Page 77 - 2023-Vol19-Issue2
P. 77

73 |                                                                         Hamed & Yassin

• Step1. Compute a public key, (PU(CHSk) = (N, g, h, u)). 3) User Side
                                                                         In the healthcare system, there is important part represented

• Step2. Compute a private key, (Pr(CHSk) = (p, q, vp, vq)). by users like employees, doctors, administrator. The user (Ui)
                                                                         sends his request to (CHSk) for registering and getting his

• Step3. Send the tuple (ID(CHSk), IDHCA, PU(CHSk), Pr(CHSk))electronic healthcare record (EHRUi ) that consists of sensitive
  to CHSk and declare the public key PU(CHSk) to other information such as (IDUi , PWUi , AddressUi , EmailUi , . . . etc.).
  healthcare institutions CHS1, CHS2,. . . CHSn (see Fig- However, CHSk prepares anomaly parameters IDAUi = H(IDUi ),

ure 1).                                                          PWAUi = H(PWUi ) and forwards user’s request (IDAUi , PWAUi )

                                                                 to HCA. The following steps performed by HCA to generate

2) Patient Side                                                  main keys.

A patient (Wi) sends request to (CHSk) for registering and       • Step1. Generate Shared key (SKUi ) and certificate (CertUi ).

getting his electronic healthcare record EHR owner(EHR(Wi))      • Step2. Send the tuple (SKUi , IDAUi , PWAUi ,CertUi ) to Ui
that consists of sensitive information such as (ID(Wi), PW(Wi),    via CHSk.
Address(Wi), Email(Wi), . . . etc.). However, CHSk first pre-
pares hash function that is H, where H : Zn* ? {0, 1}1. CHSk     • Step3. CHSk upgrades the main information of EHREi <
prepares anomaly parameters IDAWi = H(IDWi ), PWAWi =              SKUi , IDAUi , PWAUi ,CertUi , . . . > for using it in the next
H(PWWi ). Then, CHSk forwards patient’s request based on           phases (see Fig. 2).
his anomaly parameters to the HCA to help Wi obtaining

the permission parameters from HCA that implementing the

following steps:

• Step1. Generate Shared key (SK(Wi)) and certificate
  (Cert(Wi)).

• Step2. Send the tuple (SK(Wi), ID(AWi), PW(AWi),Cert(Wi))
  to Wi via CHSk.

• Step3. CHSk upgrades the main information of EHR(Wi)           Fig. 2. Registration phase of user phase.
  such as ID(AWi), PW(AWi) and keeps the shared key for
  using it in the next phases.

    Finally, the EHR(Wi) is active to use in the healthcare      B. Login and Authentication Phase
system and applied key operations (update, insert, delete) on    In this phase, the patient and employee want to login the
it (see Fig. 1).                                                 healthcare system , receiving report from his doctor or sending
                                                                 quires to his doctor for accessing EHRWi existed CHSk.
Fig. 1. Registration phase of cloud health server side and
patient side.                                                    1) Patient Side (The owner of EHR)
                                                                 The patient (Wi) desires to access the system in order to view
                                                                 his electronic health record (EHRWi ), gets a report from his
                                                                 doctor, or sends some queries to his doctors. There are main
                                                                 steps to allow Wi from accessing the system as follows:

                                                                      • Step1. The Wi enters his IDWi , PWWi and then generates
                                                                        an integer random number ri ? Zn*. Finally, he calcu-
                                                                        lates an anonymity of identity and one-time password
                                                                        ID'AWi = H(IDWi ), PWA'Wi = H(H(PWWi ) ? ri)), respec-
                                                                        tively.

                                                                      • Step2. Wi encrypts EWi = EncSKWi (ri) using symmetric
                                                                        key and EHWi = HEncSKWi (PWA'Wi ) = gPWA'Wi hri modN ,
                                                                        which is based on homomorphic encryption.
   72   73   74   75   76   77   78   79   80   81   82