An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing

被引:0
|
作者
Vinod Kumar
Srinivas Jangirala
Musheer Ahmad
机构
[1] Jamia Millia Islamia,Department of Applied Sciences and Humanities, Faculty of Engineering and Technology
[2] Indian Institute of Technology Kharagpur,Department of Mathematics
来源
关键词
Cloud computing; TMIS; Mutual authentication; Signature; Medical data;
D O I
暂无
中图分类号
学科分类号
摘要
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.’s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
引用
收藏
相关论文
共 50 条
  • [1] An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing
    Kumar, Vinod
    Jangirala, Srinivas
    Ahmad, Musheer
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (08)
  • [2] Mutual authentication framework using fog computing in healthcare
    Sunakshi Singh
    Vijay Kumar Chaurasiya
    [J]. Multimedia Tools and Applications, 2022, 81 : 31977 - 32003
  • [3] Mutual authentication framework using fog computing in healthcare
    Singh, Sunakshi
    Chaurasiya, Vijay Kumar
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (22) : 31977 - 32003
  • [4] The Framework for Efficient Passphrase-based Multifactor Authentication in Cloud Computing
    Rehman, Faisal
    Akram, Sana
    Shah, Munam Ali
    [J]. 2016 22ND INTERNATIONAL CONFERENCE ON AUTOMATION AND COMPUTING (ICAC), 2016, : 37 - 41
  • [5] A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System
    Prerna Mohit
    Ruhul Amin
    Arijit Karati
    G. P. Biswas
    Muhammad Khurram Khan
    [J]. Journal of Medical Systems, 2017, 41
  • [6] A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System
    Mohit, Prerna
    Amin, Ruhul
    Karati, Arijit
    Biswas, G. P.
    Khan, Muhammad Khurram
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2017, 41 (04)
  • [7] Mutual Authentication for Mobile Cloud Computing: Review and Suggestion
    Ahmed, Abdulghani Ali
    Wendy, Kwan
    [J]. 2017 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS), 2017, : 75 - 80
  • [8] AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
    Dey, Saurabh
    Ye, Qiang
    Sampalli, Srinivas
    [J]. IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 700 - 705
  • [9] A Robust Pairing-Free ID-Based Mutual Authentication Framework for Cloud Computing
    Sarvabhatla, Mrudula
    Reddy, M. ChandraMouli
    Vorugunti, Chandra Sekhar
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 366 - 370
  • [10] A framework for authentication and authorization credentials in cloud computing
    Gonzalez, Nelson Mimura
    Torrez Rojas, Marco Antonio
    Maciel da Silva, Marcos Vinicius
    Redigolo, Fernando
    Melo de Brito Carvalho, Tereza Cristina
    Miers, Charles Christian
    Naeslund, Mats
    Ahmed, Abu Shohel
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 509 - 516