About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
phat 19(20): e3

Research Article

Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques

Download1272 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.13-7-2018.163837,
        author={Dindayal Mahto and Dilip Kumar Yadav},
        title={Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques},
        journal={EAI Endorsed Transactions on Pervasive Health and Technology},
        volume={5},
        number={20},
        publisher={EAI},
        journal_a={PHAT},
        year={2019},
        month={11},
        keywords={Elliptic Curve Cryptography, RSA, Iris Biometrics, Asymmetric-key Cryptography, Patient, Doctor},
        doi={10.4108/eai.13-7-2018.163837}
    }
    
  • Dindayal Mahto
    Dilip Kumar Yadav
    Year: 2019
    Cloud-based Secure TeleMedicine Information System using Crypto-Biometric Techniques
    PHAT
    EAI
    DOI: 10.4108/eai.13-7-2018.163837
Dindayal Mahto1,*, Dilip Kumar Yadav2
  • 1: SASTRA Deemed-to-be University, Thanjavur, Tamil Nadu, India
  • 2: NIT Jamshedpur, Jharkhand, India
*Contact email: dindayal.mahto@gmail.com

Abstract

INTRODUCTION: TeleMedicine Information System (TMIS) uses information and communication technology (ICT) for providing remote medical consultations. Taking the benefits of ICT, a sick person may distantly get regular telecare medical consultations with his/her remote medico. The backbone of ICT is the Internet, which is open-standard architecture. Due to the openness of the architecture, there are many security vulnerabilities to the TMIS.

OBJECTIVES: To provide secured telemedicine consultation between a sick person and a medico and, to maintain the privacy of the sick person information.

METHODS: This paper proposes a security enhancement to the TMIS using crypto-biometrics fusion, which consists of Elliptic Curve Cryptography (ECC) algorithm and iris biometrics. The paper also compares the efficiency of ECC with the Rivest-Shamir-Adleman (RSA) algorithm.

RESULTS: The result of the simulation proves that the offered model provides a high level and robust security than RSA based model.

CONCLUSION: This paper provides robust user authentication and achieves the data confidentiality of the TMIS, which uses a cloud computing system for its smooth functioning and wider scope.

Keywords
Elliptic Curve Cryptography, RSA, Iris Biometrics, Asymmetric-key Cryptography, Patient, Doctor
Received
2019-09-30
Accepted
2019-10-25
Published
2019-11-13
Publisher
EAI
http://dx.doi.org/10.4108/eai.13-7-2018.163837

Copyright © 2019 Dindayal Mahto et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL