Skip to main content

Patients’ Data Management System Through Identity Based Encryption

  • Conference paper
  • First Online:
Ubiquitous Computing and Ambient Intelligence (IWAAL 2016, AmIHEALTH 2016, UCAmI 2016)

Abstract

In this paper a secure distributed system is proposed to manage patients’ information in an emergency service in order to improve efficiency. Authentication, confidentiality and automatic and robust patient identification are provided. The system elements are NFC wristbands, assigned to patients, mobile devices assigned to medical staff and a server to manage the information and verify that its use is legitimate. Patient’s identification is carried out through a keyed-Hash Message Authentication Code. In addition, a challenge-response protocol is proposed for mutual authentication of medical staff and the server using the FullIdent scheme Identity Based Encryption. The same scheme gives confidentiality to the system. The definition of this system provides a secure solution based on mHealth for managing patients in an emergency service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. TechTarget, mhealth security: best practices and industry trends, TechTarget, Technical report (2015)

    Google Scholar 

  2. Organization, W.H.: Patient safety solutions. http://goo.gl/EuAX51

  3. Pablo-Comeche, D., Buitrago-Vera, C., Meneu, R.: Identificación inequívoca de pacientes. evaluación del lanzamiento y su implantación en los hospitales de la agencia valenciana de salud, Medicina Clínica, vol. 135, no. Julio 2010, pp. 1–6, 2010. http://dx.doi.org/10.1007/s10916-015-0362-8

  4. Want, R.: Near field communication. IEEE Pervasive Comput. 3, 4–7 (2011)

    Article  Google Scholar 

  5. Finkenzeller, K., Handbook, R.: Radio-Frequency Identification Fundamentals and Applications. John Wiley & Son, Chippenham (1999)

    Google Scholar 

  6. Lee, J.-S., Su, Y.-W., Shen, C.-C.: A comparative study of wireless protocols: bluetooth,UWB, ZigBee, and Wi-Fi. In: 33rd Annual Conference of the IEEE on Industrial Electronics Society, IECON 2007. IEEE, pp. 46–51 (2007)

    Google Scholar 

  7. Jin, C., Xu, C., Zhang, X., Li, F.: A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety. J. Med. Syst. 40(1), 1–6 (2015). http://dx.doi.org/10.1007/s10916-015-0362-8

    Google Scholar 

  8. H. id: Health system platform (2012). https://www.healthid.com/

  9. Lee, C.-I., Chien, H.-Y.: An elliptic curve cryptography-based rfid authentication securing e-health system. Int. J. Distrib. Sens. Netw. 11, 1–7 (2015). http://dx.doi.org/10.1155/2015/642425

    Google Scholar 

  10. He, D., Kumar, N., Chilamkurti, N., Lee, J.-H.: Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol. J. Med. Syst. 38(10), 1–6 (2014). http://dx.doi.org/10.1007/s10916-014-0116-z

    Article  Google Scholar 

  11. Kstinger, H., Gobber, M., Grechenig, T., Tappeiner, B., Schramm, W.: Developing a NFC based patient identification and ward round system for mobile devices using the android platform. In: 2013 IEEE Point-of-Care Healthcare Technologies (PHT), pp. 176–179, January 2013

    Google Scholar 

  12. P. data sheet NTAG213, 215, 216, Nfc forum type 2 tag compliant ic with 144, 504, 888 bytes user memory (2015). http://www.who.int/patientsafety/solutions/patientsafety/PS-Solution2.pdf

  13. NFCFORUM, Official web page (2016). http://nfc-forum.org/

  14. Bellare, M., Canetti, R., Krawczyk, H.: Message authentication using hash functions: the HMAC construction. RSA Lab. Cryptobytes 2(1), 12–15 (1996)

    MATH  Google Scholar 

  15. Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). doi:10.1007/3-540-44647-8_13

    Chapter  Google Scholar 

  16. Santos-González, I., Rivero-García, A., Caballero-Gil, P., Hernández-Goya, C.: Alternative communication system for emergency situations. In: WEBIST, vol. 2, pp. 397–402 (2014)

    Google Scholar 

  17. Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). doi:10.1007/3-540-39799-X_31

    Google Scholar 

  18. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Book  MATH  Google Scholar 

Download references

Acknowledgements

Research supported by TESIS2015010102, TESIS2015010106, RTC-2014-1648-8, TEC2014-54110-R, MTM-2015-69138-REDT and DIG02-INSITU.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandra Rivero-García .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Rivero-García, A., Hernández-Goya, C., Santos-González, I., Caballero-Gil, P. (2016). Patients’ Data Management System Through Identity Based Encryption. In: García, C., Caballero-Gil, P., Burmester, M., Quesada-Arencibia, A. (eds) Ubiquitous Computing and Ambient Intelligence. IWAAL AmIHEALTH UCAmI 2016 2016 2016. Lecture Notes in Computer Science(), vol 10070. Springer, Cham. https://doi.org/10.1007/978-3-319-48799-1_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-48799-1_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-48798-4

  • Online ISBN: 978-3-319-48799-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics