Enhancing security of electronic health records through grid-based user authentication scheme

Medical research and electronic health record EHR maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

[1]  Snezana Sucurovic An Approach to Access Control in Electronic Health Record , 2009, Journal of Medical Systems.

[2]  Rajkumar Buyya,et al.  GridSim: a toolkit for the modeling and simulation of distributed resource management and scheduling for Grid computing , 2002, Concurr. Comput. Pract. Exp..

[3]  José Luis Fernández Alemán,et al.  Security and privacy in electronic health records: A systematic literature review , 2013, J. Biomed. Informatics.

[4]  Andrew Beng Jin Teoh,et al.  Biohashing: two factor authentication featuring fingerprint data and tokenised random number , 2004, Pattern Recognit..

[5]  Ivan Damgård,et al.  A Design Principle for Hash Functions , 1989, CRYPTO.

[6]  Phillip Rogaway,et al.  Nonce-Based Symmetric Encryption , 2004, FSE.

[7]  Maryam Ahmadi,et al.  Security Requirements and Solutions in Electronic Health Records: Lessons Learned from a Comparative Study , 2010, Journal of Medical Systems.

[8]  Quynh H. Dang,et al.  Secure Hash Standard | NIST , 2015 .

[9]  Loris Nanni,et al.  Multihashing, human authentication featuring biometrics data and tokenized random number: A case study FVC2004 , 2005, Neurocomputing.

[10]  Mark A. Rothstein,et al.  Compelled Authorizations for Disclosure of Health Records: Magnitude and Implications , 2007, The American journal of bioethics : AJOB.

[11]  David Zhang,et al.  An analysis of BioHashing and its variants , 2006, Pattern Recognit..

[12]  David-Olivier Jaquet-Chiffelle,et al.  Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records , 2011, Int. J. Medical Informatics.

[13]  Alfred Menezes,et al.  The Elliptic Curve Digital Signature Algorithm (ECDSA) , 2001, International Journal of Information Security.

[14]  Sun K. Yoo,et al.  Web-based secure access from multiple patient repositories , 2008, Int. J. Medical Informatics.

[15]  Mario Piattini,et al.  Security requirements engineering framework for software product lines , 2010, Inf. Softw. Technol..

[16]  Padma Ramachandran,et al.  Education in India , 2006 .

[17]  Conor Teljeur,et al.  Exploring the potential for using the grid to support health impact assessment modelling , 2004, Parallel Comput..

[18]  Leslie Lenert,et al.  A Public Health Grid (PHGrid): Architecture and value proposition for 21st century public health , 2010, Int. J. Medical Informatics.

[19]  Timothy B. Stockwell,et al.  The Sequence of the Human Genome , 2001, Science.

[20]  Yuguang Fang,et al.  Cross-Domain Data Sharing in Distributed Electronic Health Record Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.

[21]  Reihaneh Safavi-Naini,et al.  Using digital rights management for securing data in a medical research environment , 2010, DRM '10.

[22]  Jiankun Hu,et al.  Corresponding author’s address: , 2022 .

[23]  N. Koblitz Elliptic curve cryptosystems , 1987 .

[24]  Loris Nanni,et al.  An improved BioHashing for human authentication , 2007, Pattern Recognit..