A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing
Language English Country Great Britain, England Media electronic-ecollection
Document type Journal Article, Research Support, Non-U.S. Gov't
PubMed
29796233
PubMed Central
PMC5896203
DOI
10.1155/2018/6410180
Knihovny.cz E-resources
- MeSH
- Algorithms MeSH
- Monitoring, Ambulatory instrumentation MeSH
- Biometry MeSH
- Medical Records MeSH
- Cloud Computing * MeSH
- Confidentiality MeSH
- Electronic Health Records MeSH
- Internet MeSH
- Medical Informatics instrumentation MeSH
- Humans MeSH
- Delivery of Health Care MeSH
- Programming Languages MeSH
- Data Collection MeSH
- Information Storage and Retrieval methods MeSH
- Computer Security * MeSH
- Check Tag
- Humans MeSH
- Publication type
- Journal Article MeSH
- Research Support, Non-U.S. Gov't MeSH
Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.
Gensoloft Inc 99 Jangseungbaegi Ro Dongjak Gu Seoul 06936 Republic of Korea
IT Research Institute Chosun University 309 Pilmun daero Dong gu Gwangju 61452 Republic of Korea
See more in PubMed
Gafurov D., Snekkenes E. Gait recognition using wearable motion recording sensors. EURASIP Journal on Advances in Signal Processing. 2009;2009 doi: 10.1155/2009/415817. DOI
Lu R., Lin X., Shen X. Spoc: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems. 2013;24(3):614–624. doi: 10.1109/TPDS.2012.146. DOI
Islam S. K. H. Design and analysis of an improved smartcard-based remote user password authentication scheme. International Journal of Communication Systems. 2016;29(11):1708–1719. doi: 10.1002/dac.2793. DOI
Cho D., Hwang S., Jeong G., Lim H. A digital media service system supporting multi-drm in the cloud. Journal of Korea Multimedia Society. 2016;19(4):765–773. doi: 10.9717/kmms.2016.19.4.765. DOI
Chaudhry S. A., Mahmood K., Naqvi H., Khan M. K. An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. Journal of Medical Systems. 2015;39(11):p. 175. doi: 10.1007/s10916-015-0335-y. PubMed DOI
Zhu Z. An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems. 2012;36(6):3833–3838. doi: 10.1007/s10916-012-9856-9. PubMed DOI
Ko H., Song M. B. A study on the secure user profiling structure and procedure for home healthcare systems. Journal of Medical Systems. 2016;40(1):p. 1. doi: 10.1007/s10916-015-0365-5. PubMed DOI
Sun J., Reddy C. K. Big data analytics for healthcare. Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '13; 2013; Chicago, Illinois, USA. pp. 1525–1525. DOI
Jain M. B., Srinivas M., Jain A. A novel web based expert system architecture for on-line and off-line fault diagnosis and control (FDC) of transformers. TENCON 2008 - 2008 IEEE Region 10 Conference; 2008; Hyderabad, India. pp. 1–5. DOI
Khan M. K., Zhang J. Information Security Practice and Experience. Berlin, Heidelberg: Springer; 2006. An efficient and practical fingerprint-based remote user authentication scheme with smart cards; pp. 260–268. DOI
Amin R., Islam S. K. H., Biswas G. P., Khan M. K., Kumar N. An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. Journal of Medical Systems. 2015;39(11):p. 180. doi: 10.1007/s10916-015-0351-y. PubMed DOI
Yalla P., Kaps J.-P. Compact FPGA implementation of camellia. 2009 International Conference on Field Programmable Logic and Applications; 2009; Prague, Czech Republic. pp. 658–661. DOI
Kaps J.-P. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2008. Chai-tea, cryptographic hardware implementations of xTEA; pp. 363–375. DOI
Kaps J.-P., Sunar B. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2006. Energy comparison of aes and sha-1 for ubiquitous computing; pp. 372–381. DOI
Manifavas C., Hatzivasilis G., Fysarakis K., Rantos K. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2014. Lightweight cryptography for embedded systems – a comparative analysis; pp. 333–349. DOI
Blankenbeckler D. L., Ybarra D. O., Hesselink L. Digital rights management system and methods for provisioning content to an intelligent storage. US Patent 9342701, 2016.
Chen H.-M., Lo J.-W., Yeh C.-K. An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems. 2012;36(6):3907–3915. doi: 10.1007/s10916-012-9862-y. PubMed DOI
Ko H., Mesicek L., Choi J., Choi J., Hwang S. A study on secure contents strategies for applications with drm on cloud computing. International Journal of Cloud Applications and Computing. 2018;8(1):143–153. doi: 10.4018/IJCAC.2018010107. DOI
Ramos C., Martinho D., Marreiros G., et al. Ekrucami architecture–applications in healthcare domain. Frontiers in Artificial Intelligence and Applications. 2017;298:140–152.