[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3386392.3399564acmconferencesArticle/Chapter ViewAbstractPublication PagesumapConference Proceedingsconference-collections
short-paper

Design and Development of a Patient-centric User Authentication System

Published: 13 July 2020 Publication History

Abstract

Advancements in computer and communication technology enabled the rapid growth of e-health services, which can nowadays provide various electronic methods (e.g., obtaining online consent, exchanging health data). In this context, user authentication is an essential security task within modern healthcare systems performed daily by millions of patients across the globe. Nevertheless, most e-health service providers often employ traditional text-based password solutions which result in increased cognitive load and often lead to poor usability and security. In this paper, we present the design and development of a patient-centric user authentication system, which offers a flexible, personalized and multi-factor user authentication solution to patients. The suggested solution is currently being implemented and evaluated within the EU Serums project - Securing Medical Data in Smart Patient-Centric Healthcare Systems, which is a research project supported by the European Commission (EC) under the Horizon 2020 Framework Programme (H2020).

Supplementary Material

VTT File (3386392.3399564.vtt)
MP4 File (3386392.3399564.mp4)
Supplemental Video

References

[1]
Okoh, E., & Awad, A.I. 2015. "Biometrics applications in e-health security: A preliminary survey." In International Conference on Health Information Science, pp. 92--103. Springer.
[2]
Li, Y., Xie, M., & Bian, J. 2014. "USign-A security enhanced electronic consent model." In 2014 36th International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 4487--4490. IEEE.
[3]
Kogetsu, A., Ogishima, S., & Kato, K. 2018. "Authentication of Patients and Participants in Health Information Exchange and Consent for Medical Research: A Key Step for Privacy Protection, Respect for Autonomy, and Trustworthiness." Frontiers in genetics 9.
[4]
Marohn, D. 2006. "Biometrics in healthcare." Biometric Technology Today 14, no. 9: 9--11.
[5]
Krawczyk, S., & Jain, A.K. 2005. Securing electronic medical records using biometric authentication. In 5th international conference on Audio- and Video-Based Biometric Person Authentication, (AVBPA'05). pp. 1110--1119. Springer.
[6]
Silva, H., Loureno, A., Fred, A., & Filipe, J. 2011. Clinical data privacy and customization via biometrics based on ECG signals. In Holzinger, A., Simonic, K.M. (eds.) Information Quality in e-Health, 7058, 121--132. Springer.
[7]
Modi, S.K. 2011. Biometrics in identity management: Concepts to applications. Artech House.
[8]
Personalised Centralized Authentication System - PCAS. 7th Framework Programme for Research and Technological Development, Grant Agreement #610713. Available online: https://cordis.europa.eu/project/rcn/110720/factsheet/en
[9]
(ultra)Sound Interfaces and Low Energy iNtegrated SEnsors -- SILENSE. Horizon 2020, Grant Agreement #737487. Available online: https://cordis.europa.eu/project/rcn/210803/factsheet/en
[10]
Belk, M., Fidas, C., & Pitsillides, A. 2019. FlexPass: Symbiosis of seamless user authentication schemes in IoT. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA '19), ACM Press, 1--6.
[11]
Constantinides, A., Belk, M., Fidas, C., & Samaras, G. 2018. On Cultural- centered Graphical Passwords: Leveraging on Users' Cultural Experiences for Improving Password Memorability. In Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization (UMAP '18). ACM Press, 245--249.
[12]
Constantinides, A., Belk, M., Fidas, C., & Samaras, G. 2018. On Sociocultural-centered Graphical Passwords: An Initial Framework. In Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services Adjunct (MobileHCI '18). ACM Press, 277--284.
[13]
Constantinides, A., Belk, M., Fidas, C., & Pitsillides, A. 2019. On the accuracy of eye gaze-driven classifiers for predicting image content familiarity in graphical passwords. In Proceedings of the 27th ACM Conference on User Modeling, Adaptation and Personalization (UMAP '19). ACM Press, 201--205
[14]
Diomedous, C., & Athanasopoulos, E. 2019. Practical Password Hardening Based on TLS. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 441--460). Springer.
[15]
Tulving, E. 1972. Episodic and semantic memory. Organization of memory, 1, 381--403.
[16]
Win, K.T., Susilo, W., & Mu, Y. 2006. Personal Health Record Systems and Their Security Protection. Journal of Medical Systems, 30 (4), 309--315.
[17]
Santangelo, J., Christly, J., Sehgal, S., Venkat, C., & Wyrick, B. 2016. Two-Factor Authentication and Digital Identity Management in Healthcare. Research Report by Healthcare Informatics & Institute for Health Technology Transformation.
[18]
Secure Cloud Identity Wallet -- CREDENTIAL. Horizon 2020, Grant Agreement #653454. Available online: https://cordis.europa.eu/project/rcn/194869/factsheet/en
[19]
(ultra)Sound Interfaces and Low Energy iNtegrated SEnsors -- SILENSE. Horizon 2020, Grant Agreement #737487. Available online: https://cordis.europa.eu/project/rcn/210803/factsheet/en
[20]
Securing Medical Data in Smart Patient-Centric Healthcare Systems -- SERUMS. Horizon 2020, Grant Agreement #826278. Available online: https://cordis.europa.eu/project/id/826278
[21]
Constantinides, A., Fidas, C., Belk, M., & Pitsillides, A. 2019. "I Recall this Picture": Understanding Picture Password Selections based on Users' Sociocultural Experiences. In IEEE/WIC/ACM International Conference on Web Intelligence (WI '19). ACM Press, 408--412.
[22]
Constantinides, A., Belk, M., Fidas, C., & Pitsillides, A. 2020. An eye gaze-driven metric for estimating the strength of graphical passwords based on image hotspots. In Proceedings of the 25th International Conference on Intelligent User Interfaces (IUI '20). ACM Press, 33--37.
[23]
Constantinides, A., Pietron, A., Belk, M., Fidas, C., Han, T., & Pitsillides, A. 2020. A Cross-cultural Perspective for Personalizing Picture Passwords. In Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization (UMAP '20). ACM Press. (to appear)
[24]
Janjic, V., Bowles, J.K.F., Vermeulen, A. F., Silvina, A., Belk, M., Fidas, C., Pitsillides, A., Kumar, M., Rossborry, M., Vinov, M., Given-Wilson, T., Legay, A., Blackledge, E., Arredouani, R., Stylianou, G., Huang, W. (2019). The SERUMS tool-chain: ensuring security and privacy of medical data in smart patient-centric healthcare systems. IEEE Big Data, IEEE Press, 2726--2735

