A lightweight and robust authentication scheme for the healthcare system using public cloud server

被引:4
|
作者
Abbasi, Irshad Ahmed [1 ,2 ]
Jan, Saeed Ullah [3 ]
Alqahtani, Abdulrahman Saad [4 ]
Khan, Adnan Shahid [2 ]
Algarni, Fahad [4 ]
机构
[1] Univ Bisha, Coll Sci & Arts Belqarn, Dept Comp Sci, Sabtul Alaya, Saudi Arabia
[2] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan, Malaysia
[3] Govt Coll Wari Dir Upper, Higher Educ Dept Khyber Pakhtunkhwa, Wari, Khyber Pakhtunk, Pakistan
[4] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci, Bisha, Saudi Arabia
来源
PLOS ONE | 2024年 / 19卷 / 01期
关键词
3-FACTOR USER AUTHENTICATION; EFFICIENT; MODEL; ENCRYPTION; BLOCKCHAIN; FRAMEWORK; NETWORKS; SECURITY;
D O I
10.1371/journal.pone.0294429
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary can easily enter the server to access sensitive information, especially for the healthcare industry, which offers services to patients, researchers, labs, and hospitals in a flexible way with minimal operational costs. It is challenging to make it a reliable system and ensure the privacy and security of a cloud-enabled healthcare system. In this regard, numerous security mechanisms have been proposed in past decades. These protocols either suffer from replay attacks, are completed in three to four round trips or have maximum computation, which means the security doesn't balance with performance. Thus, this work uses a fuzzy extractor method to propose a robust security method for a cloud-enabled healthcare system based on Elliptic Curve Cryptography (ECC). The proposed scheme's security analysis has been examined formally with BAN logic, ROM and ProVerif and informally using pragmatic illustration and different attacks' discussions. The proposed security mechanism is analyzed in terms of communication and computation costs. Upon comparing the proposed protocol with prior work, it has been demonstrated that our scheme is 33.91% better in communication costs and 35.39% superior to its competitors in computation costs.
引用
收藏
页数:27
相关论文
共 50 条
  • [21] A lightweight anonymous authentication scheme for secure cloud computing services
    Hammami, Hamza
    Ben Yahia, Sadok
    Obaidat, Mohammad S.
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (02): : 1693 - 1713
  • [22] An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data
    Hammami, Hamza
    Obaidat, Mohammad S.
    Ben Yahia, Sadok
    PROCEEDINGS OF THE 17TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (SECRYPT), VOL 1, 2020, : 110 - 117
  • [23] A lightweight anonymous authentication scheme for secure cloud computing services
    Hamza Hammami
    Sadok Ben Yahia
    Mohammad S. Obaidat
    The Journal of Supercomputing, 2021, 77 : 1693 - 1713
  • [24] A lightweight authentication scheme for cloud-centric IoT applications
    Sahoo, Sampa
    Sahoo, Shreeya Swagatika
    Maiti, Prasenjit
    Sahoo, Bibhudatta
    Turuk, Ashok Kumar
    2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 1024 - 1029
  • [25] A Lightweight Authentication Scheme for Transport System Farecards
    Yang, Mee Loong
    Narayanan, Ajit
    Parry, Dave
    Wang, Xiumin
    2016 IEEE INTERNATIONAL CONFERENCE ON RFID TECHNOLOGY AND APPLICATIONS (RFID-TA), 2016, : 150 - 155
  • [26] Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments
    Gaba, Gurjot Singh
    Kumar, Gulshan
    Monga, Himanshu
    Kim, Tai-Hoon
    Kumar, Pardeep
    IEEE ACCESS, 2020, 8 : 69722 - 69733
  • [27] A Multi Server Storage Authentication System for Cloud Computing
    Fathima, X. P. Ajitha Baby
    Shaji, R. S.
    Jayan, J. P.
    Joe, M. Milton
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1034 - 1038
  • [28] Server-Less Lightweight Authentication Protocol for RFID System
    Li, Jing
    Zhou, Zhiping
    Wang, Ping
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 305 - 314
  • [29] A User Authentication Scheme on Multi-Server Environments for Cloud Computing
    Yang, Jen-Ho
    Chang, Ya-Fen
    Huang, Chih-Cheng
    2013 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATIONS AND SIGNAL PROCESSING (ICICS), 2013,
  • [30] A Lightweight Authentication Scheme for RFID Using ECC
    Kumar, Atul
    Jain, Ankit Kumar
    4TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND CONNECTED TECHNOLOGIES (ICIOTCT), 2019: INTERNET OF THINGS AND CONNECTED TECHNOLOGIES, 2020, 1122 : 177 - 183