Abstract
The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources for threats of APT attack decrease in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for preparatory secure communications to APT attack in the ubiquitous healthcare domains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Berler, A., Pavlopoulos, S., Koutsouris, D.: Design of an interoperability framework in a regional healthcare system. In: Proceedings of Engineering in Medicine and Biology Society, vol. 2, pp. 3093–3096 (2004)
Katsikas, S.K.: Health care management and information systems security: awareness, training or education. Int. J. Med. Informatics 60, 129–135 (2000)
Dell Secure Work: Advanced persistent threats-healthcare under attack (2012)
Rafaeli, S., Hutchison, D.: A survey of key management for secure group communication. ACM Computing Surveys 35(3), 309–329 (2003)
Rindfleisch, T.: Privacy, information technology, and health care. Communications of the ACMÂ 40(8) (1997)
Bohn, J., Gärtner, F.C., Vogt, H.: Dependability Issues of Pervasive Computing in a Healthcare Environment. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 53–70. Springer, Heidelberg (2004)
Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Zhang, L., Chu, B.: A Role-Based Delegation Framework for Healthcare Information Systems. In: ACM Symposium on Access Control Models And Technologies, SACMAT (2002)
Wong, C., Gouda, M., Lam, S.: Secure group communications using key graphs. ACM Sigcomm (1998)
Muhammad, S., Raazi, K., Lee, S., Lee, Y.: A Novel Architecture for Efficient Key Management in Humanware Applications. In: Fifth International Joint Conference on INC, IMS and IDC, pp. 1918–1922 (2009)
Muhammad, S., Raazi, K., Lee, S., Lee, Y.: TIMAR: an efficient key management scheme for ubiquitous health care environments. In: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, United Kingdom (2009)
Das, M., Saxena, A., Gulati, V., Phatak, D.: Hierarchical key management scheme using polynomial interpolation. SIGOPS Operational Systematic Review 39(1), 40–47 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, D., Soh, W., Kim, S. (2015). Novel Key Management for Secure Information of Ubiquitous Healthcare Domains to APT Attack. In: Park, J., Stojmenovic, I., Jeong, H., Yi, G. (eds) Computer Science and its Applications. Lecture Notes in Electrical Engineering, vol 330. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-45402-2_186
Download citation
DOI: https://doi.org/10.1007/978-3-662-45402-2_186
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-45401-5
Online ISBN: 978-3-662-45402-2
eBook Packages: EngineeringEngineering (R0)