PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2014 | Vol. 23 | 131--139
Tytuł artykułu

Bio-authentication for layered remote health monitor framework

Treść / Zawartość
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
Aged people, patients with chronic disease, patients at remote location need continuous monitoring under healthcare professionals. Remote health monitor is likely to be an effective approach to provide healthcare service in a simple and cost effective way. However, effective implementation of this type of framework needs consideration of variety of security threats. In this paper, a layer based remote health monitor framework is proposed to analyze health condition of patients from remote places. Beside this, a multi-modal biometric authentication mechanism is proposed here to reduce misuse of health data and biometrics templates in heterogeneous cloud environment. Main focus of the paper is to design semi-continuous authentication mechanism after establishing mutual 1:1 trust relationship among the participants in cloud environment. Behavioral biometrics keystroke analysis is fused with physiological biometrics face recognition to enhance accuracy of authentication. Instead of considering traditional performance evaluation parameters for biometrics, this paper considers a few performance metrics for determining efficiency of semi-continuous verification of the proposed framework.
Wydawca

Rocznik
Tom
Strony
131--139
Opis fizyczny
Bibliogr. 14 poz., rys., tab., wykr.
Twórcy
  • Department of Computer Science nd Engineering, University of Calcutta, JD -2,Sector -III, Saltlake City, Kolkata, India
autor
  • Faculty of Computer Science, Bialystok Institute of Technology, 45A, Wiejska Street, 15-351 Bialystok, Poland
autor
  • Department of Computer Science nd Engineering, University of Calcutta, JD -2,Sector -III, Saltlake City, Kolkata, India
autor
  • A. K. Chaudhury School of Information Technology, University of Calcutta, JD -2, Sector -III, Saltlake City, Kolkata, India
Bibliografia
  • [1] AHMED A. A., TRAORE, I., Biometric Recognition Based on Free-Text Keystroke Dynamics, IEEE Transactions on Cybernetics, 2014, Vol. 44, No. 4, pp. 458-472.
  • [2] BHATTASALI T., SAEED K., Two Factor Remote Authentication in Healthcare, In: Proceedings of IEEE International Workshop on Internet of Smart objects: Computing, Communication and Management (CCMIoS), 2014, to be uploaded in IEEE Xplore.
  • [3] BHATTASALI T., CHAKI R., CHAKI N.,Secure and Trusted Cloud of Things, In: Proceedings of India Conference, INDICON 2013, IEEE Xplore, 2013, pp. 1-6.
  • [4] BHATTASALI T., CHAKI R., CHAKI N.,Study of Security Issues in Pervasive Environment of Next Generation Internet of Things, In: Proceedings of CISIM 2013, Springer, LNCS, 2013, pp. 206-217.
  • [5] HIPAA Security Guidance, Department of Health and Human Services, USA, Available online at: http://www.hhs.gov/ocr/privacy/hipaa/ administrative/securityrule/remoteuse.pdf.
  • [6] HL7 Version 3 Standard: Privacy, Access and Security Services (PASS) - Access Control, Release 1, V3, PaaS, Available online at: http://www.hl7.org/ implement/standards/product-brief.cfm?product-id=73
  • [7] KAVITHA S. V., A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, Elsevier, 2011, Vol. 34, No. 1, pp. 1-11.
  • [8] LAKSHMIPRABHA N. S., BHATTACHARYA J., MAJUMDER S., Face recognition using multimodal biometric features, In: Proceedings of International Conference on Image Information Processing (ICIIP), 2011, pp. 1-6.
  • [9] MEINGAST M., ROOSTA T., SASTRY S., Security and Privacy Issues with Healthcare Information Technology, In: Proceedings of IEEE EMBS Annual International Conference, 2006, pp. 5453-5458.
  • [10] MISHRA A., Multimodal Biometrics it is: Need for Future Systems, International Journal of Computer Applications, 2010, Vol. 3, No. 4, pp. 28-33.
  • [11] RYBNIK M., TABEDZKI M., ADAMSKI M., SAEED K., An Exploration of Keystroke Dynamics Authentication using Non-fixed Text of Various Length, In: Proceedings of International Conference on Biometrics and Kansei Engineering, 2013, pp. 245-250.
  • [12] SAMARIA F., HARTER A., Parameterisation of a stochastic model for human face identification, In: Proceedings of IEEE Workshop on applications of computer vision, 1994, pp. 138-142.
  • [13] VENKATASUBRAMANIAM K. K., GUPTA S. K. S., Security for Pervasive Health Monitoring Sensor Applications, In: Proceedings of International Conference on Intelligent Sensing and Information Processing (ICPSIP), 2006, pp. 197-202.
  • [14] YAZDANPANAH A. P., FAEZ K., AMIRFATTAHI R., Multimodal biometric system using face, ear and gait biometrics, In: Proceedings of International Conference on Information Sciences Signal Processing and their Applications (ISSPA), 2010, pp. 251 - 254.
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.baztech-094ec6fb-1a53-4ef8-b1cd-37382902af2c
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.