Elliptical Curve Cryptography for e-Healthcare System Authentication
Abstract
Security of medical records is a hot topic these days. The application of health care gets more widespread as its security increases. Li et al. brought attention to this problem by putting out a novel RFID authentication system for e-health care that protects privacy. One of the main industries is health care, where we focus a lot of attention and resources to improve the services we provide to physicians and patients. In an effort to get more patients, many medical facilities now provide free medical care and medication. An application with real-time implementation has been built to track incoming and outgoing patients. By using private and public key and cryptographic techniques, the data are kept on a cloud server with privacy maintained. One benefit of the application is that it grants access to specific patient information, and emergency preventative measures have been implemented to safeguard the server's records.
Full Text:
PDFReferences
Masoumeh Safkhani and Athanasios Vasilakos, A new secure authentication protocol for telecare medicine information system and smart campus. In: Digital Object Identifier,2019
Muhammad Umair Aslam, Abdelouahid Derhab, Kashif Saleem . A survey of authentication schemes in telecare medicine information systems. In: Springer Science+Business Media, 2016
Iskandar Setiadi, Elliptic Curve Cryptography: Algorithm s and Implementation Analysis over Coordinate Systems.In: https://www.researchgate.net/publication/268688957,2014
Maitra, T., Obaidat , M.S., Islam, S. H., Giri, D., and Amin, R : Security analysis and design of an efficient ecc-based two –factor password authentication scheme. Security and Communication Networks (2016) n/a-n/aSec 1596 doi:10.1002/sec.1596.
Wang, D., and Wang, p., on the anonymity of two-factor authentication schemes for wireless sensor network: attack, principal and solution .Comput.Netw.73:41-57 , 2014.
Khan,F.A.,and et Al., A cloud-based healthcare framework for security and patients data privacy using wireless body area networks. In: Procedia Computer Science, Vol. 34, pp. 511-517,2014
Refbacks
- There are currently no refbacks.