By Topic

Cryptographic security models for eHealth P2P database management systems network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

6 Author(s)
Rahman, S.M.M. ; Sch. of Inf. Technol. & Eng., Univ. of Ottawa, Ottawa, ON, Canada ; Masud, M.M. ; Adams, C. ; El-Khatib, K.
more authors

In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between two peers is insecure and peers create a temporary session while exchanging data. When peers exchange highly confidential data in an eHealth network over an insecure communication link, the data might be tampered with or trapped and disclosed by intruders, which is a serious offence for the clients of an eHealth P2PDBMS. As there is no centralized control for data exchange in eHealth P2PDBMS, it is infeasible to assume a centralized third party security infrastructure to protect confidential data. So far, there is currently no available/existing security protocol for secured data exchange in eHealth P2PDBMS. In this paper we propose three models for secure data exchange in eHealth P2PDBMSs and the corresponding security protocols. The proposed protocol allows the peers to compute their secret session keys dynamically during data exchange based on the policies between them. Our proposed protocol is robust against the man-in-the middle attack, the masquerade attack, and the replay attack.

Published in:

Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on

Date of Conference:

19-21 July 2011