User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms

User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
Copyright: © 2021 |Pages: 39
ISBN13: 9781799857280|ISBN10: 179985728X|EISBN13: 9781799857297
DOI: 10.4018/978-1-7998-5728-0.ch032
Cite Chapter Cite Chapter

MLA

Al-Zubaidie, Mishall, et al. "User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms." Handbook of Research on Cyber Crime and Information Privacy, edited by Maria Manuela Cruz-Cunha and Nuno Mateus-Coelho, IGI Global, 2021, pp. 700-738. https://doi.org/10.4018/978-1-7998-5728-0.ch032

APA

Al-Zubaidie, M., Zhang, Z., & Zhang, J. (2021). User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms. In M. Cruz-Cunha & N. Mateus-Coelho (Eds.), Handbook of Research on Cyber Crime and Information Privacy (pp. 700-738). IGI Global. https://doi.org/10.4018/978-1-7998-5728-0.ch032

Chicago

Al-Zubaidie, Mishall, Zhongwei Zhang, and Ji Zhang. "User Authentication Into Electronic Health Record Based on Reliable Lightweight Algorithms." In Handbook of Research on Cyber Crime and Information Privacy, edited by Maria Manuela Cruz-Cunha and Nuno Mateus-Coelho, 700-738. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-5728-0.ch032

Export Reference

Mendeley
Favorite

Abstract

Supporting a mechanism to authenticate members in electronic health record (EHR) is a fundamental procedure to prevent different threats from penetrating patients' identities/data. Existing authentication schemes still suffer from security drawbacks. Exchanging medical-related information/data between clients and the servers leaves them compromised to breakthrough by intruders as they can transmit over an unreliable environment. To guarantee the protection of patient records, this chapter proposes a new scheme that provides authentication of patients/providers in EHR depending on the legitimate member identities and the device information. The scheme utilizes an elliptic curve cryptography and lightweight hash function to accomplish robust security with satisfying performance. Moreover, it depends on a set of techniques such as multi-pseudonyms to authenticate legitimate members. Additionally, concentrated theoretical and experimental analysis proves that the proposed provides elevated performance and security compared to existing research.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.