IEEE Consumer Electronics Magazine - July 2018 - 71
cryptography for identity verification; after completing identity verification, the system produces a session key with the
server to conduct symmetric cryptography transmission.
Although the study's [16] private communication and data
collection boasts the best performance, it lacks privacy protection that can lead to data leakage. On the other hand, although
the elliptic curve technology in [17] can satisfy all of the
security requirements, it is highly complex in its computation
methodology. Meanwhile, while the public-key cryptography
suggested in [1] has a lower computation complexity in data
collection encryption compared to our approach, which
requires n) 9.68 ms of computation time when a single node
collects data from another node, our proposed method's
distributed architecture can prevent the meltdown by a certain
node suffering from cyberattacks.
CONCLUSION
This article reviews literature on health-care systems and proposes network security requirements for such systems as well
as two algorithms that satisfy these demands. Although the
proposed techniques can meet the security needs, in addition to
network security, we should also consider relevant dictates of
the general data protection regulation. Privacy and private
communication are the goals of any health-care system. The
overall security of a health-care system's design should start
with overall planning for information security, information
storage and access, and network security to ensure medical
information safety and confidentiality in health-care systems.
Currently, there is a high price to pay for any breach or modification of information caused by system failures. There is much
room for progress and discussion when it comes to the establishment of health-care systems, such as distributed management, legal regulations, network security, and the feasibility of
health-care systems.
ACKNOWLEDgMENT
We wish to thank the anonymous reviewers for their valuable
comments and suggestions on this article. This work was
supported in part by the Ministry of Science and Technology
of Taiwan, under Contracts MOST105-2221-E-005-091,
MOST106-2221-E-005-094, MOST106-2622-E-346-001CC3, and MOST106-3114- E-005-001.
ABOUT THE AUTHORS
Hsin-Te Wu (Wuhsinte@gms.npu.edu.tw) is an assistant
professor in the Department of Computer Science and
Information Engineering at the National Penghu University of Science and Technology, Magong, Taiwan.
Chun-Wei Tsai (cwtsai@nchu.edu.tw) joined the faculty
of the Department of Computer Science and Information
Engineering, National Ilan University, Yilan, Taiwan, in 2014
and then the Department of Computer Science and Engineering, National Chung Hsing University, Taichung, Taiwan, in
2017, where he is currently an assistant professor.
REFERENCES
[1] J. Zhang, N. Xue, and X. Huang, "A secure system for pervasive social network-based health care," IEEE Access, vol. 4, pp. 9239-9250,
Dec. 2016.
[2] Q. Xia, E. B. Sifah, K. O. Asamoah, J. Gao, X. Du, and M. Guizani,
"MeDShare: Trust-less medical data sharing among cloud service providers
via blockchain," IEEE Access, vol. 5, pp. 14,757-14,767, July 2017.
[3] F. Tschorsch and B. Scheuermann, "Bitcoin and beyond: A technical
survey on decentralized digital currencies," Commun. Surveys Tuts., vol.
18, no. 3, pp. 2084-2123, 2016.
[4] P. Sundaravadivel, E. Kougianos, S. P. Mohanty, and M. Ganapathiraju, "Everything you wanted to know about smart health care," IEEE
Consum. Electron. Mag., vol. 8, no. 1, pp. 18-28, 2018.
[5] E. Karafiloski and A. Mishev, "Blockchain solutions for big data challenges: A literature review," in Proc. Int. Conf. Smart Technologies, 2017,
pp. 763-768.
[6] J. H. Lee and M. Pilkington, "How the blockchain revolution will reshape the consumer electronics industry," IEEE Consum. Electron. Mag.,
vol. 6, no. 3, pp. 19-23, 2017.
[7] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and
J. Kishigami, "Blockchain contract: Securing a blockchain applied to
smart contracts," in Proc. IEEE Int. Conf. Consumer Electronics, 2016,
pp. 467-468.
[8] D. Puthal, N. Malik, S. P. Mohanty, E. Kougianos, and C. Yang, "The
blockchain-A decentralized security framework," IEEE Consum. Electron. Mag., vol. 8, no. 2, pp. 18-21, 2018.
[9] S. P. Mohanty, U. Choppali, and E. Kougianos, "Everything you wanted to know about smart cities," IEEE Consum. Electron. Mag., vol. 6, no.
3, pp. 60-70, 2016.
[10] European Parliament. (2016, May 4). Regulation (EU) 2016/679 of
the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data
and on the free movement of such data, and repealing Directive 95/46/
EC (General Data Protection Regulation). Official J. European Union.
[Online]. 59(L 119). Available: http://eur-lex.europa.eu/legal-content/EN/
TXT/?uri=OJ:L:2016:119:TOC
[11] M. Scott, "Computing the tate pairing," in Proc. Cryptographers'
Track RSA Conf., 2005, pp. 293-304.
