A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange

被引:8
|
作者
Singh, B. Mohinder [1 ]
Natarajan, Jaisankar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamilnadu, India
关键词
Authentication protocol; eHealth records; Post -quantum crypto algorithm; Symmetric crypto-algorithm; Asymmetric crypto-algorithm; Minimized key exchange; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; HEALTH-CARE;
D O I
10.1016/j.jksuci.2023.101629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wake of covid19, many countries are shifting their paper-based health record management from manual processes to digital ones. The major benefit of digital health record is that data can be easily shared. As health data is sensitive, more security is to be provided to gain the trust of stakeholders. In this paper, a novel secure authentication protocol is planned for digitalizing personal health record that will be used by the user. While transacting data, a key is used to secure it. Many protocols used elliptic curve cryptography. In this proposed protocol, at an initial stage, an asymmetric and quantum-resistant cryptoalgorithm, Kyber is used. In further stages, symmetric crypto-algorithm, Advanced Encryption Standard in Galois/Counter mode (AES-GCM) is used to secure transferred data. For every session, a new key is generated for secure transactions. The more interesting fact in this protocol is that transactions are secured without exchanging actual key and also minimized the key exchange. This protocol not only verified the authenticity of user but also checked rightful citizenship of user. This protocol is analyzed for various security traits using ProVerif tool and provided better results relating to security provisioning, cost of storage, and computation as opposed to related protocols.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [11] A Secure Key Exchange and Authentication Scheme for Securing Communications in the Internet of Things Environment
    Peivandizadeh, Ali
    Adarbah, Haitham Y.
    Molavi, Behzad
    Mohajerzadeh, Amirhossein
    Al-Badi, Ali H.
    FUTURE INTERNET, 2024, 16 (10)
  • [12] A Provably Secure Anonymous Two-Factor Authenticated Key Exchange Protocol for Cloud Computing
    Wei, Fushan
    Zhang, Ruijie
    Ma, Chuangui
    FUNDAMENTA INFORMATICAE, 2018, 157 (1-2) : 201 - 220
  • [13] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System
    Li, Xuanang
    Zheng, Zhiming
    Zhang, Xiao
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281
  • [14] An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
    Tomar, Ashish
    Dhar, Joydip
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (01) : 351 - 372
  • [15] An Efficient Two-Server Authentication and Key Exchange Protocol
    Chattaraj, Durbadal
    Sarma, Monalisa
    Samanta, Debasis
    2017 INTERNATIONAL CONFERENCE ON NEW TRENDS IN COMPUTING SCIENCES (ICTCS), 2017, : 127 - 132
  • [16] Combining Steganography and Biometric Cryptosystems for Secure Mutual Authentication and Key Exchange
    Al-Assam, Hisham
    Rashid, Rasber
    Jassim, Sabah
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 369 - 374
  • [17] An ECC Based Secure Authentication and Key Exchange Scheme in Multi-server Environment
    Ashish Tomar
    Joydip Dhar
    Wireless Personal Communications, 2019, 107 : 351 - 372
  • [18] A secure biometrics-based authentication key exchange protocol for multi-server TMIS using ECC
    Qi, Mingping
    Chen, Jianhua
    Chen, Yitao
    COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2018, 164 : 101 - 109
  • [19] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Karuppiah, Marimuthu
    Das, Ashok Kumar
    Li, Xiong
    Kumari, Saru
    Wu, Fan
    Chaudhry, Shehzad Ashraf
    Niranchana, R.
    MOBILE NETWORKS & APPLICATIONS, 2019, 24 (03) : 1046 - 1062
  • [20] Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
    Marimuthu Karuppiah
    Ashok Kumar Das
    Xiong Li
    Saru Kumari
    Fan Wu
    Shehzad Ashraf Chaudhry
    R. Niranchana
    Mobile Networks and Applications, 2019, 24 : 1046 - 1062