Title
Cryptographic security models for eHealth P2P database management systems network
Abstract
In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between two peers is insecure and peers create a temporary session while exchanging data. When peers exchange highly confidential data in an eHealth network over an insecure communication link, the data might be tampered with or trapped and disclosed by intruders, which is a serious offence for the clients of an eHealth P2PDBMS. As there is no centralized control for data exchange in eHealth P2PDBMS, it is infeasible to assume a centralized third party security infrastructure to protect confidential data. So far, there is currently no available/existing security protocol for secured data exchange in eHealth P2PDBMS. In this paper we propose three models for secure data exchange in eHealth P2PDBMSs and the corresponding security protocols. The proposed protocol allows the peers to compute their secret session keys dynamically during data exchange based on the policies between them. Our proposed protocol is robust against the man-in-the middle attack, the masquerade attack, and the replay attack.
Year
DOI
Venue
2011
10.1109/PST.2011.5971979
Privacy, Security and Trust
Keywords
Field
DocType
biomedical communication,cryptographic protocols,database management systems,medical information systems,peer-to-peer computing,centralized third party security infrastructure,confidential data protection,cryptographic security models,eHealth P2P database management systems network,eHealth P2PDBMS,eHealth peer-to-peer database management system,insecure communication link,man-in-the middle attack,masquerade attack,replay attack,secret session keys,secure data exchange,security protocols,Data Security and Authentication,Pairing-based Cryptography,Secure Data Exchange,eHealth P2P Database Management Systems
Internet privacy,Man-in-the-middle attack,Authentication,Data exchange,Cryptographic protocol,Computer security,Computer science,Cryptography,eHealth,Replay attack,Database,Computer security model
Conference
ISSN
ISBN
Citations 
1712-364X
978-1-4577-0582-3
6
PageRank 
References 
Authors
0.43
10
7
Name
Order
Citations
PageRank
Sk. Md. Mizanur Rahman116114.41
Md. Mehedi Masud2284.01
Carlisle Adams332333.30
Khalil El-Khatib429430.15
Hussein T. Mouftah51658189.60
eiji okamoto61009118.60
El-Khatib, K.760.76