U-prove based security framework for mobile device ...

1 downloads 0 Views 310KB Size Report
Oct 22, 2017 - Conference Location: Munich, Germany ... framework for mobile device authentication in eHealth networks - IEEE Conference Publication.
U-prove based security framework for mobile device authentication in eHealth networks - IEEE Conference Publication

IEEE.org | IEEE Xplore Digital Library | IEEE-SA | IEEE Spectrum | More Sites

10/22/17, 9)13 AM

Cart (0) | Create Account | Personal Sign In

Institutional Sign In

Browse

My Settings

Subscribe

Get Help Advertisement

Browse Conferences > e-Health Networking, Applicat...

Back to Results

U-prove based security framework for mobile device authentication in eHealth networks Sign In or Purchase to View Full Text

Related Articles A bandwidth-reservation mechanism for ondemand ad hoc path finding

159

Technology challenges for building Internet-scale ubiquitous computing

Full Text Views

View All

4

Khan Zeb ;

Kashif Saleem ;

Jalal Al Muhtadi ;

Christoph Thuemmler

View All Authors

Author(s)

Abstract

Authors

Figures

References

Citations

Keywords

Metrics

Media

Abstract: Cybersecurity in the health care domain is one of the most important and critical issues of this era. In fact, it was reported in 2014 that on the black market medical records are worth 10 times more than credit card details [1]. Datasets experience a particularly high risk when shifted to a different domain for the documentation of therapeutic or diagnostic procedures. U-Prove is a token based security concept whereby a user may disclose safely and securely a limited amount of information for authentication and verification purposes. In this paper, a U-Prove based security mechanism is proposed for mobile device authentication and authorization in the eHealthcare environment. The complete architecture of the proposed security mechanism and its detailed methodology with process flow is presented. In addition, a generic security analysis is performed to show the strength of the proposed security mechanism. Published in: e-Health Networking, Applications and Services (Healthcom), 2016 IEEE 18th International Conference on Date of Conference: 14-16 Sept. 2016

INSPEC Accession Number: 16484448

Date Added to IEEE Xplore: 21 November 2016

DOI: 10.1109/HealthCom.2016.7749518

ISBN Information:

Publisher: IEEE Conference Location: Munich, Germany

Advertisement

Contents

http://ieeexplore.ieee.org/document/7749518/

Page 1 of 3

U-prove based security framework for mobile device authentication in eHealth networks - IEEE Conference Publication

Download PDF

Download Citations

View References

Email

Print

Request Permissions

Export to Collabratec

Alerts

I. Introduction In today's world, numerous challenges are faced regarding healthcare including the rise of chronic, non-communicable diseases, ever increasing healthcare costs, and aging societies. In order to cope with these challenges, Healthcare ecosystems have to evolve. The transition of the healthcare ecosystems from hospital centered, specialist focused approaches to distributed, patient centered care models are in full swing [2]. This is strongly supported by the progressive deployment of the Internet of Things in healthcare and new strategies such as cyber-physical system based approaches under Industrie 4.0 or more precisely Health 4.0 [3], [4]. The flow of information will be enhanced and facilitated by the 5th generation of mobile network technology (5G) which will also enable device and network virtualization and service aggregation [5]. Future health strategies such as Individualized Medicine / Precision Medicine are designed to enhance quality of experience, reduce dependencies and release efficiency reserves, especially in the context of the (self)-management of chronic, non-communicable disease [6]. However, at the same time, it also raises security and privacy concerns related to sensitive medical information [7]. The more distributed the system grows, the higher the risks associated with the mobility of data and services. Read document

10/22/17, 9)13 AM

Full Text Abstract Authors Figures References Citations Keywords Back to Top

Keywords IEEE Keywords Mobile handsets, Authentication, Protocols, Smart cards, Medical services, Servers

INSPEC: Controlled Indexing mobile computing, authorisation, health care

INSPEC: Non-Controlled Indexing cybersecurity, U-prove based security, mobile device authentication, e-health networks, health care domain, black market medical records, therapeutic procedures, diagnostic procedures, token based security, authorization, process flow, security analysis

Author Keywords U-Prove, client, cybersecurity, cyber-physical systems, eHealthcare, encryption, Health 4.0, mHealth, mobile application, server

Authors Khan Zeb Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh-12372, Saudi Arabia

Kashif Saleem Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh-12372, Saudi Arabia

Jalal Al Muhtadi Center of Excellence in Information Assurance (CoEIA), King Saud University, Riyadh-12372, Saudi Arabia

Christoph Thuemmler School of Computing, Edinburgh Napier University, Edinburgh, United Kingdom http://ieeexplore.ieee.org/document/7749518/

Page 2 of 3

U-prove based security framework for mobile device authentication in eHealth networks - IEEE Conference Publication

10/22/17, 9)13 AM

Kingdom

Related Articles A bandwidth-reservation mechanism for on-demand ad hoc path finding I. Gerasimov; R. Simon

Technology challenges for building Internet-scale ubiquitous computing T. Nakajima; H. Ishikawa; E. Tokunaga; F. Stajano

Reconfiguration of resources in middleware H.A. Duran-Limon; G.S. Blair

Configurable services for mobile users A. Rasche; A. Polze

Scalable group membership service for mobile Internet Bumho Kim; Dongman Lee; Dukyun Nam

Distributed object-oriented real-time simulation of the multicast protocol RFRM Y.S. Hong

A route discovery optimization scheme using GPS system A. Boukerche; V. Sheetal; M. Choe

Programming middle boxes with group event notification protocol M. Smirnov

Schedulability analysis of an event-based real-time protocol framework J. Rodrigues; J. Ventura; L. Rodrigues

Performance evaluation and analysis of protocols for IP mobility support: a quantitative study P. Sun; S.Y. Sung; Z. Li; S. Huang

IEEE Account

Purchase Details

Profile Information

Need Help?

» Change Username/Password

» Payment Options

» Communications Preferences

» US & Canada: +1 800 678 4333

» Update Address

» Order History

» Profession and Education

» Worldwide: +1 732 981 0060

» View Purchased Documents

» Technical Interests

» Contact & Support

About IEEE Xplore | Contact Us | Help | Terms of Use | Nondiscrimination Policy | Sitemap | Privacy & Opting Out of Cookies A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2017 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

http://ieeexplore.ieee.org/document/7749518/

Page 3 of 3

Suggest Documents