Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Authenticating Indian E-health System through "Aadhaar" a Unique Identification


Affiliations
1 MCA Department, RKGIT, Uttar Pradesh Technical University, Lucknow, Uttar Pradesh, India
     

   Subscribe/Renew Journal


Implementation of an e-health care system without compromising the security is of primary concern. The technological barriers in the successful deployment of ehealth services in India have been analyzed . The article focuses on the need of simultaneous approach of authorization and authentication. Further a model has been proposed for providing secured e-health services in India. The model makes use of "Aadhaar" for authentication purpose. "Aadhaar" is a twelve digit unique identification number provided by UIDAI (Unique Identification Authority of India), an agency of Government of India.

Keywords

Authorization and Authentication, Aadhaar, UIDAI
Subscription Login to verify subscription
User
Notifications
Font Size


  • Smith E. Eloff JHP (1999), Security in health care information systems-current trends, International Journal of Medical Informatics, 54:39-54.
  • Agarwal R, Kini a, Lev Fevre K, Wang A, Xu Y and Zhou D (2004) Managing Healthcare Data Hippocratically Proc. Of ACM SIGMOD Intl. Conference On Management of Data.
  • Rostad L. and Edsberg O. (2006), “A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access logs.” In Proc. Of 22nd Annual Computer Security Applications Conference, Miami, Florida.
  • http://bussinesswireindia.com/PressRelease.asp, November2012
  • http://sites.ieee.org/societies/2012/05/09/ieee-launches-major-ehealth-pilot-in-india, 2012.
  • Dr. S.K. Mishra, "Ehealth initiatives in India", http://openmed.nic.in/1265/01/skm12.pdf
  • http://ehealth.eletsonline.com/2011/06/national-Health-portalfor-india.
  • GpCapt (Dr) Sanjeev Sood (2012), http://ehealth.eletsonline.com/2012/01/aadhaar-opening-up-of-new-vistas-inhealthcare-gp-capt-dr-sanjeev-sood-hospital-administrator-andnabh-empanelled-assessor/.
  • Shweta Kannan (February 2013), Retrieved from “http://www.thehindubusinessonline.com/companies/apollohospitals-working-on-linking-ehealth-records-with-Aadhaar.
  • Ganapathy K. (2008), Retrieved from http://conf.isi.qut.edu.au, 2008.
  • Elmufti K., Weerasinghe , Rajarajan , Rakocevic Khan (2008), "Timestamp Authentication Protocol for remote Monitoring in ehealth," The 2nd International conference on pervasive computing technologies for healthcare, Tampere, finland, pp. 73- 76.
  • Russello Dong Dulay (2008)," A Workflow based access control framework for ehealth application", proc. of the 22nd International conference on advanced information networking and applications-workshops, pp. 111-120.
  • Liu , Caelli , May Croll (2008), "Open Trusted Health Informatics Structure, (OTHIS)," Proc. of the 2nd Australian Workshop on Health Data Knowledge Management, Vol. 80, pp. 33-43.
  • Kuo-Hui Yeh, N.W. Lo, Tzong-Chen Wu, Ta-Chi Yang and Horng-Twu Liaw (2012), “Analysis of an e-Health care system with Smart Card Based Authentication”, Seventh Asia Joint Conference on Information Security, Hualien, Taiwan,pp 59-61.
  • Blobel et al.(2006),” Alerts in Clinical Information Systems: Building Frameworks and Prototypes“, Proc. Of AMIA Fall Symposium, Washington D.C.
  • Khan, M. Fahim Ferdous (2012),” Context aware access control for clinical information system”, International Conference on Innovations in Information Technology (IIT), Tokyo, Japan, pp.123-128.
  • Song Han, Geoff. Skinner, Vidyasagar. Potdar, Elizabeth. Chang (2004), "A Framework of Authentication and Authorization for e-Health Services", Proceedings of the UK e- Science All Hands Conference 2004 website: http://www.allhands.org.uk/2004/
  • Apaporn Boonyarattephan, Yan Bai, Sam chung (2009), "Security Framework for e-Health Service Authentication and e-Health Data Transmission (2009)", 9th International Symposium On Communications and Information Technology. ISCIT 2009. pp 1213-1218, 28-30.

Abstract Views: 554

PDF Views: 0




  • Authenticating Indian E-health System through "Aadhaar" a Unique Identification

Abstract Views: 554  |  PDF Views: 0

Authors

Shilpa Srivastava
MCA Department, RKGIT, Uttar Pradesh Technical University, Lucknow, Uttar Pradesh, India
Ritu Agarwal
MCA Department, RKGIT, Uttar Pradesh Technical University, Lucknow, Uttar Pradesh, India

Abstract


Implementation of an e-health care system without compromising the security is of primary concern. The technological barriers in the successful deployment of ehealth services in India have been analyzed . The article focuses on the need of simultaneous approach of authorization and authentication. Further a model has been proposed for providing secured e-health services in India. The model makes use of "Aadhaar" for authentication purpose. "Aadhaar" is a twelve digit unique identification number provided by UIDAI (Unique Identification Authority of India), an agency of Government of India.

Keywords


Authorization and Authentication, Aadhaar, UIDAI

References