Design flaws in a secure medical data exchange protocol based on cloud environments

8Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the growing popularity of network technologies, cloud-based health care applications are becoming an essential part of telecare medical information systems have been widely studied in recent years. To protect patient privacy and restrict the access of precious services for legal privileged participants only, many secure medical data exchange protocols have been widely utilized for various service-oriented medical systems. In 2014, Chen et al. proposed a secure medical data exchange protocol based on cloud environments. They claimed that their protocol achieves better security as compared to those for other existing medical-oriented systems. However, in this paper, we found that Chen et al.’s data exchange protocol has two functional weaknesses such as (1) it fails to provide real-time monitoring service, (2) it has two design flaws in doctor treatment phase and is not easily reparable.

Cite

CITATION STYLE

APA

Li, C. T., Lee, C. C., Wang, C. C., Yang, T. H., & Chen, S. J. (2015). Design flaws in a secure medical data exchange protocol based on cloud environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9532, pp. 435–444). Springer Verlag. https://doi.org/10.1007/978-3-319-27161-3_39

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free