A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments

Main Article Content

A.Yogananda
Chepuri Sai Teja

Abstract

Secrecy in the distributed m-healthcare cloud computing reflect concurrently attaining data confidentiality and identity privacy with high efficiency in this connection Cloud Computing providing several advantages to service providers and to customers, Hence it have a good preference in the technical world. The health care industries are growing in various fields over the few years. For the patients and doctors or to other physicians the communication is an important requirement for the inquiries and suggestions. The m-Healthcare cloud computing is significantly providing such type of communication for efficient patient treatment and medical consultation by sharing the personal health information to health care service providers (Hospitals, Research Centres etc. ). Even though a service is good there are some privacy breaches in the present scenario they are following. They are (1) Data Confidentiality and (2) Patient’s Identity Privacy. Much existing access and authentication schemes introduced by several types of research but they cannot be exploited in a straightforward manner. To solve this issue, in this paper we propose an Authorized Accessible Privacy Model (AAPM). By this, a patient can authorize a physician by setting a multi-level access tree of threshold predicates. According to this, we introduce a new technique called attribute-based designated verifier signature for multi-level patient self-controllable authentication in cloud computing environment realizing three levels of privacy and security requirement in distributed m-Healthcare cloud computing system. The three levels of authentication involve directly authorized a physician, indirectly authorized physician and unauthorized persons for medical consultation and decipher the personal health information and to verify the identities by satisfying the access with the help of their own set of attributes.

Article Details

How to Cite
[1]
A.Yogananda and Chepuri Sai Teja, “A Multi-level Self-Controllable Authentication in Distributed m-Healthcare Cloud Environments”, Int. J. Comput. Eng. Res. Trends, vol. 3, no. 8, pp. 436–440, Aug. 2016.
Section
Research Articles

References

L. Gatzoulis and I. Iakovidis, ‚Wearable and portable E-health systems,‛ I EE E E n g . Me d . B I o l . M a g., vol. 26, no. 5, pp. 51–56, Sep.- Oct. 2007.

I. Iakovidis, ‚Towards personal health record: current situation, obstacles, and trends in implementation of electronic healthcare records in Europe,‛ Int. J. Med. Inf., vol. 52, no. 1, pp. 105–115, 1998.

J. Zhou and M. He, ‚An improved distributed key management scheme in wireless sensor networks,‛ in Proc. 9th Int. Workshop Inf. Security Appl., 2008, pp. 305–319.

R. Lu and Z. Cao, ‚Efficient remote user authentication scheme using a smart card,‛ Comput. Netw., vol. 49, no. 4, pp. 535–540, 2005.

S. Yu, K. Ren, and W. Lou, ‚FDAC: Toward fine-grained distributed data access control in wireless sensor networks,‛ in Proc. IEEE Conf. Comput. Commun., 2009, pp. 963–971.

S. Schechter, T. Parnell, and A. Hartemink, ‚Anonymous authentication of membership in dynamic groups in,‛ in Proc. 3rd Int. Conf. Financial Cryptography, 1999, pp. 184–195.

D. Slamanig, C. Stingl, C. Menard, M. Heiligenbrunner, and J. Thierry, ‚Anonymity and application privacy in context of mobile computing in eHealth,‛ in Mobile Response, New York, NY, USA: Springer, 2009 pp. 148– 157.

J. Zhou and Z. Cao, ‚TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks,‛ in Proc. IEEE Global Commun. Conf., 2012, pp. 985– 990.

M. D. N. Huda, N. Sonehara, and S. Yamada, ‚A privacy management architecture for patient-controlled personal health record system,‛ J. Eng. Sci. Technol., vol. 4, no. 2, pp. 154–170, 2009.

F. W. Dillema and S. Lupetti, ‚Rendezvousbased access control for medical records in the pre-hospital environment,‛ in Proc. 1st ACM SIGMOBILE Int. Workshop Syst. Netw. Support Healthcare Assisted Living, 2007, pp. 1–6.

J. Sun, Y. Fang, and X. Zhu, ‚Privacy and emergency response in e-healthcare leveraging wireless body sensor networks,‛ IEEE Wireless Commun., vol. 17, no. 1, pp. 66–73, Feb. 2010.

X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, ‚SAGE: A strong privacy-preserving scheme against global eavesdropping for Ehealth systems,‛ IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 365–378, May 2009.

J. Sun, X. Zhu, C. Zhang, and Y. Fang, ‚HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare,‛ in Proc. 31st Int. Conf. Distrib. Comput. Syst., 2011, pp. 373–382.

L. Lu, J. Han, Y. Liu, L. Hu, J. Huai, L. M. Ni, and J. Ma, ‚Pseudo trust: Zero-knowledge authentication in anonymous P2Ps,‛ IEEE Trans. Parallel Distrib. Syst., vol. 19, no. 10, pp. 1325–1337, Oct. 2008.

E. Villalba, M. T. Arredondo, S. Guillen, and E. Hoyo-Barbolla, ‚A new solution for a heart failure monitoring system based on wearable and information technologies in,‛ in Proc. Int. Workshop Wearable Implantable Body Sens. Netw., Apr. 2006, pp. 150–153.