Cited By

View all
  • (2022)Security and Usability of a Personalized User Authentication Paradigm: Insights from a Longitudinal Study with Three Healthcare OrganizationsACM Transactions on Computing for Healthcare10.1145/35646104:1(1-40)Online publication date: 12-Oct-2022
  • (2022)Model-Based Security Assessment on the Design of a Patient-Centric Data Sharing PlatformFrom Data to Models and Back10.1007/978-3-031-16011-0_5(61-77)Online publication date: 15-Oct-2022
  • (2021)On the Benefits and Security Risks of a User-Centric Data Sharing Platform for Healthcare ProvisionAdjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization10.1145/3450614.3464473(351-356)Online publication date: 21-Jun-2021
  • Show More Cited By

Index Terms

  1. Design and Development of a Patient-centric User Authentication System

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      UMAP '20 Adjunct: Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation and Personalization
      July 2020
      395 pages
      ISBN:9781450379502
      DOI:10.1145/3386392
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 13 July 2020

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. cued-recall graphical passwords
      2. healthcare system
      3. patient-centric
      4. security
      5. usability
      6. user authentication

      Qualifiers

      • Short-paper

      Funding Sources

      Conference

      UMAP '20
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 162 of 633 submissions, 26%

      Upcoming Conference

      UMAP '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)27
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Security and Usability of a Personalized User Authentication Paradigm: Insights from a Longitudinal Study with Three Healthcare OrganizationsACM Transactions on Computing for Healthcare10.1145/35646104:1(1-40)Online publication date: 12-Oct-2022
      • (2022)Model-Based Security Assessment on the Design of a Patient-Centric Data Sharing PlatformFrom Data to Models and Back10.1007/978-3-031-16011-0_5(61-77)Online publication date: 15-Oct-2022
      • (2021)On the Benefits and Security Risks of a User-Centric Data Sharing Platform for Healthcare ProvisionAdjunct Proceedings of the 29th ACM Conference on User Modeling, Adaptation and Personalization10.1145/3450614.3464473(351-356)Online publication date: 21-Jun-2021
      • (2021)Conflict-Free Access Rules for Sharing Smart Patient Health RecordsRules and Reasoning10.1007/978-3-030-91167-6_3(33-47)Online publication date: 8-Sep-2021
      • (2021)Design of a Trustworthy and Resilient Data Sharing Platform for Healthcare ProvisionDependable Computing - EDCC 2021 Workshops10.1007/978-3-030-86507-8_14(144-151)Online publication date: 8-Sep-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media