Open Access
Subscription Access
Open Access
Subscription Access
Authenticating Indian E-health System through "Aadhaar" a Unique Identification
Subscribe/Renew Journal
Implementation of an e-health care system without compromising the security is of primary concern. The technological barriers in the successful deployment of ehealth services in India have been analyzed . The article focuses on the need of simultaneous approach of authorization and authentication. Further a model has been proposed for providing secured e-health services in India. The model makes use of "Aadhaar" for authentication purpose. "Aadhaar" is a twelve digit unique identification number provided by UIDAI (Unique Identification Authority of India), an agency of Government of India.
Keywords
Authorization and Authentication, Aadhaar, UIDAI
Subscription
Login to verify subscription
User
Font Size
Information
- Smith E. Eloff JHP (1999), Security in health care information systems-current trends, International Journal of Medical Informatics, 54:39-54.
- Agarwal R, Kini a, Lev Fevre K, Wang A, Xu Y and Zhou D (2004) Managing Healthcare Data Hippocratically Proc. Of ACM SIGMOD Intl. Conference On Management of Data.
- Rostad L. and Edsberg O. (2006), “A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access logs.” In Proc. Of 22nd Annual Computer Security Applications Conference, Miami, Florida.
- http://bussinesswireindia.com/PressRelease.asp, November2012
- http://sites.ieee.org/societies/2012/05/09/ieee-launches-major-ehealth-pilot-in-india, 2012.
- Dr. S.K. Mishra, "Ehealth initiatives in India", http://openmed.nic.in/1265/01/skm12.pdf
- http://ehealth.eletsonline.com/2011/06/national-Health-portalfor-india.
- GpCapt (Dr) Sanjeev Sood (2012), http://ehealth.eletsonline.com/2012/01/aadhaar-opening-up-of-new-vistas-inhealthcare-gp-capt-dr-sanjeev-sood-hospital-administrator-andnabh-empanelled-assessor/.
- Shweta Kannan (February 2013), Retrieved from “http://www.thehindubusinessonline.com/companies/apollohospitals-working-on-linking-ehealth-records-with-Aadhaar.
- Ganapathy K. (2008), Retrieved from http://conf.isi.qut.edu.au, 2008.
- Elmufti K., Weerasinghe , Rajarajan , Rakocevic Khan (2008), "Timestamp Authentication Protocol for remote Monitoring in ehealth," The 2nd International conference on pervasive computing technologies for healthcare, Tampere, finland, pp. 73- 76.
- Russello Dong Dulay (2008)," A Workflow based access control framework for ehealth application", proc. of the 22nd International conference on advanced information networking and applications-workshops, pp. 111-120.
- Liu , Caelli , May Croll (2008), "Open Trusted Health Informatics Structure, (OTHIS)," Proc. of the 2nd Australian Workshop on Health Data Knowledge Management, Vol. 80, pp. 33-43.
- Kuo-Hui Yeh, N.W. Lo, Tzong-Chen Wu, Ta-Chi Yang and Horng-Twu Liaw (2012), “Analysis of an e-Health care system with Smart Card Based Authentication”, Seventh Asia Joint Conference on Information Security, Hualien, Taiwan,pp 59-61.
- Blobel et al.(2006),” Alerts in Clinical Information Systems: Building Frameworks and Prototypes“, Proc. Of AMIA Fall Symposium, Washington D.C.
- Khan, M. Fahim Ferdous (2012),” Context aware access control for clinical information system”, International Conference on Innovations in Information Technology (IIT), Tokyo, Japan, pp.123-128.
- Song Han, Geoff. Skinner, Vidyasagar. Potdar, Elizabeth. Chang (2004), "A Framework of Authentication and Authorization for e-Health Services", Proceedings of the UK e- Science All Hands Conference 2004 website: http://www.allhands.org.uk/2004/
- Apaporn Boonyarattephan, Yan Bai, Sam chung (2009), "Security Framework for e-Health Service Authentication and e-Health Data Transmission (2009)", 9th International Symposium On Communications and Information Technology. ISCIT 2009. pp 1213-1218, 28-30.
Abstract Views: 554
PDF Views: 0