phat 18: e3

Research Article

Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques

Download21 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.163837,
        author={Dindayal Mahto and Dilip Kumar Yadav},
        title={Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques},
        journal={EAI Endorsed Transactions on Pervasive Health and Technology: Online First},
        volume={},
        number={},
        publisher={EAI},
        journal_a={PHAT},
        year={2020},
        month={3},
        keywords={Elliptic Curve Cryptography, RSA, Iris Biometrics, Asymmetric-key Cryptography, Patient, Doctor},
        doi={10.4108/eai.13-7-2018.163837}
    }
    
  • Dindayal Mahto
    Dilip Kumar Yadav
    Year: 2020
    Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques
    PHAT
    EAI
    DOI: 10.4108/eai.13-7-2018.163837
Dindayal Mahto1,*, Dilip Kumar Yadav2
  • 1: SASTRA Deemed-to-be University, Thanjavur, Tamil Nadu, India
  • 2: NIT Jamshedpur, Jharkhand, India
*Contact email: dindayal.mahto@gmail.com

Abstract

INTRODUCTION: TeleMedicine Information System (TMIS) uses information and communication technology (ICT) for providing remote medical consultations. Taking the benefits of ICT, a sick person may distantly get regular telecare medical consultations with his/her remote medico. The backbone of ICT is the Internet, which is open-standard architecture. Due to the openness of the architecture, there are many security vulnerabilities to the TMIS.

OBJECTIVES: To provide secured telemedicine consultation between a sick person and a medico and, to maintain the privacy of the sick person information.

METHODS: This paper proposes a security enhancement to the TMIS using crypto-biometrics fusion, which consists of Elliptic Curve Cryptography (ECC) algorithm and iris biometrics. The paper also compares the efficiency of ECC with the Rivest-Shamir-Adleman (RSA) algorithm.

RESULTS: The result of the simulation proves that the offered model provides a high level and robust security than RSA based model.

CONCLUSION: This paper provides robust user authentication and achieves the data confidentiality of the TMIS, which uses a cloud computing system for its smooth functioning and wider scope.