Appl , vol.33 , Issue.1 , pp. 1-5
    • Li, C.T.1    Hwang, M.S.2
  • 12
    • 84873444280 scopus 로고    scopus 로고
    • An extended multi-server-based user authentication and key agreement scheme with user anonymity
    • Li, C.T., Lee, C.C., Weng, C.Y., Fan, C.I.: An extended multi-server-based user authentication and key agreement scheme with user anonymity. KSII Trans. Internet Inf. Syst. 7(1), 119-131 (2013)
    • (2013) KSII Trans. Internet Inf. Syst , vol.7 , Issue.1 , pp. 119-131
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3    Fan, C.I.4
  • 13
    • 84888642495 scopus 로고    scopus 로고
    • An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments
    • Li, C.T., Lee, C.C., Weng, C.Y.: An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments. Nonlinear Dyn. 74(4), 1133-1143 (2013)
    • (2013) Nonlinear Dyn , vol.74 , Issue.4 , pp. 1133-1143
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 14
    • 84877844458 scopus 로고    scopus 로고
    • A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card
    • Li, C.T.: A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf. Secur. 7(1), 3-10 (2013)
    • (2013) IET Inf. Secur , vol.7 , Issue.1 , pp. 3-10
    • Li, C.T.1
  • 15
    • 84891518669 scopus 로고    scopus 로고
    • A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
    • Li, C.T., Lee, C.C.,Weng, C.Y.: A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9), 1-11 (2014)
    • (2014) J. Med. Syst , vol.38 , Issue.9 , pp. 1-11
    • Li, C.T.1    Lee, C.C.2    Weng, C.Y.3
  • 16
    • 84939958429 scopus 로고    scopus 로고
    • An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services
    • Li, C.T., Lee, C.W., Shen, J.J.: An extended chaotic maps based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services. Nonlinear Dyn. 80(3), 1601-1611 (2015)
    • (2015) Nonlinear Dyn , vol.80 , Issue.3 , pp. 1601-1611
    • Li, C.T.1    Lee, C.W.2    Shen, J.J.3
  • 17
    • 84935850541 scopus 로고    scopus 로고
    • A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems
    • Li, C.T., Weng, C.Y., Lee, C.C.: A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8), 1-8 (2015)
    • (2015) J. Med. Syst , vol.39 , Issue.8 , pp. 1-8
    • Li, C.T.1    Weng, C.Y.2    Lee, C.C.3
  • 18
    • 84939146085 scopus 로고    scopus 로고
    • Secure user authentication and user anonymity scheme based on quadratic residues for the integrated EPRIS
    • Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C.: Secure user authentication and user anonymity scheme based on quadratic residues for the integrated EPRIS. Procedia Comput. Sci. 52, 21-28 (2015)
    • (2015) Procedia Comput. Sci , vol.52 , pp. 21-28
    • Li, C.T.1    Weng, C.Y.2    Lee, C.C.3    Wang, C.C.4
  • 20
    • 78649322624 scopus 로고    scopus 로고
    • A survey on security issues in service delivery models of cloud computing
    • Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1-11 (2011)
    • (2011) J. Netw. Comput. Appl , vol.34 , Issue.1 , pp. 1-11
    • Subashini, S.1    Kavitha, V.2
  • 21
    • 84935442590 scopus 로고    scopus 로고
    • Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud
    • Wang, J., Yu, X., Zhao, M.: Fault-tolerant verifiable keyword symmetric searchable encryption in hybrid cloud. Int. J. Netw. Secur. 17(4), 471-483 (2015)
    • (2015) Int. J. Netw. Secur , vol.17 , Issue.4 , pp. 471-483
    • Wang, J.1    Yu, X.2    Zhao, M.3
  • 22
    • 84867869987 scopus 로고    scopus 로고
    • An improved authentication scheme for telecare medicine information systems
    • Wei, J., Hu, X., Liu, W.: An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6), 3597-3604 (2012)
    • (2012) J. Med. Syst , vol.36 , Issue.6 , pp. 3597-3604
    • Wei, J.1    Hu, X.2    Liu, W.3
  • 23
    • 84864061174 scopus 로고    scopus 로고
    • A secure authentication scheme for telecare medicine information systems
    • Wu, Z.Y., Lee, Y.C., Lai, F., Lee, H.C., Chung, Y.: A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3), 1529-1535 (2012)
    • (2012) J. Med. Syst , vol.36 , Issue.3 , pp. 1529-1535
    • Wu, Z.Y.1    Lee, Y.C.2    Lai, F.3    Lee, H.C.4    Chung, Y.5
  • 24
    • 79959557055 scopus 로고    scopus 로고
    • Addressing cloud computing security issues
    • Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583-592 (2012)
    • (2012) Future Gener. Comput. Syst , vol.28 , Issue.3 , pp. 583-592
    • Zissis, D.1    Lekkas, D.2
  • 25
    • 84867843422 scopus 로고    scopus 로고
    • An efficient authentication scheme for telecare medicine information systems
    • Zhu, Z.: An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6), 3833-3838 (2012)
    • (2012) J. Med. Syst , vol.36 , Issue.6 , pp. 3833-3838
    • Zhu, Z.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.