logo

Smart Card based user authentication in maintaining data integrity and privacy of medical health records

   

Added on  2024-06-28

89 Pages11181 Words293 Views
 | 
 | 
 | 
Literature Review
Student Name & CSU ID
Project Topic Title Smart Card based user authentication in maintaining data integrity and privacy of medical health records
1
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_1

Version 1.0 _ Week 1 (5 Journal Papers from CSU Library)
1
Reference in APA format that will be in
'Reference List'
Kumar, P., Kumari, S., Sharma, V., Sangaiah, A. K., Wei, J., & Li, X. (2017). A Certificateless aggregate
signature scheme for healthcare wireless sensor network. Sustainable Computing: Informatics and Systems.
Citation that will be in the content (Kumar, et. al., 2017)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://ac-els-cdn-
com.ezproxy.csu.edu.au/
S2210537917300227/1-s2.0-
S2210537917300227-main.pdf?
_tid=819f5332-39f3-441d-9f11-
97f01ccad1dc&acdnat=1532063198_bb21a
6c24faf79a52ecb120071388933
Level of Journal – Q2 Certificateless aggregate signature scheme, Diffie-Hellman
assumption, Healthcare wireless sensor network, Security
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Techniques/algorithm :
CL-AS (Certificateless aggregate
signature) scheme
Tools:
Internet, wireless standards, wireless sensor
networks.
Applied Area:
Healthcare
Problem:
The authors claim that certificate management,
while the system generates public key for
match up, is very complex and resource
utilizing process.
Goal:
The research aims to increase the security of
patient's online available medical data by
introducing the aggregate signature scheme.
E-health (Electronic Health)
Random Oracle Model
Diffie-Hellman assumption
Sensors
healthcare professionals
personal digital assistant (PDA)
2
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_2

The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Data gathering –
The sensed data is gathered by healthcare
professionals. Further, data is analysed to
provide prescription to the patient.
Sensors have the capability of calculation. N/A
2 Medical server –
Medical servers are used to transfer the patient’s
information to healthcare professionals.
Strong computing power, Storage space and
has capability to process a large amount of
data received by sensors.
N/A
3 Aggregators –
Collecting the signature from care-district and
generate aggregated signature and transfer to
Medical server.
Limited power of computation and calculation. Limited power of computation and
calculation.
4 Signature transfer through sensors –
Sensors are embedded with the private-public
key pair which belongs to Care-district.
Capable to generate signed message from a
physical word by using private key.
Resource-limited.
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
signature schemes (ID-PKC) public key cryptography
Random Oracle Model security analysis
3
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_3

Input and Output Critical Thinking: Feature of this work,
and Why (Justify)
Critical Thinking: Limitations of the
research current solution, and Why
(Justify)
Input (Data) Output (View)
KGC takes a user’s identity
as input.
The input of the research is to
develop a scheme which is
supported signature
authentication for accessing
medical data of patient.
Targeted identity with the
corresponding public key set
The output is to improvise
security of communication in
healthcare wireless sensor
network using aggregate
signature scheme. That could
increase the patient satisfaction
with the medical service.
Certificateless signature (CLS) scheme has
been proposed in the paper. It could
increase the security of communication in
healthcare wireless sensor network.
The proposed include aggregate signature
that increase the security while accessing
the data online.
The proposal is more efficient in terms of
energy consumption and computational
cost.
Calculation and computation by the
sensors are still the limitations in the
research. Although, it is not a big issue
to resolve but the tiny one.
(Describe the research/current solution) Evaluation Criteria How this research/current solution is
valuable for your project
In accordance with Kumar et al. (2017), CL-AS (Certificate less
aggregate signature) scheme can be introduced as an assumption
for the proposed scheme. The aggregate signature-based
authentication mechanism in healthcare wireless sensor network
shall enhance the medical data security of the patients using their
identity (Kumar et al., 2017)
The inducers of the proposed mechanism
are hospitals & patients. The scheme
introduced shall aid in securing the medical
health records via aggregated signature of
patient.
The proposed framework for chronically
ill patients will help to enhance the
process of in-hospital and out-hospital
data to get vaulted and get the access
through third-party applications.
Diagram/Flowchart
4
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_4

Figure – framework of healthcare wireless sensor network
5
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_5

Figure - Architecture of healthcare wireless sensor network (HWSN)
Figure – Setup of noise leakage experiment
6
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_6

2
Reference in APA format that will be in
'Reference List'
Xu, J., Wei, L., Wu, W., Wang, A., Zhang, Y., & Zhou, F. (2018). Privacy-preserving data integrity verification
by using lightweight streaming authenticated data structures for healthcare cyber–physical system. Future
Generation Computer Systems.
Citation that will be in the content (Xu, et al., 2017)
URL of the Reference Level of Journal (Q1, Q2, …Qn) Keywords in this Reference
https://ac-els-cdn-
com.ezproxy.csu.edu.au/
S0167739X17326067/1-s2.0-
S0167739X17326067-main.pdf?
_tid=c0303bc4-0c85-44fa-b68c-
858d5e5060e0&acdnat=1532106809_f458
e06b40b469a6ff6ccbf115b51be5
Level of Journal - Q1 Wireless Body Area Networks (WBANs), Cloud computing,
Authenticated data structures, Cyber-physical system (CPS),
Healthcare
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/ ...
etc )
The Goal (Objective) of this Solution &
What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Privacy preserving data integrity
verification model by using lightweight
streaming authenticated data structures
(PPDIVM-LSADS)
Tools:
Electronic health records (EHRs)
Wireless Body Area Networks (WBANs)
Applied Area:
Problem:
In this journal, the authors identified that the
major issue with existing cyber-physical
system is underdeveloped security in medical
data management. Further, hostile
environments integrity is disturbed.
Goal:
The goal of the research is to develop a
privacy-preserving data integrity verification
by using lightweight streaming authenticated
Cyber-physical system (CPS)
Cloud computing,
Electronic health records (EHRs)
Health-CPS
7
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_7

Health-CPS data structures for healthcare cyber–physical
system
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps Advantage (Purpose of this step) Disadvantage (Limitation/Challenge)
1 Data source
Gather the real-time data from the source or
body of the patient or client. Information such as
body temperature & blood pressure. If the client
or patient willing to get the detail about data,
this process route the query to the system
through authentication.
Reduce the storage issue Range query
2 Cloud server –
Provide query and storage services. It receives
and collects the data from the source If the client
or patient willing to get the detail about data,
this process route the query to the system
through authentication.
Multitasking at the same time Plaintext weights thus prone to hijacking
3 Data user –
This is the main step as it generates a pair key
for the authentication. Public key forwarding to
server and private key retain itself.
The procedure provides security to the process. N/A
Validation Criteria (Measurement Criteria)
Dependent Variable Independent Variable
8
Smart Card based user authentication in maintaining data integrity and privacy of medical health records_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Building a Smart Home Healthcare System for Elderly Dementia Patients: A Literature Review
|115
|10054
|65

Ubiquitous Computing Synchronization for Efficient Error Detection in Electronic Medical Records (EMR)
|95
|11585
|330

IoT in Healthcare: Authentication and Authorization
|11
|3032
|441

A Community-Based IoT Personalized Wireless Healthcare Solution
|13
|12118
|29