Biometric-based key management for satisfying patient's control over health information in the HIPAA regulations

被引:4
作者
Bui, Quy-Anh [1 ]
Lee, Wei-Bin [1 ]
Lee, Jung-San [1 ]
Wu, Hsiao-Ling [1 ,2 ]
Liu, Jo-Yun [1 ]
机构
[1] Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 40724, Taiwan
[2] Chaoyang Univ Technol, Dept Informat Management, Taichung 41349, Taiwan
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2020年 / 14卷 / 01期
关键词
Health Insurance Portability and Accountability Act (HIPAA); electronic health information control; patient's privacy/security;
D O I
10.3837/tiis.2020.01.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
According to the privacy regulations of the health insurance portability and accountability act (HIPAA), patients' control over electronic health data is one of the major concern issues. Currently, remote access authorization is considered as the best solution to guarantee the patients' control over their health data. In this paper, a new biometric-based key management scheme is proposed to facilitate remote access authorization anytime and anywhere. First, patients and doctors can use their biometric information to verify the authenticity of communication partners through real-time video communication technology. Second, a safety channel is provided in delivering their access authorization and secret data between patient and doctor. In the designed scheme, the user's public key is authenticated by the corresponding biometric information without the help of public key infrastructure (PKI). Therefore, our proposed scheme does not have the costs of certificate storage, certificate delivery, and certificate revocation. In addition, the implementation time of our proposed system can be significantly reduced.
引用
收藏
页码:437 / 454
页数:18
相关论文
共 21 条
  • [1] User experience and interaction performance in 2D/3D telecollaboration
    Anton, David
    Kurillo, Gregorij
    Bajcsy, Ruzena
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 77 - 88
  • [2] Biryukov A., 2004, IACR CRYPTOLOGY EPRI
  • [3] BURROWS M, 1990, ACM T COMPUTER SYSTE, V8
  • [4] Correa- Garcia J. A., 2018, SUSTAINABILITY, V10, P1602
  • [5] Daemen J, 2000, LECT NOTES COMPUT SC, V1820, P277
  • [6] Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
    Dodis, Yevgeniy
    Ostrovsky, Rafail
    Reyzin, Leonid
    Smith, Adam
    [J]. SIAM JOURNAL ON COMPUTING, 2008, 38 (01) : 97 - 139
  • [7] Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems
    Guo, Rui
    Shi, Huixian
    Zhao, Qinglan
    Zheng, Dong
    [J]. IEEE ACCESS, 2018, 6 : 11676 - 11686
  • [8] A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
    Hu, Jiankun
    Chen, Hsiao-Hwa
    Hou, Ting-Wei
    [J]. COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) : 274 - 280
  • [9] Efficient key management for preserving HIPAA regulations
    Huang, Hui-Feng
    Liu, Kuo-Ching
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (01) : 113 - 119
  • [10] Huang HF, 2009, INT J INNOV COMPUT I, V5, P3923