[12] U. M. Maurer, "Towards the equivalence of breaking the diffie-hellman protocol and computing discrete logarithms," Lecture Notes Comput.
Sci., vol. 839, pp. 271-281, Aug. 1994.
[13] D. Boneh, "The decision diffie-hellman problem," in Proc. Int. Algorithmic Number Theory Symp., 1998, pp. 48-63.
[14] I. F. Blake and T. Garefalakis, "Polynomial approximation of bilinear diffie-hellman maps," Finite Fields Their Applicat., vol. 14, no. 2, pp.
379-389, 2008.
[15] D. Boneh and M. Franklin, "Identity-based encryption from the Weil
pairing," in Proc. Int. Cryptology Conf., 2001, pp. 213-229.
[16] M. A. SimplĂcio, Jr., L. H. Iwaya, B. M. Barros, T. C. M. B. Carvalho,
and M. Naslund, "Secourhealth: A delay-tolerant security framework for
mobile health data collection," IEEE J. Biomed. Health Inform., vol. 19,
no. 2, pp. 761-772, 2015.
[17] H. Xiong, J. Tao, and C. Yuan, "Enabling telecare medical information systems with strong authentication and anonymity," IEEE Access, vol.
5, pp. 5648-5661, Mar. 2017.
[18] M. Scott. Efficient implementation of crytographic pairings. [Online]. Available: http://ecrypt-ss07.isg.rhul.ac.uk/Slides/Thursday/mscottsamos07.pdf
[19] M. Scott, "Implementing cryptographic pairings," in Proc. First Int.
Conf. Pairing-Based Cryptography, 2007, pp. 177-196.
[20] M. Long, J. C.-H. Wu, and J. D. Irwin, "Reducing communication
overhead for wireless roaming authentication: Methods and performance
evaluation," Int. J. Netw. Security, vol. 6, no. 3, pp. 331-341, 2008.
july 2018
^
IEEE Consumer Electronics Magazine
71
http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L:2016:119:TOC
http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L:2016:119:TOC
http://ecrypt-ss07.isg.rhul.ac.uk/Slides/Thursday/mscott-samos07.pdf
http://ecrypt-ss07.isg.rhul.ac.uk/Slides/Thursday/mscott-samos07.pdf
Table of Contents for the Digital Edition of IEEE Consumer Electronics Magazine - July 2018
Contents
IEEE Consumer Electronics Magazine - July 2018 - Cover1
IEEE Consumer Electronics Magazine - July 2018 - Cover2
IEEE Consumer Electronics Magazine - July 2018 - Contents
IEEE Consumer Electronics Magazine - July 2018 - 2
IEEE Consumer Electronics Magazine - July 2018 - 3
IEEE Consumer Electronics Magazine - July 2018 - 4
IEEE Consumer Electronics Magazine - July 2018 - 5
IEEE Consumer Electronics Magazine - July 2018 - 6
IEEE Consumer Electronics Magazine - July 2018 - 7
IEEE Consumer Electronics Magazine - July 2018 - 8
IEEE Consumer Electronics Magazine - July 2018 - 9
IEEE Consumer Electronics Magazine - July 2018 - 10
IEEE Consumer Electronics Magazine - July 2018 - 11
IEEE Consumer Electronics Magazine - July 2018 - 12
IEEE Consumer Electronics Magazine - July 2018 - 13
IEEE Consumer Electronics Magazine - July 2018 - 14
IEEE Consumer Electronics Magazine - July 2018 - 15
IEEE Consumer Electronics Magazine - July 2018 - 16
IEEE Consumer Electronics Magazine - July 2018 - 17
IEEE Consumer Electronics Magazine - July 2018 - 18
IEEE Consumer Electronics Magazine - July 2018 - 19
IEEE Consumer Electronics Magazine - July 2018 - 20
IEEE Consumer Electronics Magazine - July 2018 - 21
IEEE Consumer Electronics Magazine - July 2018 - 22
IEEE Consumer Electronics Magazine - July 2018 - 23
IEEE Consumer Electronics Magazine - July 2018 - 24
IEEE Consumer Electronics Magazine - July 2018 - 25
IEEE Consumer Electronics Magazine - July 2018 - 26
IEEE Consumer Electronics Magazine - July 2018 - 27
IEEE Consumer Electronics Magazine - July 2018 - 28
IEEE Consumer Electronics Magazine - July 2018 - 29
IEEE Consumer Electronics Magazine - July 2018 - 30
IEEE Consumer Electronics Magazine - July 2018 - 31
IEEE Consumer Electronics Magazine - July 2018 - 32
IEEE Consumer Electronics Magazine - July 2018 - 33
IEEE Consumer Electronics Magazine - July 2018 - 34
IEEE Consumer Electronics Magazine - July 2018 - 35
IEEE Consumer Electronics Magazine - July 2018 - 36
IEEE Consumer Electronics Magazine - July 2018 - 37
IEEE Consumer Electronics Magazine - July 2018 - 38
IEEE Consumer Electronics Magazine - July 2018 - 39
IEEE Consumer Electronics Magazine - July 2018 - 40
IEEE Consumer Electronics Magazine - July 2018 - 41
IEEE Consumer Electronics Magazine - July 2018 - 42
IEEE Consumer Electronics Magazine - July 2018 - 43
IEEE Consumer Electronics Magazine - July 2018 - 44
IEEE Consumer Electronics Magazine - July 2018 - 45
IEEE Consumer Electronics Magazine - July 2018 - 46
IEEE Consumer Electronics Magazine - July 2018 - 47
IEEE Consumer Electronics Magazine - July 2018 - 48
