• This record comes from PubMed

A Study on Secure Medical-Contents Strategies with DRM Based on Cloud Computing

. 2018 ; 2018 () : 6410180. [epub] 20180329

Language English Country Great Britain, England Media electronic-ecollection

Document type Journal Article, Research Support, Non-U.S. Gov't

Many hospitals and medical clinics have been using a wearable sensor in its health care system because the wearable sensor, which is able to measure the patients' biometric information, has been developed to analyze their patients remotely. The measured information is saved to a server in a medical center, and the server keeps the medical information, which also involves personal information, on a cloud system. The server and network devices are used by connecting each other, and sensitive medical records are dealt with remotely. However, these days, the attackers, who try to attack the server or the network systems, are increasing. In addition, the server and the network system have a weak protection and security policy against the attackers. In this paper, it is suggested that security compliance of medical contents should be followed to improve the level of security. As a result, the medical contents are kept safely.

See more in PubMed

Gafurov D., Snekkenes E. Gait recognition using wearable motion recording sensors. EURASIP Journal on Advances in Signal Processing. 2009;2009 doi: 10.1155/2009/415817. DOI

Lu R., Lin X., Shen X. Spoc: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Transactions on Parallel and Distributed Systems. 2013;24(3):614–624. doi: 10.1109/TPDS.2012.146. DOI

Islam S. K. H. Design and analysis of an improved smartcard-based remote user password authentication scheme. International Journal of Communication Systems. 2016;29(11):1708–1719. doi: 10.1002/dac.2793. DOI

Cho D., Hwang S., Jeong G., Lim H. A digital media service system supporting multi-drm in the cloud. Journal of Korea Multimedia Society. 2016;19(4):765–773. doi: 10.9717/kmms.2016.19.4.765. DOI

Chaudhry S. A., Mahmood K., Naqvi H., Khan M. K. An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography. Journal of Medical Systems. 2015;39(11):p. 175. doi: 10.1007/s10916-015-0335-y. PubMed DOI

Zhu Z. An efficient authentication scheme for telecare medicine information systems. Journal of Medical Systems. 2012;36(6):3833–3838. doi: 10.1007/s10916-012-9856-9. PubMed DOI

Ko H., Song M. B. A study on the secure user profiling structure and procedure for home healthcare systems. Journal of Medical Systems. 2016;40(1):p. 1. doi: 10.1007/s10916-015-0365-5. PubMed DOI

Sun J., Reddy C. K. Big data analytics for healthcare. Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '13; 2013; Chicago, Illinois, USA. pp. 1525–1525. DOI

Jain M. B., Srinivas M., Jain A. A novel web based expert system architecture for on-line and off-line fault diagnosis and control (FDC) of transformers. TENCON 2008 - 2008 IEEE Region 10 Conference; 2008; Hyderabad, India. pp. 1–5. DOI

Khan M. K., Zhang J. Information Security Practice and Experience. Berlin, Heidelberg: Springer; 2006. An efficient and practical fingerprint-based remote user authentication scheme with smart cards; pp. 260–268. DOI

Amin R., Islam S. K. H., Biswas G. P., Khan M. K., Kumar N. An efficient and practical smart card based anonymity preserving user authentication scheme for tmis using elliptic curve cryptography. Journal of Medical Systems. 2015;39(11):p. 180. doi: 10.1007/s10916-015-0351-y. PubMed DOI

Yalla P., Kaps J.-P. Compact FPGA implementation of camellia. 2009 International Conference on Field Programmable Logic and Applications; 2009; Prague, Czech Republic. pp. 658–661. DOI

Kaps J.-P. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2008. Chai-tea, cryptographic hardware implementations of xTEA; pp. 363–375. DOI

Kaps J.-P., Sunar B. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2006. Energy comparison of aes and sha-1 for ubiquitous computing; pp. 372–381. DOI

Manifavas C., Hatzivasilis G., Fysarakis K., Rantos K. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer; 2014. Lightweight cryptography for embedded systems – a comparative analysis; pp. 333–349. DOI

Blankenbeckler D. L., Ybarra D. O., Hesselink L. Digital rights management system and methods for provisioning content to an intelligent storage. US Patent 9342701, 2016.

Chen H.-M., Lo J.-W., Yeh C.-K. An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems. 2012;36(6):3907–3915. doi: 10.1007/s10916-012-9862-y. PubMed DOI

Ko H., Mesicek L., Choi J., Choi J., Hwang S. A study on secure contents strategies for applications with drm on cloud computing. International Journal of Cloud Applications and Computing. 2018;8(1):143–153. doi: 10.4018/IJCAC.2018010107. DOI

Ramos C., Martinho D., Marreiros G., et al. Ekrucami architecture–applications in healthcare domain. Frontiers in Artificial Intelligence and Applications. 2017;298:140–152.

Find record

Citation metrics

Loading data ...

Archiving options

Loading data ...