A lightweight and robust authentication scheme for the healthcare system using public cloud server

被引:4
作者
Abbasi, Irshad Ahmed [1 ,2 ]
Jan, Saeed Ullah [3 ]
Alqahtani, Abdulrahman Saad [4 ]
Khan, Adnan Shahid [2 ]
Algarni, Fahad [4 ]
机构
[1] Univ Bisha, Coll Sci & Arts Belqarn, Dept Comp Sci, Sabtul Alaya, Saudi Arabia
[2] Univ Malaysia Sarawak, Fac Comp Sci & Informat Technol, Kota Samarahan, Malaysia
[3] Govt Coll Wari Dir Upper, Higher Educ Dept Khyber Pakhtunkhwa, Wari, Khyber Pakhtunk, Pakistan
[4] Univ Bisha, Coll Comp & Informat Technol, Dept Comp Sci, Bisha, Saudi Arabia
来源
PLOS ONE | 2024年 / 19卷 / 01期
关键词
3-FACTOR USER AUTHENTICATION; EFFICIENT; MODEL; ENCRYPTION; BLOCKCHAIN; FRAMEWORK; NETWORKS; SECURITY;
D O I
10.1371/journal.pone.0294429
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance severely threatens the whole system. A public cloud server is posed with numerous threats; an adversary can easily enter the server to access sensitive information, especially for the healthcare industry, which offers services to patients, researchers, labs, and hospitals in a flexible way with minimal operational costs. It is challenging to make it a reliable system and ensure the privacy and security of a cloud-enabled healthcare system. In this regard, numerous security mechanisms have been proposed in past decades. These protocols either suffer from replay attacks, are completed in three to four round trips or have maximum computation, which means the security doesn't balance with performance. Thus, this work uses a fuzzy extractor method to propose a robust security method for a cloud-enabled healthcare system based on Elliptic Curve Cryptography (ECC). The proposed scheme's security analysis has been examined formally with BAN logic, ROM and ProVerif and informally using pragmatic illustration and different attacks' discussions. The proposed security mechanism is analyzed in terms of communication and computation costs. Upon comparing the proposed protocol with prior work, it has been demonstrated that our scheme is 33.91% better in communication costs and 35.39% superior to its competitors in computation costs.
引用
收藏
页数:27
相关论文
共 47 条
  • [21] Lightweight Integrity Preserving Scheme for Secure Data Exchange in Cloud-Based IoT Systems
    Hussien, Zaid Alaa
    Abdulmalik, Husam. A. A.
    Hussain, Mohammed Abdulridha
    Nyangaresi, Vincent Omollo
    Ma, Junchao
    Abduljabbar, Zaid Ameen
    Abduljaleel, Iman Qays
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (02):
  • [22] Hussien ZA, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC)
  • [23] Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks
    Jan, Saeed Ullah
    Ali, Sikandar
    Abbasi, Irshad Ahmed
    Mosleh, Mogeeb A. A.
    Alsanad, Ahmed
    Khattak, Hizbullah
    [J]. JOURNAL OF HEALTHCARE ENGINEERING, 2021, 2021
  • [24] Heap Bucketization Anonymity-An Efficient Privacy-Preserving Data Publishing Model for Multiple Sensitive Attributes
    Jayapradha, J.
    Prakash, M.
    Alotaibi, Youseef
    Khalaf, Osamah Ibrahim
    Alghamdi, Saleh Ahmed
    [J]. IEEE ACCESS, 2022, 10 : 28773 - 28791
  • [25] Automated Segmentation of Lung Parenchyma Using Colour Based Fuzzy C-Means Clustering
    Khan, Z. Faizal
    [J]. JOURNAL OF ELECTRICAL ENGINEERING & TECHNOLOGY, 2019, 14 (05) : 2163 - 2169
  • [26] A Survey of SIP Authentication and Key Agreement Schemes
    Kilinc, H. Hakan
    Yanik, Tugrul
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02) : 1005 - 1023
  • [27] The random oracle model: a twenty-year retrospective
    Koblitz, Neal
    Menezes, Alfred J.
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (2-3) : 587 - 610
  • [28] Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data
    Li, Hongwei
    Yang, Yi
    Dai, Yuanshun
    Yu, Shui
    Xiang, Yong
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (02) : 484 - 494
  • [29] Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification
    Liu, Ximeng
    Lu, Rongxing
    Ma, Jianfeng
    Chen, Le
    Qin, Baodong
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2016, 20 (02) : 655 - 668
  • [30] Lubamba C, 2017, IEEE SYMP COMP COMMU, P105, DOI 10.1109/ISCC.2017.8024513