Enhancing Transaction Security for Handling Accountability in Electronic Health Records

Electronic healthcare systems have received extensive attention during the last decade due to the advancement of digital technology. Using these systems in the healthcare industry can improve the quality of healthcare services tremendously. However, a major issue that needs to be concerned, when uti...

Full description

Bibliographic Details
Main Authors: Chian Techapanupreed, Werasak Kurutach
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/8899409
id doaj-6a9f3d51cc6c442da378dae9153b0481
record_format Article
spelling doaj-6a9f3d51cc6c442da378dae9153b04812020-11-25T02:32:56ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/88994098899409Enhancing Transaction Security for Handling Accountability in Electronic Health RecordsChian Techapanupreed0Werasak Kurutach1Faculty of Information Science and Technology, Mahanakorn University of Technology, Bangkok 10530, ThailandFaculty of Information Science and Technology, Mahanakorn University of Technology, Bangkok 10530, ThailandElectronic healthcare systems have received extensive attention during the last decade due to the advancement of digital technology. Using these systems in the healthcare industry can improve the quality of healthcare services tremendously. However, a major issue that needs to be concerned, when utilizing this kind of system, is accountability. Employments of electronic health records, the core of the systems, without accountability can be a big risk to both patients and service personals and, consequently, to the entire society. Accountability in electronic health records is essential to creating trust among parties. Many researchers have been introduced to the accountability protocol. However, most of them still lack some essential security property that is mutual authentication. This leads to both information traceability and nonrepudiation which are necessary for resolving any conflict that may arise. In this paper, we propose accountability protocol for electronic health records; the protocol employs both asymmetric and symmetric encryptions to ensure that the electronic health records are having confidentiality, integrity, authentication, and authorization. The accountability analysis and performance analysis show that the proposed protocol is more capable and effective than others. The novel aspect of this idea lies in the inclusion of certain forms of security that are necessary to protect the patient’s electronic health records. To the best of our knowledge, the proposed protocol consumes less cost, energy, and time compared with the existing protocols. A proof of concept of our protocol is also presented in this paper by using BAN logic, an automated security protocol proof tool named Scyther, and AVISPAhttp://dx.doi.org/10.1155/2020/8899409
collection DOAJ
language English
format Article
sources DOAJ
author Chian Techapanupreed
Werasak Kurutach
spellingShingle Chian Techapanupreed
Werasak Kurutach
Enhancing Transaction Security for Handling Accountability in Electronic Health Records
Security and Communication Networks
author_facet Chian Techapanupreed
Werasak Kurutach
author_sort Chian Techapanupreed
title Enhancing Transaction Security for Handling Accountability in Electronic Health Records
title_short Enhancing Transaction Security for Handling Accountability in Electronic Health Records
title_full Enhancing Transaction Security for Handling Accountability in Electronic Health Records
title_fullStr Enhancing Transaction Security for Handling Accountability in Electronic Health Records
title_full_unstemmed Enhancing Transaction Security for Handling Accountability in Electronic Health Records
title_sort enhancing transaction security for handling accountability in electronic health records
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description Electronic healthcare systems have received extensive attention during the last decade due to the advancement of digital technology. Using these systems in the healthcare industry can improve the quality of healthcare services tremendously. However, a major issue that needs to be concerned, when utilizing this kind of system, is accountability. Employments of electronic health records, the core of the systems, without accountability can be a big risk to both patients and service personals and, consequently, to the entire society. Accountability in electronic health records is essential to creating trust among parties. Many researchers have been introduced to the accountability protocol. However, most of them still lack some essential security property that is mutual authentication. This leads to both information traceability and nonrepudiation which are necessary for resolving any conflict that may arise. In this paper, we propose accountability protocol for electronic health records; the protocol employs both asymmetric and symmetric encryptions to ensure that the electronic health records are having confidentiality, integrity, authentication, and authorization. The accountability analysis and performance analysis show that the proposed protocol is more capable and effective than others. The novel aspect of this idea lies in the inclusion of certain forms of security that are necessary to protect the patient’s electronic health records. To the best of our knowledge, the proposed protocol consumes less cost, energy, and time compared with the existing protocols. A proof of concept of our protocol is also presented in this paper by using BAN logic, an automated security protocol proof tool named Scyther, and AVISPA
url http://dx.doi.org/10.1155/2020/8899409
work_keys_str_mv AT chiantechapanupreed enhancingtransactionsecurityforhandlingaccountabilityinelectronichealthrecords
AT werasakkurutach enhancingtransactionsecurityforhandlingaccountabilityinelectronichealthrecords
_version_ 1715454752539541504