BibTex RIS Cite

Secure and Privacy-Preserving Referral Framework for E-Health System

Year 2017, Volume: 6 Issue: 2, 11 - 25, 01.06.2017

Abstract

Doctors have a crucial role in promoting the physical wellbeing of patients and ensuring that they are given the safest and effective treatments that meet their medical needs and preferences. To achieve this, doctors need adequate health information of the patients and a broad medical knowledge about their health conditions. However, due to an extensive area of the field of medicine, doctors do not have complete knowledge about a patient diagnosis and the special tools required, hence referral is indispensable. Referral requires the transfer of patient and her relevant medical information to a specialist in order for the specialist to develop a tailored treatment or suggestion for a better healthcare. Therefore, it is imperative to search for a specialist in that area of specialization who will not only have access to the patients relevant health information but able to proffer solutions to her health challenges. There is need for an effective referral system that is capable of selecting a specialist and preserving both the specialist’s and general practitioner’s privacy. In this paper, we proposed a referral framework with efficient schemes for achieving anonymous authentication during the referral process and a trust model for efficient rating and selection of specialist. To preserve privacy of the physicians, we leverage pseudonyms for anonymous authentication of physicians. A time-bound group signature was proposed by modifying an existing group signatures for a robust grouping of physicians based on their specialisations and a trust model for determining the competency of specialist.

