Two-Factor Authentication Mechanism for Accessing Health Data
Abstract:
One of the challenges of mobile health is to provide a way of maintaining privacy in the access to the data. Especially, when using ICT for providing access to health ser...Show MoreMetadata
Abstract:
One of the challenges of mobile health is to provide a way of maintaining privacy in the access to the data. Especially, when using ICT for providing access to health services and information. In these scenarios, it is essential to determine and verify the identity of users to ensure the security of the network. A way of authenticating the identity of each patient, doctor or any stakeholder involved in the process is to use a software application that analyzes the face of them through the cams integrated in their devices. The selection of an appropriate facial authentication software application requires a fair comparison between alternatives through a common database of face images. Users usually carry out authentication with variations in their aspects while accessing to health services. This paper presents both 1) a database of facial images that combines the most common variations that can happen in the participants and 2) an algorithm that establishes different levels of access to the data based on data sensitivity levels and the accuracy of the authentication.
Two-Factor Authentication Mechanism for Accessing Health Data
Published in: IEEE Access ( Volume: 5)
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Authentication Process ,
- Health Services ,
- Software Applications ,
- Face Images ,
- Image Database ,
- Different Levels Of Access ,
- Facial Expressions ,
- Level Of Accuracy ,
- Health Data ,
- Expression Of Type ,
- Cybersecurity ,
- Kinds Of Data ,
- Security Level ,
- T-distributed Stochastic Neighbor Embedding ,
- Denial Of Service ,
- User Access ,
- Light Type ,
- Security Model ,
- Face Database ,
- Man-in-the-middle ,
- Session Key ,
- Biometric Systems ,
- Kinds Of Attacks ,
- Left Rotation ,
- Right Rotation ,
- Authentication System ,
- Part Of The Solution ,
- Sunglasses ,
- Biometric Identification ,
- Data Privacy
- Author Keywords
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Authentication Process ,
- Health Services ,
- Software Applications ,
- Face Images ,
- Image Database ,
- Different Levels Of Access ,
- Facial Expressions ,
- Level Of Accuracy ,
- Health Data ,
- Expression Of Type ,
- Cybersecurity ,
- Kinds Of Data ,
- Security Level ,
- T-distributed Stochastic Neighbor Embedding ,
- Denial Of Service ,
- User Access ,
- Light Type ,
- Security Model ,
- Face Database ,
- Man-in-the-middle ,
- Session Key ,
- Biometric Systems ,
- Kinds Of Attacks ,
- Left Rotation ,
- Right Rotation ,
- Authentication System ,
- Part Of The Solution ,
- Sunglasses ,
- Biometric Identification ,
- Data Privacy
- Author Keywords