Skip to main content
Log in

A Secure Medical Data Exchange Protocol Based on Cloud Environment

  • Systems-Level Quality Improvement
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients’ privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device’s characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Wiki web site: http://en.wikipedia.org/wiki/Main_Page, Available access: 2013/11/10.

  2. Intel web site: http://www.intel.com.tw, Available access: 2013/11/10.

  3. IBM web site: http://www-03.ibm.com/ibm/history/ibm100/us/en/icons/streamcomputing/, Available access: 2013/11/10.

  4. Chen, C. L., and Wu, C. Y., Using RFID yoking proof protocol to enhance inpatient medication safety. Journal of Medical Systems 36(5):2849–2864, 2012.

    Article  Google Scholar 

  5. Tudor, P., Martin, W., Natalia, B., Zeeshan, P., and Leon, B., Ambient Health Monitoring: The smartphone as a body sensor network component. Special Edition on Innovation in Medicine and Healthcare 6(1):62–65, 2013.

    Google Scholar 

  6. Ramez, W. S., Patients’ Perception of Healthcare Quality, satisfaction and behavioral Intention: an empirical study in Bahrain. International Journal of Business and Social Science 3(18):131–141, 2012.

    Google Scholar 

  7. Kelley, E., Moy, E., Stryer, D., Burstin, H., and Clancy, C., The national healthcare quality and disparities reports: an overview. Med Care 43:I3–18, 2005.

    Google Scholar 

  8. Vigod, S. N., Bell, C. M., and Bohnen, J. M. A., Privacy of patients’ information in hospital lifts: observational study. British Medical Journal 327(7422):1024–1025, 2003.

    Article  Google Scholar 

  9. Yi, H., Patrick, T. B., and Gillis, R., Protection of patient’s privacy and data security in E-health services. International Conference on BioMedical Engineering and Informatics 1:643–647, 2008.

    Google Scholar 

  10. Tang, C. T., Ash, J. S., Bates, D. W., and Overhage, J. M., Daniel Z Sands. Personal health records: definitions, benefits, and strategies for overcoming barriers to adoption. J Am Med Inform Assoc 13:121–126, 2006.

    Article  Google Scholar 

  11. Chen, C. L., Lu, M. S., and Guo, Z. M., A non-repudiated and traceable authorization system based on electronic health insurance cards. Journal of Medical Systems 36(4):2359–2370, 2012.

    Article  Google Scholar 

  12. Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Computer Standards & Interfaces 31(4):723–728, 2009.

    Article  Google Scholar 

  13. Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(3):1529–1535, 2012.

    Article  Google Scholar 

  14. He, D. B., Chen, J. H., and Zhang, R., A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(3):1989–1995, 2012.

    Article  Google Scholar 

  15. Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6):3597–3604, 2012.

    Article  Google Scholar 

  16. Zhu, Z., An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems 36(6):3833–3838, 2012.

    Article  Google Scholar 

  17. Khan, M., and Kumari, S., An authentication scheme for secure access to healthcare services. Journal of Medical Systems 37(4):1–12, 2013.

    Google Scholar 

  18. Jiang, Q., Ma, J., Ma, Z., and Li, G., A privacy enhanced authentication scheme for telecare medical information systems. Journal of Medical Systems 37:9897, 2013.

    Article  Google Scholar 

  19. Kumari, S., Khan, M. K., and Kumar, R., Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems’. Journal of Medical Systems 37(4):1–11, 2012.

    Google Scholar 

  20. Boneh, D., Lynn, B., and Shacham, H., Short signatures from the Weil Pairing. Advances in Cryptology ASIACRYPT 2001(2248):514–532, 2001.

    MathSciNet  Google Scholar 

  21. Hardie, K. A., Vermeulen, J. J. C., and Witbooi, P. J., A nontrivial pairing of finite T 0 spaces. Topology and its Applications 125(3):533–542, 2002.

    Article  MATH  MathSciNet  Google Scholar 

  22. Hess, F., Efficient identity based signature schemes based on pairings. Selected Areas in Cryptography 2595:310–324, 2003.

    Article  MathSciNet  Google Scholar 

  23. HAVO web site: http://www.hvc.com.tw/lang/HAVO-E/Home%20HAVO.html, Available access: 2013/11/10.

Download references

Acknowledgments

This research was supported by the National Science Council, Taiwan, R.O.C., under contract number NSC 101-2622-E324-003-CC3, NSC 101-2221-E-324-005-MY2 and MOST103-2632-E-324-001-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chin-Ling Chen.

Additional information

This article is part of the Topical Collection on Systems-Level Quality Improvement

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, CL., Yang, TT. & Shih, TF. A Secure Medical Data Exchange Protocol Based on Cloud Environment. J Med Syst 38, 112 (2014). https://doi.org/10.1007/s10916-014-0112-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10916-014-0112-3

Keywords

Navigation

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy