A lightweight and robust authentication scheme for the healthcare system using public cloud server

被引:4
作者
Abbasi, Irshad Ahmed [1 ,2 ]
Jan, Saeed Ullah [3 ]
Alqahtani, Abdulrahman Saad [4 ]
Khan, Adnan Shahid [2 ]
Algarni, Fahad [4 ]
机构
[1] Univ Bisha, Coll Sci & Arts Belqarn, Dept Comp Sci, Sabtul Alaya, Saudi Arabia
[2] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan, Malaysia
[3] Govt Coll Wari Dir Upper, Higher Educ Dept Khyber Pakhtunkhwa, Wari, Khyber Pakhtunk, Pakistan
[4] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci, Bisha, Saudi Arabia
来源
PLOS ONE | 2024年 / 19卷 / 01期
关键词
3-FACTOR USER AUTHENTICATION; EFFICIENT; MODEL; ENCRYPTION; BLOCKCHAIN; FRAMEWORK; NETWORKS; SECURITY;
D O I
10.1371/journal.pone.0294429
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary can easily enter the server to access sensitive information, especially for the healthcare industry, which offers services to patients, researchers, labs, and hospitals in a flexible way with minimal operational costs. It is challenging to make it a reliable system and ensure the privacy and security of a cloud-enabled healthcare system. In this regard, numerous security mechanisms have been proposed in past decades. These protocols either suffer from replay attacks, are completed in three to four round trips or have maximum computation, which means the security doesn't balance with performance. Thus, this work uses a fuzzy extractor method to propose a robust security method for a cloud-enabled healthcare system based on Elliptic Curve Cryptography (ECC). The proposed scheme's security analysis has been examined formally with BAN logic, ROM and ProVerif and informally using pragmatic illustration and different attacks' discussions. The proposed security mechanism is analyzed in terms of communication and computation costs. Upon comparing the proposed protocol with prior work, it has been demonstrated that our scheme is 33.91% better in communication costs and 35.39% superior to its competitors in computation costs.
引用
收藏
页数:27
相关论文
共 47 条
  • [1] Health Fog: a novel framework for health and wellness applications
    Ahmad, Mahmood
    Amin, Muhammad Bilal
    Hussain, Shujaat
    Kang, Byeong Ho
    Cheong, Taechoong
    Lee, Sungyoung
    [J]. JOURNAL OF SUPERCOMPUTING, 2016, 72 (10) : 3677 - 3695
  • [2] Lightweight Secure Message Delivery for E2E S2S Communication in the IoT-Cloud System
    Al Sibahee, Mustafa A.
    Lu, Songfeng
    Abduljabbar, Zaid Ameen
    Liu, Xin
    Abdalla, Hemn Barzan
    Hussain, Mohammed Abdulridha
    Hussien, Zaid Alaa
    Jassim Ghrabat, Mudhafar Jalil
    [J]. IEEE ACCESS, 2020, 8 : 218331 - 218347
  • [3] New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT
    Azrour, Mourade
    Mabrouki, Jamal
    Chaganti, Rajasekhar
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [4] Morton Filter-Based Security Mechanism for Healthcare System in Cloud Computing
    Bhatia, Sugandh
    Malhotra, Jyoteesh
    [J]. HEALTHCARE, 2021, 9 (11)
  • [5] Blanchet B., 2018, Version from, V16, P05
  • [6] Boyd C., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P240
  • [7] Reusable Fuzzy Extractors for Low-Entropy Distributions
    Canetti, Ran
    Fuller, Benjamin
    Paneth, Omer
    Reyzin, Leonid
    Smith, Adam
    [J]. JOURNAL OF CRYPTOLOGY, 2021, 34 (01)
  • [8] An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks
    Challa, Sravani
    Das, Ashok Kumar
    Odelu, Vanga
    Kumar, Neeraj
    Kumari, Saru
    Khan, Muhammad Khurram
    Vasilakos, Athanasios V.
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2018, 69 : 534 - 554
  • [9] Blockchain based searchable encryption for electronic health record sharing
    Chen, Lanxiang
    Lee, Wai-Kong
    Chang, Chin-Chen
    Choo, Kim-Kwang Raymond
    Zhang, Nan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 (420-429): : 420 - 429
  • [10] An Improved Three-Factor User Authentication and Key Agreement Scheme for Wireless Medical Sensor Networks
    Chen, Ying
    Ge, Yangming
    Wang, Yerong
    Zeng, Zhuang
    [J]. IEEE ACCESS, 2019, 7 : 85440 - 85451