2015
DOI: 10.1002/sec.1387
|View full text |Cite
|
Sign up to set email alerts
|

Security approach to controlling access to personal health records in healthcare service

Abstract: The changing information technology and the constant progress of medical technologies have gradually changed traditional paper-based medical records into low-cost electronic health records. The broad application of electronic health records allows a medical information exchange model being developed, called personal health records (PHR), which are the personal health medical information managed and maintained by the user. In consideration of PHR being a patient's health medical information, the privacy setting… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Step 2: key is generated from both LHC and HS using the proposed algorithm as, For i= 1 to n Choose random number r j and ephemeral key K b for the request L Trust node process the request using Eqs. ( 5) and (6) Generate the secret information e b , s b and Q b Key generation using (9) and sent to trust node Combine the key with the removable template using algorithm 2 Authenticate and verification using (7) and (8) Share the key…”
Section: Algorithm:mentioning
confidence: 99%
“…Step 2: key is generated from both LHC and HS using the proposed algorithm as, For i= 1 to n Choose random number r j and ephemeral key K b for the request L Trust node process the request using Eqs. ( 5) and (6) Generate the secret information e b , s b and Q b Key generation using (9) and sent to trust node Combine the key with the removable template using algorithm 2 Authenticate and verification using (7) and (8) Share the key…”
Section: Algorithm:mentioning
confidence: 99%
“…Thus, the security and protection of PHR have been of great concern and a subject of research over the years [13]. Zhang et al [14] proposed a PHR security and privacy preservation scheme by introducing consent-based access control, where the consent can only be generated by an authorized user based on PRE.…”
Section: Related Workmentioning
confidence: 99%
“…The social data owner takes as input PK, a secret key SK, and a healthcare Security and Communication Networks 5 analyzer's identity ID and outputs a social reencryption key RK . (13) . (CT , RK ).…”
Section: (9)mentioning
confidence: 99%