IoT 환경에서 활용 가능한 안전한 의료 데이터 공유 기법

Vol. 34, No. 6, pp. 1369-1383, 12월. 2024
10.13089/JKIISC.2024.34.6.1369, Full Text:
Keywords: EHR Data, data sharing, Cloud, access control, IoT
Abstract

The MyData initiative for personal data portability has recently expanded into the medical field. A method for securely sharing medical data using low-cost IoT devices is essential for widespread adoption of healthcare services across all age groups. Qiu et al. proposed a secure medical data sharing technique using both data and encryption keys, ensuring safety even if the encryption key is exposed. However, their method requires storing N decryption keys for N medical institutions, leading to key management issues, storage overhead, and additional search operations on user devices. This paper presents an improved method based on Qiu et al.'s technique, maintaining efficiency from the user device perspective as the number of data sharing targets increases. We propose a key generation technique deriving multiple keys from a single key, eliminating storage overhead and additional search operations, thus suitable for low-spec devices. Experimental results show our method is 0.05 seconds faster in encryption time (including key generation) and consumes 4.3% less energy compared to Qiu et al.'s method, demonstrating improved efficiency in time and energy consumption.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
정경재, 정익래, 천지영, 노건태, 신영아, "Secure Medical Data Sharing Techniques that Can Be Utilized in IoT Environments," Journal of The Korea Institute of Information Security and Cryptology, vol. 34, no. 6, pp. 1369-1383, 2024. DOI: 10.13089/JKIISC.2024.34.6.1369.

[ACM Style]
정경재, 정익래, 천지영, 노건태, and 신영아. 2024. Secure Medical Data Sharing Techniques that Can Be Utilized in IoT Environments. Journal of The Korea Institute of Information Security and Cryptology, 34, 6, (2024), 1369-1383. DOI: 10.13089/JKIISC.2024.34.6.1369.