Application of Time-Limit Key Management Mechanism on Electronic Medical Record System

The advance of information network makes lots of users start to store personal or corporately confidential documents in network environments digitally. In this case, it is necessary to effectively prevent data from being stolen through the authority management. In the past years, some chief medical institutions start to apply e-database system to store and collect medical information, including patients' personal data and medical confidential information. Aiming at patient's electronic medical record data, the greatest advantage of mobile agents is the use. In the virtual network, we can legally collect patients' medical information in various medical institutions and share patient's information among medical institutions. Furthermore, public key cryptosystem and Lagrange interpolation are utilized for proposing a key management and data access mechanism to effectively maintain the confidentiality and security of medical information sharing. With the constraint for specific users to acquire the decryption key for encrypted data at a specific time, the mechanism proposed in this study can largely enhance the difficulty for illegal users or external attackers to steal secret keys. It provides a brand-new solution for the management of medical information.

[1]  Yuh-Min Tseng,et al.  Revocable Certificateless Public Key Encryption , 2015, IEEE Systems Journal.

[2]  Mehdi Mahdavian,et al.  An investigation of the success of hospital information systems implementation: A case study , 2014, 2014 International Computer Science and Engineering Conference (ICSEC).

[3]  Darshana Patel,et al.  Mobile agent and distributed data mining , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[4]  Xiaohua Hu,et al.  An error detecting and tagging framework for reducing data entry errors in electronic medical records (EMR) system , 2013, 2013 IEEE International Conference on Bioinformatics and Biomedicine.

[5]  Gang Hu Study of file encryption and decryption system using security key , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[6]  M.-H. Guo,et al.  Centralised conference key mechanism with elliptic curve cryptography and lagrange interpolation for sensor networks , 2011, IET Commun..

[7]  Vanga Odelu,et al.  LHSC: An effective dynamic key management scheme for linear hierarchical access control , 2013, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS).

[8]  Yun Wan,et al.  Lessons from method: A successful Electronic Medical Record (EMR) system implementation , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.

[9]  Ramon Martí,et al.  Secure Integration of Distributed Medical Data Using Mobile Agents , 2006, IEEE Intelligent Systems.