A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange

被引:8
|
作者
Singh, B. Mohinder [1 ]
Natarajan, Jaisankar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamilnadu, India
关键词
Authentication protocol; eHealth records; Post -quantum crypto algorithm; Symmetric crypto-algorithm; Asymmetric crypto-algorithm; Minimized key exchange; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; HEALTH-CARE;
D O I
10.1016/j.jksuci.2023.101629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wake of covid19, many countries are shifting their paper-based health record management from manual processes to digital ones. The major benefit of digital health record is that data can be easily shared. As health data is sensitive, more security is to be provided to gain the trust of stakeholders. In this paper, a novel secure authentication protocol is planned for digitalizing personal health record that will be used by the user. While transacting data, a key is used to secure it. Many protocols used elliptic curve cryptography. In this proposed protocol, at an initial stage, an asymmetric and quantum-resistant cryptoalgorithm, Kyber is used. In further stages, symmetric crypto-algorithm, Advanced Encryption Standard in Galois/Counter mode (AES-GCM) is used to secure transferred data. For every session, a new key is generated for secure transactions. The more interesting fact in this protocol is that transactions are secured without exchanging actual key and also minimized the key exchange. This protocol not only verified the authenticity of user but also checked rightful citizenship of user. This protocol is analyzed for various security traits using ProVerif tool and provided better results relating to security provisioning, cost of storage, and computation as opposed to related protocols.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [21] ScPUAK: Smart card-based secure Protocol for remote User Authentication and Key agreement
    Cherbal, Sarra
    Benchetioui, Rania
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 109
  • [22] A Lightweight, Efficient, and Physically Secure Key Agreement Authentication Protocol for Vehicular Networks
    Wang, Shaoqiang
    Fan, Ziyao
    Su, Yu
    Zheng, Baosen
    Liu, Zhaoyuan
    Dai, Yinfei
    ELECTRONICS, 2024, 13 (08)
  • [23] A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration
    Ogundoyin, Sunday Oyinlola
    Kamil, Ismaila Adeniyi
    2021 IEEE INTERNATIONAL MEDITERRANEAN CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE MEDITCOM 2021), 2021, : 348 - 353
  • [24] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    Vinoth, R.
    Deborah, Lazarus Jegatha
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (3) : 1431 - 1443
  • [25] Secure Hybrid Data Transmission Protocol for WSN with Key Management and Message Authentication
    A Sharmila
    Vinay Rishiwal
    Pramod Kumar
    Mano Yadav
    Preeti Yadav
    SN Computer Science, 6 (5)
  • [26] A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN
    Gupta, Ankur
    Tripathi, Meenakshi
    Sharma, Aakar
    COMPUTER COMMUNICATIONS, 2020, 160 : 311 - 325
  • [27] An efficient key agreement and authentication protocol for secure communication in industrial IoT applications
    R. Vinoth
    Lazarus Jegatha Deborah
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1431 - 1443
  • [28] OSNP: Secure wireless authentication protocol using one-time key
    Huang, Y. L.
    Lu, P. H.
    Tygar, J. D.
    Joseph, A. D.
    COMPUTERS & SECURITY, 2009, 28 (08) : 803 - 815
  • [29] Three-Tier Authentication and Secure Key Exchange Over Insecure Channel
    Ahmad, Muzammil M.
    Khan, Sibghatullah I.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON BIG DATA ANALYTICS AND COMPUTATIONAL INTELLIGENCE (ICBDAC), 2017, : 134 - 137
  • [30] Codeword Authenticated Key Exchange (CAKE) light weight secure routing protocol for WSN
    Mehra, Pawan Singh
    Doja, Mohammad Najmud
    Alam, Bashir
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2019, 32 (03)