Efficient key management for preserving HIPAA regulations

被引:15
作者
Huang, Hui-Feng [2 ]
Liu, Kuo-Ching [1 ]
机构
[1] China Med Univ, Dept Med Lab Sci & Biotechnol, Taichung 404, Taiwan
[2] Natl Taichung Inst Technol, Dept Comp Sci & Informat Engn, Taichung 404, Taiwan
关键词
HIPAA; Privacy; Security; Protected health information; Cryptography; CRYPTOGRAPHY; CRYPTOSYSTEMS; SECURITY;
D O I
10.1016/j.jss.2010.08.056
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The protection of patients' health information is a very important issue in the information age. Health Insurance Portability and Accountability Act (HIPAA) of privacy and security regulations are two crucial provisions in the protection of healthcare privacy, especially electronic medical information. For the quality and efficiency of the electronic services, it is necessary to construct better performance for the user and the trusted party. Based on elliptic curve cryptography (ECC) and complying with HIPAA regulations, this article presents an efficient key management scheme to facilitate inter-operations among the applied cryptographic mechanisms. In addition, the proposed scheme can achieve the complete functionality which includes: (1) a dictionary of key tables is not required for users and other units; (2) users can freely choose their own passwords; (3) users can freely update their passwords after the registration phase; (4) the computational cost is very low for users and the trusted center or server; (5) users are able to access their individual medical information through the authorization process; (6) case of consent exceptions intended to facilitate emergency applications or other possible exceptions can also be dealt with easier. (C) 2010 Elsevier Inc. All rights reserved.
引用
收藏
页码:113 / 119
页数:7
相关论文
共 23 条
[1]  
[Anonymous], 2001, ADV ENCRYPTION STAND, V197
[2]  
[Anonymous], FED REG
[3]   Beyond good practice: why HIPAA only addresses part of the data security problem [J].
Collmann, J ;
Lambert, D ;
Brummett, M ;
DeFord, D ;
Coleman, J ;
Cooper, T ;
McCall, K ;
Seymour, D ;
Alberts, C ;
Dorofee, A .
CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 :113-118
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]  
DIMITROV V, 1995, IEICE T FUND ELECTR, VE78A, P82
[6]  
Gura N, 2004, LECT NOTES COMPUT SC, V3156, P119
[7]   A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations [J].
Hu, Jiankun ;
Chen, Hsiao-Hwa ;
Hou, Ting-Wei .
COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) :274-280
[8]  
Huang HF, 2008, INT J INNOV COMPUT I, V4, P2803
[9]  
JONES D, 2003, CARD TECHNOLOGY TODA, V15, P8
[10]  
KOBLITZ N, 1987, MATH COMPUT, V48, P203, DOI 10.1090/S0025-5718-1987-0866109-5