Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers

Research Article

An E-Hospital Security Architecture

Download
801 downloads
  • @INPROCEEDINGS{10.1007/978-3-642-11723-7_43,
        author={Fang Tian and Carlisle Adams},
        title={An E-Hospital Security Architecture},
        proceedings={Ad Hoc Networks. First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers},
        proceedings_a={ADHOCNETS},
        year={2012},
        month={7},
        keywords={Availability JADE Layered Security Protection Identity -Based Cryptography Elliptic Curve Cryptography Public Cryptography},
        doi={10.1007/978-3-642-11723-7_43}
    }
    
  • Fang Tian
    Carlisle Adams
    Year: 2012
    An E-Hospital Security Architecture
    ADHOCNETS
    Springer
    DOI: 10.1007/978-3-642-11723-7_43
Fang Tian1,*, Carlisle Adams1,*
  • 1: University of Ottawa
*Contact email: Ftian030@uottawa.ca, cadams@uottawa.ca

Abstract

In this paper, we introduce how to use cryptography in network security and access control of an e-hospital. We first define the security goal of the e-hospital system, and then we analyze the current application system. Our idea is proposed on the system analysis and the related regulations of patients’ privacy protection. The security of the whole application system is strengthened through layered security protection. Three security domains in the e-hospital system are defined according to their sensitivity level, and for each domain, we propose different security protections. We use identity based cryptography to establish secure communication channel in the backbone network and policy based cryptography to establish secure communication channel between end users and the backbone network. We also use policy based cryptography in the access control of the application system. We use a symmetric key cryptography to protect the real data in the database. The identity based and policy based cryptography are all based on elliptic curve cryptography—a public key cryptography.