A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments
Main Article Content
Abstract
Secrecy in the distributed m-healthcare cloud computing reflect concurrently attaining data confidentiality and identity privacy with high efficiency in this connection Cloud Computing providing several advantages to service providers and to customers, Hence it have a good preference in the technical world. The health care industries are growing in various fields over the few years. For the patients and doctors or to other physicians the communication is an important requirement for the inquiries and suggestions. The m-Healthcare cloud computing is significantly providing such type of communication for efficient patient treatment and medical consultation by sharing the personal health information to health care service providers (Hospitals, Research Centres etc. ). Even though a service is good there are some privacy breaches in the present scenario they are following. They are (1) Data Confidentiality and (2) Patient’s Identity Privacy. Much existing access and authentication schemes introduced by several types of research but they cannot be exploited in a straightforward manner. To solve this issue, in this paper we propose an Authorized Accessible Privacy Model (AAPM). By this, a patient can authorize a physician by setting a multi-level access tree of threshold predicates. According to this, we introduce a new technique called attribute-based designated verifier signature for multi-level patient self-controllable authentication in cloud computing environment realizing three levels of privacy and security requirement in distributed m-Healthcare cloud computing system. The three levels of authentication involve directly authorized a physician, indirectly authorized physician and unauthorized persons for medical consultation and decipher the personal health information and to verify the identities by satisfying the access with the help of their own set of attributes.
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
IJCERT Policy:
The published work presented in this paper is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. This means that the content of this paper can be shared, copied, and redistributed in any medium or format, as long as the original author is properly attributed. Additionally, any derivative works based on this paper must also be licensed under the same terms. This licensing agreement allows for broad dissemination and use of the work while maintaining the author's rights and recognition.
By submitting this paper to IJCERT, the author(s) agree to these licensing terms and confirm that the work is original and does not infringe on any third-party copyright or intellectual property rights.
References
L. Gatzoulis and I. Iakovidis, ‚Wearable and portable E-health systems,‛ I EE E E n g . Me d . B I o l . M a g., vol. 26, no. 5, pp. 51–56, Sep.- Oct. 2007.
I. Iakovidis, ‚Towards personal health record: current situation, obstacles, and trends in implementation of electronic healthcare records in Europe,‛ Int. J. Med. Inf., vol. 52, no. 1, pp. 105–115, 1998.
J. Zhou and M. He, ‚An improved distributed key management scheme in wireless sensor networks,‛ in Proc. 9th Int. Workshop Inf. Security Appl., 2008, pp. 305–319.
R. Lu and Z. Cao, ‚Efficient remote user authentication scheme using a smart card,‛ Comput. Netw., vol. 49, no. 4, pp. 535–540, 2005.
S. Yu, K. Ren, and W. Lou, ‚FDAC: Toward fine-grained distributed data access control in wireless sensor networks,‛ in Proc. IEEE Conf. Comput. Commun., 2009, pp. 963–971.
S. Schechter, T. Parnell, and A. Hartemink, ‚Anonymous authentication of membership in dynamic groups in,‛ in Proc. 3rd Int. Conf. Financial Cryptography, 1999, pp. 184–195.
D. Slamanig, C. Stingl, C. Menard, M. Heiligenbrunner, and J. Thierry, ‚Anonymity and application privacy in context of mobile computing in eHealth,‛ in Mobile Response, New York, NY, USA: Springer, 2009 pp. 148– 157.
J. Zhou and Z. Cao, ‚TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks,‛ in Proc. IEEE Global Commun. Conf., 2012, pp. 985– 990.
M. D. N. Huda, N. Sonehara, and S. Yamada, ‚A privacy management architecture for patient-controlled personal health record system,‛ J. Eng. Sci. Technol., vol. 4, no. 2, pp. 154–170, 2009.
F. W. Dillema and S. Lupetti, ‚Rendezvousbased access control for medical records in the pre-hospital environment,‛ in Proc. 1st ACM SIGMOBILE Int. Workshop Syst. Netw. Support Healthcare Assisted Living, 2007, pp. 1–6.
J. Sun, Y. Fang, and X. Zhu, ‚Privacy and emergency response in e-healthcare leveraging wireless body sensor networks,‛ IEEE Wireless Commun., vol. 17, no. 1, pp. 66–73, Feb. 2010.
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, ‚SAGE: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems,‛ IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365–378, May 2009.
J. Sun, X. Zhu, C. Zhang, and Y. Fang, ‚HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare,‛ in Proc. 31st Int. Conf. Distrib. Comput. Syst., 2011, pp. 373–382.
L. Lu, J. Han, Y. Liu, L. Hu, J. Huai, L. M. Ni, and J. Ma, ‚Pseudo trust: Zero-knowledge authentication in anonymous P2Ps,‛ IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 10, pp. 1325–1337, Oct. 2008.
E. Villalba, M. T. Arredondo, S. Guillen, and E. Hoyo-Barbolla, ‚A new solution for a heart failure monitoring system based on wearable and information technologies in,‛ in Proc. Int. Workshop Wearable Implantable Body Sens. Netw., Apr. 2006, pp. 150–153.