Skip to main content

Novel Key Management for Secure Information of Ubiquitous Healthcare Domains to APT Attack

  • Conference paper
Computer Science and its Applications

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 330))

  • 3338 Accesses

Abstract

The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources for threats of APT attack decrease in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for preparatory secure communications to APT attack in the ubiquitous healthcare domains.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Berler, A., Pavlopoulos, S., Koutsouris, D.: Design of an interoperability framework in a regional healthcare system. In: Proceedings of Engineering in Medicine and Biology Society, vol. 2, pp. 3093–3096 (2004)

    Google Scholar 

  2. Katsikas, S.K.: Health care management and information systems security: awareness, training or education. Int. J. Med. Informatics 60, 129–135 (2000)

    Article  Google Scholar 

  3. Dell Secure Work: Advanced persistent threats-healthcare under attack (2012)

    Google Scholar 

  4. Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys 35(3), 309–329 (2003)

    Article  Google Scholar 

  5. Rindfleisch, T.: Privacy, information technology, and health care. Communications of the ACM 40(8) (1997)

    Google Scholar 

  6. Bohn, J., Gärtner, F.C., Vogt, H.: Dependability Issues of Pervasive Computing in a Healthcare Environment. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 53–70. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  8. Zhang, L., Chu, B.: A Role-Based Delegation Framework for Healthcare Information Systems. In: ACM Symposium on Access Control Models And Technologies, SACMAT (2002)

    Google Scholar 

  9. Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. ACM Sigcomm (1998)

    Google Scholar 

  10. Muhammad, S., Raazi, K., Lee, S., Lee, Y.: A Novel Architecture for Efficient Key Management in Humanware Applications. In: Fifth International Joint Conference on INC, IMS and IDC, pp. 1918–1922 (2009)

    Google Scholar 

  11. Muhammad, S., Raazi, K., Lee, S., Lee, Y.: TIMAR: an efficient key management scheme for ubiquitous health care environments. In: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, United Kingdom (2009)

    Google Scholar 

  12. Das, M., Saxena, A., Gulati, V., Phatak, D.: Hierarchical key management scheme using polynomial interpolation. SIGOPS Operational Systematic Review 39(1), 40–47 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donghyun Kim .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, D., Soh, W., Kim, S. (2015). Novel Key Management for Secure Information of Ubiquitous Healthcare Domains to APT Attack. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45402-2_186

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-45402-2_186

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-45401-5

  • Online ISBN: 978-3-662-45402-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics