A secure authentication scheme of health care based on the cloud

被引:0
|
作者
Chen, Chin-Ling [1 ]
Yang, Tsai-Tung [1 ]
Leu, Fang-Yie [2 ]
机构
[1] Chaoyang Univ Technol, Dept Comp Sci & Informat Engn, Taichung 41349, Taiwan
[2] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
关键词
cloud; health care; session key; mobile device; security; SMART CARDS; INFORMATION-SYSTEMS; IMPROVEMENT; EFFICIENT; CRYPTANALYSIS; MEDICINE;
D O I
10.1109/IMIS.2014.72
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, many researcher have devoted to use the known technologies to enhance the quality of the health care. The health care become an important issue. But their scheme also still has some flaws need to be improved. As the result, we propose a secure authentication scheme of health care based on the cloud. Our scheme can help the patient and the caregiver transmit the private health information via secure authentication. The caregiver need not always accompany the patient and can use the mobile device to monitor the patient's health care status. Our scheme can also avoid known attacks.
引用
收藏
页码:499 / 504
页数:6
相关论文
共 50 条
  • [21] Implementation of Secure Authentication Scheme and Access Control in Cloud Computing
    Pawar, Prativesh
    Sheikh, Rashid
    PROCEEDINGS OF 2016 INTERNATIONAL CONFERENCE ON ICT IN BUSINESS INDUSTRY & GOVERNMENT (ICTBIG), 2016,
  • [22] A SECURE AUTHENTICATION SCHEME FOR MOBILE CLOUD COMPUTING AGAINST CCA
    Hossain, Md Jakir
    Xu, Chunxiang
    Li, Chuang
    2020 17TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2020, : 266 - 270
  • [23] Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
    Cheng Hongbing
    Rong Chunming
    Tan Zhenghua
    Zeng Qingkai
    CHINESE JOURNAL OF ELECTRONICS, 2012, 21 (02): : 254 - 259
  • [24] SUAS: Scalable User Authentication Scheme for Secure Accessing to Cloud-Based Environments
    Moghaddam, Faraz Fatemi
    Ravan, Rama Roshan
    Khodadadi, Touraj
    Javadianasl, Yashar
    Halalzadeh, Abbasali
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [25] A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment
    Yu, Yicheng
    Hu, Liang
    Chu, Jianfeng
    SYMMETRY-BASEL, 2020, 12 (01):
  • [26] A more Multifactor Secure Authentication Scheme based on graphical authentication
    Joshi, Ashish
    Kumar, Sonu
    Goudar, R. H.
    2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING AND COMMUNICATIONS (ICACC), 2012, : 186 - 189
  • [27] A secure authentication scheme based on fuzzy extractor
    Zhang, Lihua
    Nie, Yaoping
    Computer Modelling and New Technologies, 2014, 18 (12): : 46 - 55
  • [28] A Lightweight and Secure Authentication Scheme for IoT Based E-Health Applications
    Almulhim, Maria
    Islam, Nazurl
    Zaman, Noor
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (01): : 107 - 120
  • [29] Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
    Chaudhary, Ajay
    Peddoju, Sateesh K.
    Chouhan, Vikas
    JOURNAL OF GRID COMPUTING, 2023, 21 (03)
  • [30] Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration
    Ajay Chaudhary
    Sateesh K Peddoju
    Vikas Chouhan
    Journal of Grid Computing, 2023, 21