An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System

被引:0
|
作者
Shuhua Wu
Kefei Chen
机构
[1] Shanghai Jiao Tong University,Department of Computer Science and Engineering
[2] Shanghai Key Laboratory of Scalable Computing and Systems,Department of Networks Engineering
[3] Information Engineering University,undefined
来源
Journal of Medical Systems | 2012年 / 36卷
关键词
Key management; Hybrid cryptosystems; Access control; User hierarchy; E-medicine;
D O I
暂无
中图分类号
学科分类号
摘要
In e-medicine system, the sharing of patients’ medical histories scattered among medical institutions through the Internet is highly desirable. The most immediate cryptographic need certainly is an efficient key management method to solve dynamic access problems in a user hierarchy. In this paper, we propose a practical solution for dynamic access problem in a user hierarchy based on hybrid cryptosystems. When compared with Nikooghadam et al.’s scheme proposed most recently, the time complexity and the required storage space is reduced significantly. Moreover, it provides provable security, and is easy to implement. Therefore, our scheme is more suitable for e-medicine system.
引用
收藏
页码:2325 / 2337
页数:12
相关论文
共 50 条
  • [41] KTR: An Efficient Key Management Scheme for Secure Data Access Control in Wireless Broadcast Services
    Gu, Qijun
    Liu, Peng
    Lee, Wang-Chien
    Chu, Chao-Hsien
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (03) : 188 - 201
  • [42] A hierarchical key distribution scheme for conditional access system in DTV broadcasting
    Zhu, Mengyao
    Zhang, Ming
    Chen, Xiaoling
    Zhang, Ding
    Huang, Zhijie
    COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 839 - 846
  • [43] Efficient hierarchical key management scheme for VR/AR database systems
    Hsiao, Tsung-Chih
    Huang, Yu-Min
    Chung, Yu-Fang
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    International Journal of Network Security, 2019, 21 (04) : 551 - 555
  • [44] On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme
    Sun, Hung-Min
    Wang, King-Hang
    Chen, Chien-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (02) : 159 - 160
  • [45] An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors
    Wang, Jing
    Lin, Xiaola
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 681 - 684
  • [46] Efficient key management for cryptographically enforced access control
    Zych, Anna
    Petkovic, Milan
    Jonker, Willem
    COMPUTER STANDARDS & INTERFACES, 2008, 30 (06) : 410 - 417
  • [47] A multi-agent approach to the design of an E-medicine system
    Tian, J
    Tianfield, H
    MULTIAGENT SYSTEM TECHNOLOGIES, PROCEEDINGS, 2003, 2831 : 85 - 94
  • [48] A novel key management and access control scheme for mobile agent
    Pan, Jen-Yi
    Chen, Tzer-Long
    Chen, Tzer-Shyong
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 334 - 345
  • [49] A practical key management scheme for access control in a user hierarchy
    Zhong, S
    COMPUTERS & SECURITY, 2002, 21 (08) : 750 - 759
  • [50] Reactive key management scheme for access control in group communications
    Kim, Heeyoul
    Lee, Younho
    Park, Yongsu
    Yoon, Hyunsoo
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2007, E90B (04) : 982 - 986