Abstract
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients’ privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device’s characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.




Similar content being viewed by others
References
Wiki web site: http://en.wikipedia.org/wiki/Main_Page, Available access: 2013/11/10.
Intel web site: http://www.intel.com.tw, Available access: 2013/11/10.
IBM web site: http://www-03.ibm.com/ibm/history/ibm100/us/en/icons/streamcomputing/, Available access: 2013/11/10.
Chen, C. L., and Wu, C. Y., Using RFID yoking proof protocol to enhance inpatient medication safety. Journal of Medical Systems 36(5):2849–2864, 2012.
Tudor, P., Martin, W., Natalia, B., Zeeshan, P., and Leon, B., Ambient Health Monitoring: The smartphone as a body sensor network component. Special Edition on Innovation in Medicine and Healthcare 6(1):62–65, 2013.
Ramez, W. S., Patients’ Perception of Healthcare Quality, satisfaction and behavioral Intention: an empirical study in Bahrain. International Journal of Business and Social Science 3(18):131–141, 2012.
Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med Care 43:I3–18, 2005.
Vigod, S. N., Bell, C. M., and Bohnen, J. M. A., Privacy of patients’ information in hospital lifts: observational study. British Medical Journal 327(7422):1024–1025, 2003.
Yi, H., Patrick, T. B., and Gillis, R., Protection of patient’s privacy and data security in E-health services. International Conference on BioMedical Engineering and Informatics 1:643–647, 2008.
Tang, C. T., Ash, J. S., Bates, D. W., and Overhage, J. M., Daniel Z Sands. Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J Am Med Inform Assoc 13:121–126, 2006.
Chen, C. L., Lu, M. S., and Guo, Z. M., A non-repudiated and traceable authorization system based on electronic health insurance cards. Journal of Medical Systems 36(4):2359–2370, 2012.
Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723–728, 2009.
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(3):1529–1535, 2012.
He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(3):1989–1995, 2012.
Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6):3597–3604, 2012.
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6):3833–3838, 2012.
Khan, M., and Kumari, S., An authentication scheme for secure access to healthcare services. Journal of Medical Systems 37(4):1–12, 2013.
Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems 37:9897, 2013.
Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. Journal of Medical Systems 37(4):1–11, 2012.
Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil Pairing. Advances in Cryptology ASIACRYPT 2001(2248):514–532, 2001.
Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T 0 spaces. Topology and its Applications 125(3):533–542, 2002.
Hess, F., Efficient identity based signature schemes based on pairings. Selected Areas in Cryptography 2595:310–324, 2003.
HAVO web site: http://www.hvc.com.tw/lang/HAVO-E/Home%20HAVO.html, Available access: 2013/11/10.
Acknowledgments
This research was supported by the National Science Council, Taiwan, R.O.C., under contract number NSC 101-2622-E324-003-CC3, NSC 101-2221-E-324-005-MY2 and MOST103-2632-E-324-001-MY3.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Systems-Level Quality Improvement
Rights and permissions
About this article
Cite this article
Chen, CL., Yang, TT. & Shih, TF. A Secure Medical Data Exchange Protocol Based on Cloud Environment. J Med Syst 38, 112 (2014). https://doi.org/10.1007/s10916-014-0112-3
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-014-0112-3