About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
2nd International ICST Conference on Pervasive Computing Technologies for Healthcare

Research Article

Patient’s privacy protection with anonymous access to medical services

Download929 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/ICST.PERVASIVEHEALTH2008.2509,
        author={Dasun Weerasinghe and Kalid Elmufti and Muttukrishnan Rajarajan and Veselin Rakocevic},
        title={Patient’s privacy protection with anonymous access to medical services},
        proceedings={2nd International ICST Conference on Pervasive Computing Technologies for Healthcare},
        publisher={IEEE},
        proceedings_a={PERVASIVEHEALTH},
        year={2008},
        month={7},
        keywords={Access protocols Authentication Biomedical engineering Data security IP networks Information security Insurance Medical services Privacy Protection},
        doi={10.4108/ICST.PERVASIVEHEALTH2008.2509}
    }
    
  • Dasun Weerasinghe
    Kalid Elmufti
    Muttukrishnan Rajarajan
    Veselin Rakocevic
    Year: 2008
    Patient’s privacy protection with anonymous access to medical services
    PERVASIVEHEALTH
    ICST
    DOI: 10.4108/ICST.PERVASIVEHEALTH2008.2509
Dasun Weerasinghe1,*, Kalid Elmufti1, Muttukrishnan Rajarajan1, Veselin Rakocevic1
  • 1: Mobile Networks Research Group, School of Engineering and Mathematical Sciences, City University, Northampton Square, London, EC1V 0HB, UK.
*Contact email: dasun.weerasinghe@city.ac.uk

Abstract

The Internet and mobile networks have penetrated the healthcare sector due to their increased functionality, low cost, high reliability and easy-to-use nature. However, in such healthcare environment the privacy and security of the transmitted information must be preserved. When dealing with health sensitive information at times it is vital to protect the patient’s identity and their health sensitive information from third parties. In this paper we present a protocol that will authenticate and authorize patients to healthcare services without providing the patient’s identification. The protocol protects patient’s privacy with a secure anonymous authentication to healthcare services, where the patient has access to a complete set of healthcare services.

Keywords
Access protocols Authentication Biomedical engineering Data security IP networks Information security Insurance Medical services Privacy Protection
Published
2008-07-22
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.4108/ICST.PERVASIVEHEALTH2008.2509
Copyright © 2008–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL