A Multifactor Ring Signature based Authentication Scheme forQuality Assessment of IoMT Environment in COVID-19 Scenario

被引:3
作者
Chatterjee, Kakali [1 ]
Singh, Ashish [2 ]
Neha [1 ]
Yu, Keping [3 ]
机构
[1] Natl Inst Technol Patna, Dept CSE, Patna 800005, Bihar, India
[2] KIIT Univ, Sch Comp Engn, Bhubaneswar 751024, India
[3] Hosei Univ, Grad Sch Sci & Engn, Tokyo 1848584, Japan
来源
ACM JOURNAL OF DATA AND INFORMATION QUALITY | 2023年 / 15卷 / 02期
基金
日本学术振兴会;
关键词
Quality assessment; Internet of Medical Things; smart card; elliptic curve; mutual authentication; data security; ring signature; PUBLIC-KEY CRYPTOSYSTEM; USER AUTHENTICATION; SENSOR NETWORKS; AGREEMENT; INTERNET; IOT; PROTOCOL; ISSUES;
D O I
10.1145/3575811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The quality of the healthcare environment has become an essential factor for healthcare users to access quality services. Smart healthcare systems use the Internet of Medical Things (IoMT) devices to capture patients' health data for treatment or diagnostic purposes. This sensitive collected patient data is shared between the different stakeholders across the network to provide quality services. Due to this, healthcare systems are vulnerable to confidentiality, integrity and privacy threats. In the COVID-19 scenario, when collaborative medical consultation is required, the quality assessment of the framework is essential to protect the privacy of doctors and patients. In this paper, a ring signature-based anonymous authentication and quality assessment scheme is designed for collaborative medical consultation environments for quality assessment and protection of the privacy of doctors and patients. This scheme also uses a newKMOV Cryptosystem to ensure the quality of the network and protect the system from different attacks that hamper data confidentiality.
引用
收藏
页数:24
相关论文
共 71 条
  • [1] A secure light weight scheme for user authentication and key agreement in multi-gateway based wireless sensor networks
    Amin, Ruhul
    Biswas, G. P.
    [J]. AD HOC NETWORKS, 2016, 36 : 58 - 80
  • [2] [Anonymous], 2013, CSI T ICT
  • [3] Context-aware data quality assessment for big data
    Ardagna, Danilo
    Cappiello, Cinzia
    Sama, Walter
    Vitali, Monica
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 : 548 - 562
  • [4] Methodologies for Data Quality Assessment and Improvement
    Batini, Carlo
    Cappiello, Cinzia
    Francalanci, Chiara
    Maurino, Andrea
    [J]. ACM COMPUTING SURVEYS, 2009, 41 (03)
  • [5] A new public key cryptosystem based on Edwards curves
    Boudabra, Maher
    Nitaj, Abderrahmane
    [J]. JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2019, 61 (1-2) : 431 - 450
  • [6] A new generalization of the KMOV cryptosystem
    Boudabra, Maher
    Nitaj, Abderrahmane
    [J]. JOURNAL OF APPLIED MATHEMATICS AND COMPUTING, 2018, 57 (1-2) : 229 - 245
  • [7] Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
    Challa, Sravani
    Wazid, Mohammad
    Das, Ashok Kumar
    Kumar, Neeraj
    Reddy, Alavalapati Goutham
    Yoon, Eun-Jun
    Yoo, Kee-Young
    [J]. IEEE ACCESS, 2017, 5 : 3028 - 3043
  • [8] Challoner A., 2019, American Journal of Medical Research, V6, P13, DOI DOI 10.22381/AJMR6120192
  • [9] An Improved Authentication Protocol for Wireless Body Sensor Networks Applied in Healthcare Applications
    Chatterjee, Kakali
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2020, 111 (04) : 2605 - 2623
  • [10] Chatterjee Kakali, 2009, 2009 5 INT C WIRELES, P1