A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System

被引:71
|
作者
Mohit, Prerna [1 ]
Amin, Ruhul [2 ]
Karati, Arijit [1 ]
Biswas, G. P. [1 ]
Khan, Muhammad Khurram [3 ]
机构
[1] Indian Inst Technol ISM, Dept Comp Sci & Engn, Dhanbad 826004, Jharkhand, India
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
关键词
Anonymity; Signature; Cloud database; TMIS; KEY AGREEMENT SCHEME; USER AUTHENTICATION; CRYPTANALYSIS;
D O I
10.1007/s10916-017-0699-2
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Cyclic group based mutual authentication protocol for RFID system
    Pramod Kumar Maurya
    Satya Bagchi
    [J]. Wireless Networks, 2020, 26 : 1005 - 1015
  • [22] IMPLEMENTATION OF CLOUD COMPUTING IN THE HEALTH CARE SYSTEM
    Vujin, Vladimir
    Milenkovic, Marina Jovanovic
    [J]. METALURGIA INTERNATIONAL, 2012, 17 (09): : 161 - 165
  • [23] Qubits based mutual authentication protocol
    Nema, Prashant
    Nene, Manisha J.
    [J]. SECURITY AND PRIVACY, 2022, 5 (03)
  • [24] DACSC: Secure Authentication Protocol Based on Dynamic Authentication Credentials and IntelSGX in Cloud Computing Environments
    Ni, Lina
    Ni, Boguang
    Tang, Yuncan
    Zhang, Jinquan
    [J]. Journal of Network Intelligence, 2023, 8 (03): : 948 - 964
  • [25] A Signature-Based Mutual Authentication Protocol for Remote Health Monitoring
    Binu S.
    Misbahuddin M.
    Paulose J.
    [J]. SN Computer Science, 2020, 1 (1)
  • [26] A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing
    Hao, Z.
    Zhong, S.
    Yu, N.
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2011, 6 (02) : 227 - 235
  • [27] A secure authentication scheme of health care based on the cloud
    Chen, Chin-Ling
    Yang, Tsai-Tung
    Leu, Fang-Yie
    [J]. 2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 499 - 504
  • [28] A Lightweight Authentication and Communication Protocol in Vehicular Cloud Computing
    Vasudev, Harsha
    Das, Debasis
    [J]. 33RD INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2019), 2019, : 72 - 77
  • [29] Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing
    Ahmed, Abdulghani Ali
    Wendy, Kwan
    Kabir, Muhammad Nomani
    Sadiq, Ali Safaa
    [J]. IEEE SYSTEMS JOURNAL, 2021, 15 (01): : 727 - 737
  • [30] Certificateless Anonymous User Authentication Protocol for Cloud Computing
    Zhang, Manjun
    Zhang, Yan
    [J]. 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT TRANSPORTATION, BIG DATA AND SMART CITY (ICITBS), 2016, : 200 - 203