New secure communication protocols for mobile e-health system

Aramudhan M *, K. Mohan **
* Perunthalaivar Kamarajar Institute of Engineering and Technology, Nedungadu, Karaikal.
** Research Scholar, Sathyabama University, Chennai, India.
Periodicity:July - September'2010
DOI : https://doi.org/10.26634/jse.5.1.1207

Abstract

E-health system has been used as communication system that enables to deliver medical service over the Internet. The medical information’s accessible in e-health systems are highly sensitive and distributed that demands strong authentication and authorization mechanisms for communication between the healthcare professionals, consumers and providers. Internet is an open system that provides anybody can access any information. Hence, e-health users demand safe communication and user privacy over Internet. This paper introduces two secure communication protocols based on message passing and Mobile agent for online e-health system. Certificate based Authentication and Attribute based Policy assigned Authorization framework (CAAPA) for Mobile e-health systems is proposed based on message passing technique. Token based Cross Verification (TCV) protocol is proposed for secure services in e-health System over Internet based on Mobile agent. Both protocols offer user friendly, well-built secure mechanism that gives confident to the users and healthcare professional to access the E-health system. CAAPA is efficient in terms of maintaining strong user privacy and the communication overhead is high. TCV is efficient in terms of maintaining strong user privacy and consumes less communication overhead.

Keywords

Authentication,Access control,Privacy,Authorization,Certificate, Policy,CAAPA,TCV

How to Cite this Article?

Aramudhan M and K. Mohan (2010). New secure communication protocols for mobile e-health system. i-manager’s Journal on Software Engineering, 5(1), 34-39. https://doi.org/10.26634/jse.5.1.1207

References

[1]. Fahed, Al-Nayadi, and Jemal, H. Abawajy, (2007). An authentication Framework for e-health systems”, in Proc. Int. symp. Signal Processing and Information Technology (IEEE, 2007), pp. 616-619.
[2]. Burgsteiner, H., and Prietl, J. (2008). A Framework for secure communication of Mobile E-health applications”, in Medical Informatics meets eHealth (2008) pp.29-30
[3]. Song Han, Geoff Skinner, Vidyasagar Potdar, Elizabeth Chang, (2006). A Framework of Authentication and Authorization for e-Health Services in Proc. SWS (2006), pp.105-106.
[4]. Xianping Wu, Huy Hoang Ngo, PhuDungle, Balasubraaniam Srinivasanii, (2009). Novel Authentication & Authorization Management for Sensitive information Privacy protection using Dynamic Key based Group Key Management”, Int. Journal of Computer Science and Applications,2009, pp.57- 74.
[5]. Burgsteiner Harald, and Wallner Dietmar, (2008). “PeDIS-Design and Development of a Performance Diagnosis Information System”, Medical Informatics meets eHealth, pp. 47-51.
[6]. Hitchens, M., and Varadharajan, V. (2000). Design and Specification of Role-based Access Control policies. in IEE Proc. Software (2000), pp.117-129.
[7]. Blobel, B. (2006). Advanced and Secure Architectural HER Approaches, Int. Journal Medical Informatics, pp- 185-190.
[8]. Han, Song and Skinner, G. Potdar, Vidysagar, Chang, Elizabeth and Wu, Chen, (2006). New Framework for Authentication and Authorization for e-Health Service Systems, in Proc. Int. Conf. Industrial Technology (2006), pp. 2833-2838.
[9]. Li M., Poovendran R, and Narayanan, S. (2005). Protecting Patient Privacy against Unauthorized Release of Medical Images in a Group Communication Environment, Int. Journal. Computerized Medical Imaging and Graphics, pp. 367-383.
[10]. Panagiotis Germanakos1, (2006). Constantinos Mourlas1, and George Samaras2, A Mobile Agent Approach for Ubiquitous and Personalized eHealth Information Systems, IEEE transactions on Computers, 2006 pp.1259-1273.
[11]. J.E. Holt, R.W. Bardshaw, K.E. Seamons, and H. Orman, (2003). Hidden credentials, in Proc. second ACM workshop Electronic Soc (2003), pp.1-8,2003.
[12]. Fahed Al-Nayadi, and J.H. Abawajy, (2007). An Authorization Policy Management Framework for Dynamic Medical Data Sharing in Proc. Int. Conf. Intelligent Pervasive Computing (IEEE, 2007), pp.313-318
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.