A Secure Medical Data Exchange Protocol Based on Cloud Environment

In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients’ privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device’s characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

[1]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[2]  Florian Hess,et al.  Efficient Identity Based Signature Schemes Based on Pairings , 2002, Selected Areas in Cryptography.

[3]  Muhammad Khurram Khan,et al.  An Authentication Scheme for Secure Access to Healthcare Services , 2012, Journal of Medical Systems.

[4]  Dengguo Feng,et al.  An improved smart card based password authentication scheme with provable security , 2009, Comput. Stand. Interfaces.

[5]  Dr. Wathek S Ramez Patients ' Perception of Health Care Quality , Satisfaction and Behavioral Intention : An Empirical Study in Bahrain , 2012 .

[6]  David W. Bates,et al.  White Paper: Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption , 2006, J. Am. Medical Informatics Assoc..

[7]  Peter J. Witbooi,et al.  A nontrivial pairing of finite T0 spaces , 2002 .

[8]  Zhang Rui,et al.  A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of medical systems.

[9]  Yi Hong,et al.  Protection of Patient's Privacy and Data Security in E-Health Services , 2008, 2008 International Conference on BioMedical Engineering and Informatics.

[10]  J. Bohnen,et al.  Privacy of patients' information in hospital lifts: observational study , 2003, BMJ : British Medical Journal.

[11]  Yu-Fang Chung,et al.  A Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[12]  Zhian Zhu,et al.  An Efficient Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[13]  Chin-Ling Chen,et al.  A Non-Repudiated and Traceable Authorization System Based on Electronic Health Insurance Cards , 2012, Journal of Medical Systems.

[14]  Helen Burstin,et al.  The National Healthcare Quality and Disparities Reports: An Overview , 2005, Medical care.

[15]  Rui Zhang,et al.  A More Secure Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[16]  Muhammad Khurram Khan,et al.  Cryptanalysis and Improvement of ‘A Privacy Enhanced Scheme for Telecare Medical Information Systems’ , 2012, Journal of Medical Systems.

[17]  Jianfeng Ma,et al.  A Privacy Enhanced Authentication Scheme for Telecare Medical Information Systems , 2013, Journal of Medical Systems.

[18]  Wenfen Liu,et al.  An Improved Authentication Scheme for Telecare Medicine Information Systems , 2012, Journal of Medical Systems.

[19]  Martin White,et al.  Ambient health monitoring: the smartphone as a body sensor network component , 2013 .

[20]  Chin-Ling Chen,et al.  Using RFID Yoking Proof Protocol to Enhance Inpatient Medication Safety , 2012, Journal of Medical Systems.