CFP last date
20 December 2024
Reseach Article

Article:New Secure Communication Protocols For Mobile E-health System

by M.Aramudhan, K.Mohan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 4
Year of Publication: 2010
Authors: M.Aramudhan, K.Mohan
10.5120/1201-1713

M.Aramudhan, K.Mohan . Article:New Secure Communication Protocols For Mobile E-health System. International Journal of Computer Applications. 8, 4 ( October 2010), 10-15. DOI=10.5120/1201-1713

@article{ 10.5120/1201-1713,
author = { M.Aramudhan, K.Mohan },
title = { Article:New Secure Communication Protocols For Mobile E-health System },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 8 },
number = { 4 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume8/number4/1201-1713/ },
doi = { 10.5120/1201-1713 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:36.452351+05:30
%A M.Aramudhan
%A K.Mohan
%T Article:New Secure Communication Protocols For Mobile E-health System
%J International Journal of Computer Applications
%@ 0975-8887
%V 8
%N 4
%P 10-15
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

E-health system has been used as communication system that enables to deliver medical service over the Internet. The medical information’s accessible in e-health systems are highly sensitive and distributed that demands strong authentication and authorization mechanisms for communication between the healthcare professionals, consumers and providers. Internet is an open system that provides global access without much constraint. Hence, e-health users demand safe communication and user privacy over the Internet. This paper introduces three secure communication protocols based on message passing and Mobile agent for online e-health system. Certificate based Authentication and Attribute based Policy assigned Authorization framework (CAAPA) for mobile users is proposed based on message passing technique. Token based Cross Verification (TCV) protocol is proposed for secure services in e-health System over Internet based on Mobile agent. Secure and Auditable Agent- based Communication Protocol (SAACP) performs on key exchange mechanism with mobile agents to reduce the delay in communication. Intelligent mobile agents are proposed for negotiating the policy of the users dynamically. All the above protocols offer user friendly, well-built secure mechanism that gives confident to the users and healthcare professional to access the e-health system. These protocols are efficient in terms of maintaining strong user privacy. CAAPA provides high communication overhead compared to other protocols.

References
  1. Alessandara Toninelli, Rebecca Montanari and Antonio Corradi,” EnablingSecure Service Discovery in Mobile Healthcare Enterprise Networks”,IEEE wireless Communications June 2009 pp.24-32.
  2. Blobel B, Advanced and Secure Architectural HER Approaches,(Int.Journal Medical Informatics, 2006), pp- 185-190.
  3. Burgsteiner H and Prietl J, A Framework for secure communication of Mobile E-health applications”, in Medical Informatics meets eHealth (2008) pp.29-30
  4. Burgsteiner Harald, Wallner Dietmar,”PeDIS-Design and Development of a Performance Diagnosis Information System”, ( Medical Informatics meets eHealth ,2008), pp. 47-51.
  5. Fahed Al-Nayadi, Jemal H.Abawajy, An authentication Framework for e-health systems”, in Proc. Int. symp. Signal Processing and Information Technology (IEEE, 2007), pp., 616-619.
  6. Fahed Al-Nayadi and J.H.Abawajy, An Authorization Policy Management Framework for Dynamic Medical Data Sharing in Proc. Int.conf. Intelligent Pervasive Computing (IEEE, 2007), pp.313-318
  7. Han, Song and Skinner, G. and Potdar, Vidysagar and Chang, Elizabeth and Wu, Chen, New Framework for Authentication and Authorization for e-Health Service Systems, in Proc.Int. Conf.Industrial Technology (2006), pp. 2833-2838.
  8. Hitchens M, Varadharajan V, Design and Specification of Role-based Access Control policies. in IEE Proc. Software (2000), pp.117-129.
  9. J.E.Holt, R.W.Bardshaw, K.E.Seamons, and H.Orman, Hidden credentials, in Proc. second ACM workshop Electronic Soc (2003), pp.1-8,2003.
  10. Li M, Poovendran R, Narayanan S, Protecting Patient Privacy against Unauthorized Release of Medical Images in a Group Communication Environment, (Int.Journal. Computerized Medical Imaging and Graphics,2005),pp. 367-383.
  11. Panagiotis Germanakos1, Constantinos Mourlas1, and George Samaras2, A Mobile Agent Approach for Ubiquitous and Personalized eHealth Information Systems, ( IEEE transactions on computers ,2006) pp.1259-1273.
  12. Rossilawati Sulaiman, Xu Huang, Dharmendra Sharma,”E-health services with Secure Agent”,in proc.7th Annual communication Networks and Services Research Conference 2009, pp. 270-277.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile agent Certificate authority Public Key infrastructure policy privacy audit safe