A secure authentication scheme of health care based on the cloud

被引:0
|
作者
Chen, Chin-Ling [1 ]
Yang, Tsai-Tung [1 ]
Leu, Fang-Yie [2 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
关键词
cloud; health care; session key; mobile device; security; SMART CARDS; INFORMATION-SYSTEMS; IMPROVEMENT; EFFICIENT; CRYPTANALYSIS; MEDICINE;
D O I
10.1109/IMIS.2014.72
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.
引用
收藏
页码:499 / 504
页数:6
相关论文
共 50 条
  • [1] Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey
    Rajasekar, Vani
    Jayapaul, Premalatha
    Krishnamoorthi, Sathya
    Saracevic, Muzafer
    ACTA POLYTECHNICA HUNGARICA, 2021, 18 (03) : 87 - 106
  • [2] An efficient secure authentication on cloud based e-health care system in WBAN
    Rani, A. Antony Viswasa
    Baburaj, E.
    BIOMEDICAL RESEARCH-INDIA, 2016, 27 : S53 - S59
  • [3] Secure authentication scheme for IoT and cloud servers
    Department of Computer Science and Engineering, Guru Nanak Dev University, Regional Campus, Jalandhar
    Punjab
    144001, India
    不详
    Punjab
    143521, India
    Pervasive Mob. Comput., (210-223):
  • [4] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    Pervasive and Mobile Computing, 2015, 24 : 210 - 223
  • [5] Secure authentication scheme for IoT and cloud servers
    Kalra, Sheetal
    Sood, Sandeep K.
    PERVASIVE AND MOBILE COMPUTING, 2015, 24 : 210 - 223
  • [6] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [7] A new secure authentication scheme for cloud computing environment
    Namasudra, Suyel
    Roy, Pinki
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (20):
  • [8] Notes on "Secure authentication scheme for IoT and cloud servers"
    Chang, Chin-Chen
    Wu, Hsiao-Ling
    Sun, Chin-Yu
    PERVASIVE AND MOBILE COMPUTING, 2017, 38 : 275 - 278
  • [9] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [10] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment
    Raju, K.
    Chinnadurai, M.
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072