DOI QR코드

DOI QR Code

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service

융합형 u-헬스케어 서비스에서 헬스 정보 교환을 위한 키 트리 기반 관리 체계 설계

  • 김동현 (한남대학교 멀티미디어학과) ;
  • 김석수 (한남대학교 멀티미디어학과)
  • Received : 2015.10.02
  • Accepted : 2015.12.20
  • Published : 2015.12.31

Abstract

The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.

u-헬스케어에서는 무선 센서와 에드혹 네트워크를 통해 사용자의 건강 정보, 응급 정보를 수집, 분석하고 있으며 상호 운용이 가능한 전자 헬스 정보의 기록 및 전송을 위하여 동적인 액세스 제어를 수행하고 있다. 네트워크 시스템을 이용한 u-헬스케어의 경우 상호 운용 가능한 전자 건강 기록과 민감한 환자 의료 정보 전송은 개인 정보 보호 및 보안에 대한 문제점을 해결하기 위하여 키 관리 체계를 사용하고 있으나 동적인 액세스 제어에서는 그룹 키 관리가 어려우며 그룹에서 접근 맴버를 추가하거나 삭제할 경우에 매번 그룹 키를 변경해야하는 문제점을 가지고 있다. 따라서 본 논문에서는 유비쿼터스 헬스 케어의 동적 액세스를 수행하는 네트워크 환경에서 헬스 정보 교환을 위한 융합형 키 관리 체계방식을 제안한다.

Keywords

References

  1. A. Berler, S. Pavlopoulos, D. Koutsouris, "Design of an interoperability framework in a regional healthcare system", In:Proceedings of Engineering in Medicine and Biology Society, Vol. 2, pp. 3093-3096, 2004.
  2. R. Heeks, "Health information systems: Failure, success and improvisation", International journal of medical informatics Vol. 75, No. 2, pp. 125-137, 2006. https://doi.org/10.1016/j.ijmedinf.2005.07.024
  3. S.K. Katsikas, "Health care management and information systems security:awareness, training or education", In:Int. J.Med. Informatics 60, pp. 129-135, 2000. https://doi.org/10.1016/S1386-5056(00)00112-X
  4. S. Rafaeli, D. Hutchison, "A survey of key management for secure group communication", In:ACM Computing Surveys 35, Vol. 3, pp. 309-329, 2003. https://doi.org/10.1145/937503.937506
  5. T. Rindfleisch, "Privacy, information technology, and health care", In:Communications of the ACM, Vol. 40, No. 8, pp. 92-100, 1997. https://doi.org/10.1145/257874.257896
  6. J. Bohn, F. Gartner, H. Vogt, Dependability Issues of Pervasive Computing in a Healthcare Environment", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol.2802, pp.53-70, 2004. https://doi.org/10.1007/978-3-540-39881-3_8
  7. S. Weis, S. Sarma, R. Rivest, D. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", In:Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2004.
  8. Y.B. Kim, M. Kim, Y.J. Lee, "COSMOS: a middleware platform for sensor networks and a u-healthcare service", Proceedings of the 2008 ACM symposium on Applied computing. pp. 512-513, 2008.
  9. L. Zhang, B. Chu, "A Role-Based Delegation Framework for Healthcare Information Systems", In:ACM Symposium on Access Control Models And Technologies(SACMAT), pp. 125-134, 2002.
  10. C. Wong, M. Gouda, S. Lam, "Secure group communications using key graphs, Networking", IEEE/ACM Transactions on Networking, Vol. 8, No. 1, pp. 16-30, 1998.
  11. S. Muhammad, K. Raazi, S. Lee, Y. Lee, "A Novel Architecture for Efficient Key Management in Humanware Applications", In: Fifth International Joint Conference on INC, IMS and IDC, pp. 1918-1922, 2009.
  12. S. Muhammad, K. Raazi, S. Lee, Y. Lee, "TIMAR: an efficient key management scheme for ubiquitous health care environments", In:Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, United Kingdom, p. 33, 2009.
  13. J.S. Shapiro, G. Kuperman, Health information exchange." Medical informatics: An executive primer, (Ed. Ong, KR) Healthcare Information & Management Systems Society, pp. 147-16, 2011.
  14. M. Das, A. Saxena, V. Gulati, D. Phatak, "Hierarchical key management scheme using polynomial interpolation", SIGOPS Operational Systematic Review, Vol. 39, No. 1, pp. 40-47, 2005. https://doi.org/10.1145/1044552.1044556
  15. D. Dolev, A.C. Yao, On the security of public key protocols." Information Theory, IEEE Transactions on, Vol. 29, No. 2, pp. 198-208, 1983.

Cited by

  1. Medical Convergence Analysis of Complaint about Medical Service in an Affiliated Hospital vol.7, pp.5, 2016, https://doi.org/10.15207/JKCS.2016.7.5.117
  2. Telemedicine System for Korean Beef Cattle Converging Livestock Farming Practices & ICT vol.14, pp.12, 2016, https://doi.org/10.14400/JDC.2016.14.12.217
  3. The influence of health information source credibility and e health literacy on health information orientation of parents of local hospitalized children vol.14, pp.6, 2016, https://doi.org/10.14400/JDC.2016.14.6.295
  4. The Design and Analysis of a Secure Personal Healthcare System Based on Certificates vol.8, pp.11, 2016, https://doi.org/10.3390/sym8110129
  5. Development of Prediction Model for Prevalence of Metabolic Syndrome Using Data Mining: Korea National Health and Nutrition Examination Study vol.14, pp.2, 2016, https://doi.org/10.14400/JDC.2016.14.2.325
  6. Secure biometric information delivery scheme of implantable device using code-division multiplexing method vol.14, pp.3, 2016, https://doi.org/10.14400/JDC.2016.14.3.235
  7. Program Develope and Class Design for Convergence ICT and Character Education vol.14, pp.9, 2016, https://doi.org/10.14400/JDC.2016.14.9.9
  8. Personal Health Record System for Efficient Monitoring of Cancer Therapy vol.14, pp.12, 2016, https://doi.org/10.14400/JDC.2016.14.12.65
  9. Development achievement criteria of Creativity and Personality in Expressive Activity vol.14, pp.6, 2016, https://doi.org/10.14400/JDC.2016.14.6.519