References

  • [1] L. Guo, C. Zhang, J. Sun and Y. Fang, “PAAS: A privacy-preserving attribute-based authentication system for eHealth networks” 32nd IEEE international conference on distributed computing systems, pp. 224-232, 2012.
  • [2] Y. Lee, S. Han, B. Chung, and D. Gyu Lee, “Anonymous authentication system using group signature”, IEEE proceedings of international conference on complex, intelligent, and software, pp. 1235-1239, 2009.
  • [3] L. Malina, J Hajny, and Z. Martinasek. “Efficient group signatures with verifier-local revocation employing a natural expiration”, In proceedings of the 10th international conference on security and cryptography (SECRYPT-2013), pp.555-560, 2013.
  • [4] S. Mohanty, B. Majhi, and V. Iyern, “A strong designated verifiable group signature”, IEEE Journal, pp. 518-523.
  • [5] Z. Xia, L. Zhang and D. Liu, “Attribute-based access control scheme with efficient revocation in cloud computing”, Journal in cloud computing and data mining, China Communications, pp. 92-99, 2016.
  • [6] M. Chase, and S. Chow, “Improving privacy and security in multi-authority attribute-based encryption”, ACM , pp. 121-129, 2009.
  • [7] L. Yeh, P. Chiang, Y. Tsai and J. Huang, “Cloud-based fine-grained health information access control framework for lightwieght IoT devices with dynamic auditing and attribute revocation”, IEEE transactions on cloud computing, 2015.
  • [8] D. Ramesh and R. Priya, “Multi-authority scheme based CP-ABE with attribute revocation for cloud data storage”, IEEE, 2016.
  • [9] A. Shabut, K. Dahal and I. Awan, “Enhancing dynamic recommender selection using multiple rules for trust and reputation models in MANETs”, IEEE 25th international conference on tools with artificial intelligence, pp. 654- 660, 2013.
  • [10] F. Femilshini, V. Ganeshkarthikeyan and S. Janani, “Privacy preserving revocation update protocol for group signature in cloud”, IEEE international conference on Enigineering and Technology (ICETECH)‘", 2015.
  • [11] D. Yao and R. tamassia, “Anonymous role-based delegation with group signaures”.
  • [12] C. Fan, J. Hsu, C. Wu, Y. Tseng, and W. Chen, “Anonymous credential scheme supporting active revocation”, Ninth asia joint conference on information security, pp. 127-132, 2014.
  • [13] J. Li, X. Tan, X. Chen, D.S. Wong, and F. Xhafa, “OPoR: Enabling proof of retrievability in cloud computing with resource-constrained devices”, IEEE transaction on cloud computing, vol. 3 no. 2, pp. 195-205, 2015.
  • [14] D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing”, Advances in cryptology-CRYPTO 2001, pp. 213-229, 2001.
  • [15] D. Boneh and H. Shacham, “Group Signatures with Verifier-Local Verification”.
  • [16] W. Almanscori, A. Murshid, K. Xylogiannopoulos, R. Alhajj, and J. Rokne, “Electronic medical referral system:Decision support and recommendation approach”.
  • [17] W. Dunning, A.Lewis, S.Malhotra, T.Nicholson, A. Wiygal, B. Tawney, and R. Bennet, “Design and development of a medical specialist referral system for the indigent population of Richmond”. In the proceedings of the 2005 systems and information engineering design symposium, Ellen .J. Bass, ed, pp. 205-214, 2005.
  • [18] I. Reinhart, K. Dawoud, O. Shafiq, R. Alhajj, J. Rokne, S. Edworthy, “Electronic medical referral system: A forum-based approach”. In IEEE 13th international conference on e-health networking, applications, and services, pp. 185-188, 2011.
  • [19] 𝐶𝑜𝑛𝑛𝑒𝑐𝑡. 𝑞𝑢𝑎𝑙𝑖𝑡𝑦𝑐𝑎𝑟𝑒. 𝑜𝑟𝑔/𝑜𝑛𝑐𝑜𝑙𝑜𝑔𝑦/. Accessed 24th July, 2016.
  • [20]𝑤𝑤𝑤. 𝑛𝑐𝑏𝑖. 𝑛𝑙𝑚. 𝑛𝑖ℎ. 𝑔𝑜𝑣/𝑝𝑚𝑐/𝑎𝑟𝑡𝑖𝑐𝑢𝑙𝑒𝑠/ 𝑃𝑀𝐶3243286/. Latest Access Time for the Website is 1st October, 2016.
  • [21]𝑤𝑤𝑤. 𝑘𝑓𝑚𝑐. 𝑚𝑒𝑑. 𝑠𝑎/𝐸𝑁/𝐸 − 𝑅𝑒𝑓𝑒𝑟𝑟𝑎𝑙/ 𝐷𝑜𝑐𝑢𝑚𝑒𝑛𝑡𝑠/𝑅𝑒𝑓𝑒𝑟𝑟𝑎𝑙. Latest Access Time for the Website is 26th July, 2016.
  • [22] M. Li, S. Yu, K. Ren, and W. Lou. “Securing Personal health records in cloud computing: Patient-centric and finegrained data access control in multi-owner settings”, Institute for computer sciences, social informatics and telecommunications engineering, pp. 89-106, 2010.
  • [23] D. Boneh and X. Boyen. “Short signatures without random oracles”. In proceedings of advances in cryprtology - CRYPTO ’04, vol. 3027 of LNCS, pp. 56-73, 2004.
  • [24] D. Boneh, X. Boyen, and H. Shacham. “Short group signatures”. In the proceedings of advances in cryptology - CRYPTO ’04, Vol. 3152 of LNCS. pp. 41-55, 2004.
  • [25] D. Boneh and H. Shacham. “Group signatures with verifier-local revocation”. In proceedings of ACM conference on computer and communications security (CCS ’04), pp. 168-177, 2004.
  • [26] T. Nakanishi and N. Funabiki. “Verifier-local revocation group signature schemes with backward unlinkability from bilinear maps”. In proceedings of advances on cryptology - ASIACRYPT ’05, vol. 3788 of LNCS, pp. 533-548, 2005.
  • [27] H-Y. Lin and W-G. Tzeng. “An efficient solution to the millionaires’ problem based on homomorphic encryption”. In proceedings of applied cryptography and network security (ACNS ’05), vol. 3531 of LNCS, pp. 456- 466, 2005.
  • [28] R. Lu, X. Lin, and X. Shen. “SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-Healthcare emergency”, IEEE transactions on parallel and distributed systems, vol. 24 No. 3, pp. 614- 624, 2013.
  • [29] G. Yan, Y. Wang, M.C. Weigle, S. Olariu, and K. Ibrahim. “WEHealth: A secure and privacy preserving eHealth using NOTICE”.
There are 29 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Oladayo Olakanmi This is me

Ismail Kamil This is me

Sunday Ogundoyin This is me

Publication Date June 1, 2017
Published in Issue Year 2017 Volume: 6 Issue: 2

Cite

IEEE O. Olakanmi, I. Kamil, and S. Ogundoyin, “Secure and Privacy-Preserving Referral Framework for E-Health System”, IJISS, vol. 6, no. 2, pp. 11–25, 2017.