A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange

被引:8
|
作者
Singh, B. Mohinder [1 ]
Natarajan, Jaisankar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamilnadu, India
关键词
Authentication protocol; eHealth records; Post -quantum crypto algorithm; Symmetric crypto-algorithm; Asymmetric crypto-algorithm; Minimized key exchange; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; HEALTH-CARE;
D O I
10.1016/j.jksuci.2023.101629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wake of covid19, many countries are shifting their paper-based health record management from manual processes to digital ones. The major benefit of digital health record is that data can be easily shared. As health data is sensitive, more security is to be provided to gain the trust of stakeholders. In this paper, a novel secure authentication protocol is planned for digitalizing personal health record that will be used by the user. While transacting data, a key is used to secure it. Many protocols used elliptic curve cryptography. In this proposed protocol, at an initial stage, an asymmetric and quantum-resistant cryptoalgorithm, Kyber is used. In further stages, symmetric crypto-algorithm, Advanced Encryption Standard in Galois/Counter mode (AES-GCM) is used to secure transferred data. For every session, a new key is generated for secure transactions. The more interesting fact in this protocol is that transactions are secured without exchanging actual key and also minimized the key exchange. This protocol not only verified the authenticity of user but also checked rightful citizenship of user. This protocol is analyzed for various security traits using ProVerif tool and provided better results relating to security provisioning, cost of storage, and computation as opposed to related protocols.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [31] A Provably Secure and Practical PUF-Based End-to-End Mutual Authentication and Key Exchange Protocol for IoT
    Li, Sensen
    Zhang, Tikui
    Yu, Bin
    He, Kuan
    IEEE SENSORS JOURNAL, 2021, 21 (04) : 5487 - 5501
  • [32] Secure Session Key Generation Method for LoRaWAN Servers
    Tsai, Kun-Lin
    Leu, Fang-Yie
    Hung, Li-Ling
    Ko, Chia-Yin
    IEEE ACCESS, 2020, 8 (08): : 54631 - 54640
  • [33] Design of an Efficient and Provable Secure Key Exchange Protocol for HTTP Cookies
    Akram, Waseem
    Mahmood, Khalid
    ul Haq, Hafiz Burhan
    Asif, Muhammad
    Chaudhry, Shehzad Ashraf
    Shon, Taeshik
    CMC-COMPUTERS MATERIALS & CONTINUA, 2024, 80 (01): : 263 - 280
  • [34] Secure key exchange protocol using graph and trusted third party
    Deshmukh, Maroti
    Rawat, Arjun Singh
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04) : 393 - 412
  • [35] A New Mutual Authentication and Key Agreement Protocol for Mobile Communications
    Zhang, Juan
    Chen, Guang-hui
    Deng, Fang-min
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 9096 - +
  • [36] A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud
    Anuj Kumar Singh
    Anand Nayyar
    Ankit Garg
    Multimedia Tools and Applications, 2023, 82 : 22525 - 22576
  • [37] A secure three-factor-based authentication with key agreement protocol for e-Health clouds
    Chen, Yulei
    Chen, Jianhua
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (04) : 3359 - 3380
  • [38] QSKCG: Quantum-based secure key communication and key generation scheme for outsourced data in cloud
    Adouth, Vamshi
    Rajagopal, Eswari
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (20)
  • [39] A Secure and Privacy-Preserving Lightweight Authentication and Key Exchange Algorithm for Smart Agriculture Monitoring System
    Itoo, Samiulla
    Khan, Akber Ali
    Ahmad, Musheer
    Idrisi, M. Javed
    IEEE ACCESS, 2023, 11 : 56875 - 56890
  • [40] An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment
    Yang, Huibo
    Chen, Jianhua
    Zhang, Yuanyuan
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (03) : 1399 - 1409