Secure and Privacy-Preserving Referral Framework for E-Health System
Secure and Privacy-Preserving Referral Framework for E-Health System
Doctors have a crucial role in promoting the physical wellbeing of patients and ensuring that they are given the safest and effective treatments that meet their medical needs and preferences. To achieve this, doctors need adequate health information of the patients and a broad medical knowledge about their health conditions. However, due to an extensive area of the field of medicine, doctors do not have complete knowledge about a patient diagnosis and the special tools required, hence referral is indispensable. Referral requires the transfer of patient and her relevant medical information to a specialist in order for the specialist to develop a tailored treatment or suggestion for a better healthcare. Therefore, it is imperative to search for a specialist in that area of specialization who will not only have access to the patients relevant health information but able to proffer solutions to her health challenges. There is need for an effective referral system that is capable of selecting a specialist and preserving both the specialist’s and general practitioner’s privacy. In this paper, we proposed a referral framework with efficient schemes for achieving anonymous authentication during the referral process and a trust model for efficient rating and selection of specialist. To preserve privacy of the physicians, we leverage pseudonyms for anonymous authentication of physicians. A time-bound group signature was proposed by modifying an existing group signatures for a robust grouping of physicians based on their specialisations and a trust model for determining the competency of specialist.
___
- [1] L. Guo, C. Zhang, J. Sun and Y. Fang, “PAAS: A
privacy-preserving attribute-based authentication system
for eHealth networks” 32nd IEEE international conference
on distributed computing systems, pp. 224-232, 2012.
- [2] Y. Lee, S. Han, B. Chung, and D. Gyu Lee,
“Anonymous authentication system using group
signature”, IEEE proceedings of international conference
on complex, intelligent, and software, pp. 1235-1239,
2009.
- [3] L. Malina, J Hajny, and Z. Martinasek. “Efficient group
signatures with verifier-local revocation employing a
natural expiration”, In proceedings of the 10th
international conference on security and cryptography
(SECRYPT-2013), pp.555-560, 2013.
- [4] S. Mohanty, B. Majhi, and V. Iyern, “A strong
designated verifiable group signature”, IEEE Journal, pp.
518-523.
- [5] Z. Xia, L. Zhang and D. Liu, “Attribute-based access
control scheme with efficient revocation in cloud
computing”, Journal in cloud computing and data mining,
China Communications, pp. 92-99, 2016.
- [6] M. Chase, and S. Chow, “Improving privacy and
security in multi-authority attribute-based encryption”,
ACM , pp. 121-129, 2009.
- [7] L. Yeh, P. Chiang, Y. Tsai and J. Huang, “Cloud-based
fine-grained health information access control framework
for lightwieght IoT devices with dynamic auditing and
attribute revocation”, IEEE transactions on cloud
computing, 2015.
- [8] D. Ramesh and R. Priya, “Multi-authority scheme
based CP-ABE with attribute revocation for cloud data
storage”, IEEE, 2016.
- [9] A. Shabut, K. Dahal and I. Awan, “Enhancing dynamic
recommender selection using multiple rules for trust and
reputation models in MANETs”, IEEE 25th international
conference on tools with artificial intelligence, pp. 654-
660, 2013.
- [10] F. Femilshini, V. Ganeshkarthikeyan and S. Janani,
“Privacy preserving revocation update protocol for group
signature in cloud”, IEEE international conference on
Enigineering and Technology (ICETECH)‘", 2015.
- [11] D. Yao and R. tamassia, “Anonymous role-based
delegation with group signaures”.
- [12] C. Fan, J. Hsu, C. Wu, Y. Tseng, and W. Chen,
“Anonymous credential scheme supporting active
revocation”, Ninth asia joint conference on information
security, pp. 127-132, 2014.
- [13] J. Li, X. Tan, X. Chen, D.S. Wong, and F. Xhafa,
“OPoR: Enabling proof of retrievability in cloud
computing with resource-constrained devices”, IEEE
transaction on cloud computing, vol. 3 no. 2, pp. 195-205,
2015.
- [14] D. Boneh and M. Franklin, “Identity-based encryption
from the weil pairing”, Advances in cryptology-CRYPTO
2001, pp. 213-229, 2001.
- [15] D. Boneh and H. Shacham, “Group Signatures with
Verifier-Local Verification”.
- [16] W. Almanscori, A. Murshid, K. Xylogiannopoulos, R.
Alhajj, and J. Rokne, “Electronic medical referral
system:Decision support and recommendation approach”.
- [17] W. Dunning, A.Lewis, S.Malhotra, T.Nicholson, A.
Wiygal, B. Tawney, and R. Bennet, “Design and
development of a medical specialist referral system for the
indigent population of Richmond”. In the proceedings of
the 2005 systems and information engineering design
symposium, Ellen .J. Bass, ed, pp. 205-214, 2005.
- [18] I. Reinhart, K. Dawoud, O. Shafiq, R. Alhajj, J.
Rokne, S. Edworthy, “Electronic medical referral system:
A forum-based approach”. In IEEE 13th international
conference on e-health networking, applications, and
services, pp. 185-188, 2011.
- [19] ???????. ???????????. ???/????????/. Accessed
24th July, 2016.
- [20]???. ????. ???. ??ℎ. ???/???/?????????/
???3243286/. Latest Access Time for the Website is 1st
October, 2016.
- [21]???. ????. ???. ??/??/? − ????????/
?????????/????????. Latest Access Time for the
Website is 26th July, 2016.
- [22] M. Li, S. Yu, K. Ren, and W. Lou. “Securing Personal
health records in cloud computing: Patient-centric and finegrained data access control in multi-owner settings”,
Institute for computer sciences, social informatics and
telecommunications engineering, pp. 89-106, 2010.
- [23] D. Boneh and X. Boyen. “Short signatures without
random oracles”. In proceedings of advances in
cryprtology - CRYPTO ’04, vol. 3027 of LNCS, pp. 56-73,
2004.
- [24] D. Boneh, X. Boyen, and H. Shacham. “Short group
signatures”. In the proceedings of advances in cryptology -
CRYPTO ’04, Vol. 3152 of LNCS. pp. 41-55, 2004.
- [25] D. Boneh and H. Shacham. “Group signatures with
verifier-local revocation”. In proceedings of ACM
conference on computer and communications security
(CCS ’04), pp. 168-177, 2004.
- [26] T. Nakanishi and N. Funabiki. “Verifier-local
revocation group signature schemes with backward
unlinkability from bilinear maps”. In proceedings of
advances on cryptology - ASIACRYPT ’05, vol. 3788 of
LNCS, pp. 533-548, 2005.
- [27] H-Y. Lin and W-G. Tzeng. “An efficient solution to
the millionaires’ problem based on homomorphic
encryption”. In proceedings of applied cryptography and
network security (ACNS ’05), vol. 3531 of LNCS, pp. 456-
466, 2005.
- [28] R. Lu, X. Lin, and X. Shen. “SPOC: A secure and
privacy-preserving opportunistic computing framework for
mobile-Healthcare emergency”, IEEE transactions on
parallel and distributed systems, vol. 24 No. 3, pp. 614-
624, 2013.
- [29] G. Yan, Y. Wang, M.C. Weigle, S. Olariu, and K.
Ibrahim. “WEHealth: A secure and privacy preserving
eHealth using NOTICE”.