IEEE Consumer Electronics Magazine - July 2018 - 49
IEEE Consumer Electronics Magazine - July 2018 - 50
IEEE Consumer Electronics Magazine - July 2018 - 51
IEEE Consumer Electronics Magazine - July 2018 - 52
IEEE Consumer Electronics Magazine - July 2018 - 53
IEEE Consumer Electronics Magazine - July 2018 - 54
IEEE Consumer Electronics Magazine - July 2018 - 55
IEEE Consumer Electronics Magazine - July 2018 - 56
IEEE Consumer Electronics Magazine - July 2018 - 57
IEEE Consumer Electronics Magazine - July 2018 - 58
IEEE Consumer Electronics Magazine - July 2018 - 59
IEEE Consumer Electronics Magazine - July 2018 - 60
IEEE Consumer Electronics Magazine - July 2018 - 61
IEEE Consumer Electronics Magazine - July 2018 - 62
IEEE Consumer Electronics Magazine - July 2018 - 63
IEEE Consumer Electronics Magazine - July 2018 - 64
IEEE Consumer Electronics Magazine - July 2018 - 65
IEEE Consumer Electronics Magazine - July 2018 - 66
IEEE Consumer Electronics Magazine - July 2018 - 67
IEEE Consumer Electronics Magazine - July 2018 - 68
IEEE Consumer Electronics Magazine - July 2018 - 69
IEEE Consumer Electronics Magazine - July 2018 - 70
IEEE Consumer Electronics Magazine - July 2018 - 71
IEEE Consumer Electronics Magazine - July 2018 - 72
IEEE Consumer Electronics Magazine - July 2018 - 73
IEEE Consumer Electronics Magazine - July 2018 - 74
IEEE Consumer Electronics Magazine - July 2018 - 75
IEEE Consumer Electronics Magazine - July 2018 - 76
IEEE Consumer Electronics Magazine - July 2018 - 77
IEEE Consumer Electronics Magazine - July 2018 - 78
IEEE Consumer Electronics Magazine - July 2018 - 79
IEEE Consumer Electronics Magazine - July 2018 - 80
IEEE Consumer Electronics Magazine - July 2018 - 81
IEEE Consumer Electronics Magazine - July 2018 - 82
IEEE Consumer Electronics Magazine - July 2018 - 83
IEEE Consumer Electronics Magazine - July 2018 - 84
IEEE Consumer Electronics Magazine - July 2018 - 85
IEEE Consumer Electronics Magazine - July 2018 - 86
IEEE Consumer Electronics Magazine - July 2018 - 87
IEEE Consumer Electronics Magazine - July 2018 - 88
IEEE Consumer Electronics Magazine - July 2018 - 89
IEEE Consumer Electronics Magazine - July 2018 - 90
IEEE Consumer Electronics Magazine - July 2018 - 91
IEEE Consumer Electronics Magazine - July 2018 - 92
IEEE Consumer Electronics Magazine - July 2018 - 93
IEEE Consumer Electronics Magazine - July 2018 - 94
IEEE Consumer Electronics Magazine - July 2018 - 95
IEEE Consumer Electronics Magazine - July 2018 - 96
IEEE Consumer Electronics Magazine - July 2018 - Cover3
IEEE Consumer Electronics Magazine - July 2018 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20240102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20231112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20230102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20221112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20220102
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20211112
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210708
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210506
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_20210304
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202010
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202009
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202007
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202004
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202003
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_202001
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201910
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201909
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201907
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201905
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201903
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201901
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201811
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201809
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201807
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201805
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_201803
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2017
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2016
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_october2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_july2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_april2015
https://www.nxtbook.com/nxtbooks/ieee/consumerelectronics_january2015
https://www.nxtbookmedia.com