Secure and Privacy-Preserving Referral Framework for E-Health System

Secure and Privacy-Preserving Referral Framework for E-Health System

Doctors have a crucial role in promoting the physical wellbeing of patients and ensuring that they are given the safest and effective treatments that meet their medical needs and preferences. To achieve this, doctors need adequate health information of the patients and a broad medical knowledge about their health conditions. However, due to an extensive area of the field of medicine, doctors do not have complete knowledge about a patient diagnosis and the special tools required, hence referral is indispensable. Referral requires the transfer of patient and her relevant medical information to a specialist in order for the specialist to develop a tailored treatment or suggestion for a better healthcare. Therefore, it is imperative to search for a specialist in that area of specialization who will not only have access to the patients relevant health information but able to proffer solutions to her health challenges. There is need for an effective referral system that is capable of selecting a specialist and preserving both the specialist’s and general practitioner’s privacy. In this paper, we proposed a referral framework with efficient schemes for achieving anonymous authentication during the referral process and a trust model for efficient rating and selection of specialist. To preserve privacy of the physicians, we leverage pseudonyms for anonymous authentication of physicians. A time-bound group signature was proposed by modifying an existing group signatures for a robust grouping of physicians based on their specialisations and a trust model for determining the competency of specialist.

___

  • [1] L. Guo, C. Zhang, J. Sun and Y. Fang, “PAAS: A privacy-preserving attribute-based authentication system for eHealth networks” 32nd IEEE international conference on distributed computing systems, pp. 224-232, 2012.
  • [2] Y. Lee, S. Han, B. Chung, and D. Gyu Lee, “Anonymous authentication system using group signature”, IEEE proceedings of international conference on complex, intelligent, and software, pp. 1235-1239, 2009.
  • [3] L. Malina, J Hajny, and Z. Martinasek. “Efficient group signatures with verifier-local revocation employing a natural expiration”, In proceedings of the 10th international conference on security and cryptography (SECRYPT-2013), pp.555-560, 2013.
  • [4] S. Mohanty, B. Majhi, and V. Iyern, “A strong designated verifiable group signature”, IEEE Journal, pp. 518-523.
  • [5] Z. Xia, L. Zhang and D. Liu, “Attribute-based access control scheme with efficient revocation in cloud computing”, Journal in cloud computing and data mining, China Communications, pp. 92-99, 2016.
  • [6] M. Chase, and S. Chow, “Improving privacy and security in multi-authority attribute-based encryption”, ACM , pp. 121-129, 2009.
  • [7] L. Yeh, P. Chiang, Y. Tsai and J. Huang, “Cloud-based fine-grained health information access control framework for lightwieght IoT devices with dynamic auditing and attribute revocation”, IEEE transactions on cloud computing, 2015.
  • [8] D. Ramesh and R. Priya, “Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage”, IEEE, 2016.
  • [9] A. Shabut, K. Dahal and I. Awan, “Enhancing dynamic recommender selection using multiple rules for trust and reputation models in MANETs”, IEEE 25th international conference on tools with artificial intelligence, pp. 654- 660, 2013.
  • [10] F. Femilshini, V. Ganeshkarthikeyan and S. Janani, “Privacy preserving revocation update protocol for group signature in cloud”, IEEE international conference on Enigineering and Technology (ICETECH)‘", 2015.
  • [11] D. Yao and R. tamassia, “Anonymous role-based delegation with group signaures”.
  • [12] C. Fan, J. Hsu, C. Wu, Y. Tseng, and W. Chen, “Anonymous credential scheme supporting active revocation”, Ninth asia joint conference on information security, pp. 127-132, 2014.
  • [13] J. Li, X. Tan, X. Chen, D.S. Wong, and F. Xhafa, “OPoR: Enabling proof of retrievability in cloud computing with resource-constrained devices”, IEEE transaction on cloud computing, vol. 3 no. 2, pp. 195-205, 2015.
  • [14] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing”, Advances in cryptology-CRYPTO 2001, pp. 213-229, 2001.
  • [15] D. Boneh and H. Shacham, “Group Signatures with Verifier-Local Verification”.
  • [16] W. Almanscori, A. Murshid, K. Xylogiannopoulos, R. Alhajj, and J. Rokne, “Electronic medical referral system:Decision support and recommendation approach”.
  • [17] W. Dunning, A.Lewis, S.Malhotra, T.Nicholson, A. Wiygal, B. Tawney, and R. Bennet, “Design and development of a medical specialist referral system for the indigent population of Richmond”. In the proceedings of the 2005 systems and information engineering design symposium, Ellen .J. Bass, ed, pp. 205-214, 2005.
  • [18] I. Reinhart, K. Dawoud, O. Shafiq, R. Alhajj, J. Rokne, S. Edworthy, “Electronic medical referral system: A forum-based approach”. In IEEE 13th international conference on e-health networking, applications, and services, pp. 185-188, 2011.
  • [19] ???????. ???????????. ???/????????/. Accessed 24th July, 2016.
  • [20]???. ????. ???. ??ℎ. ???/???/?????????/ ???3243286/. Latest Access Time for the Website is 1st October, 2016.
  • [21]???. ????. ???. ??/??/? − ????????/ ?????????/????????. Latest Access Time for the Website is 26th July, 2016.
  • [22] M. Li, S. Yu, K. Ren, and W. Lou. “Securing Personal health records in cloud computing: Patient-centric and finegrained data access control in multi-owner settings”, Institute for computer sciences, social informatics and telecommunications engineering, pp. 89-106, 2010.
  • [23] D. Boneh and X. Boyen. “Short signatures without random oracles”. In proceedings of advances in cryprtology - CRYPTO ’04, vol. 3027 of LNCS, pp. 56-73, 2004.
  • [24] D. Boneh, X. Boyen, and H. Shacham. “Short group signatures”. In the proceedings of advances in cryptology - CRYPTO ’04, Vol. 3152 of LNCS. pp. 41-55, 2004.
  • [25] D. Boneh and H. Shacham. “Group signatures with verifier-local revocation”. In proceedings of ACM conference on computer and communications security (CCS ’04), pp. 168-177, 2004.
  • [26] T. Nakanishi and N. Funabiki. “Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps”. In proceedings of advances on cryptology - ASIACRYPT ’05, vol. 3788 of LNCS, pp. 533-548, 2005.
  • [27] H-Y. Lin and W-G. Tzeng. “An efficient solution to the millionaires’ problem based on homomorphic encryption”. In proceedings of applied cryptography and network security (ACNS ’05), vol. 3531 of LNCS, pp. 456- 466, 2005.
  • [28] R. Lu, X. Lin, and X. Shen. “SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-Healthcare emergency”, IEEE transactions on parallel and distributed systems, vol. 24 No. 3, pp. 614- 624, 2013.
  • [29] G. Yan, Y. Wang, M.C. Weigle, S. Olariu, and K. Ibrahim. “WEHealth: A secure and privacy preserving eHealth using NOTICE”.
International Journal of Information Security Science-Cover
  • Yayın Aralığı: Yılda 4 Sayı
  • Başlangıç: 2012
  • Yayıncı: Şeref SAĞIROĞLU