A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange

被引:8
|
作者
Singh, B. Mohinder [1 ]
Natarajan, Jaisankar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamilnadu, India
关键词
Authentication protocol; eHealth records; Post -quantum crypto algorithm; Symmetric crypto-algorithm; Asymmetric crypto-algorithm; Minimized key exchange; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; HEALTH-CARE;
D O I
10.1016/j.jksuci.2023.101629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wake of covid19, many countries are shifting their paper-based health record management from manual processes to digital ones. The major benefit of digital health record is that data can be easily shared. As health data is sensitive, more security is to be provided to gain the trust of stakeholders. In this paper, a novel secure authentication protocol is planned for digitalizing personal health record that will be used by the user. While transacting data, a key is used to secure it. Many protocols used elliptic curve cryptography. In this proposed protocol, at an initial stage, an asymmetric and quantum-resistant cryptoalgorithm, Kyber is used. In further stages, symmetric crypto-algorithm, Advanced Encryption Standard in Galois/Counter mode (AES-GCM) is used to secure transferred data. For every session, a new key is generated for secure transactions. The more interesting fact in this protocol is that transactions are secured without exchanging actual key and also minimized the key exchange. This protocol not only verified the authenticity of user but also checked rightful citizenship of user. This protocol is analyzed for various security traits using ProVerif tool and provided better results relating to security provisioning, cost of storage, and computation as opposed to related protocols.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [41] An Improved Two-Party Authentication Key Exchange Protocol for Mobile Environment
    Huibo Yang
    Jianhua Chen
    Yuanyuan Zhang
    Wireless Personal Communications, 2015, 85 : 1399 - 1409
  • [42] On the Security of a PUF-Based Authentication and Key Exchange Protocol for IoT Devices
    Sun, Da-Zhi
    Gao, Yi-Na
    Tian, Yangguang
    SENSORS, 2023, 23 (14)
  • [43] A fresh Two-party Authentication Key Exchange Protocol for Mobile Environment
    Yang, H. B.
    Chen, J. H.
    Zhang, Y. Y.
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL TECHNOLOGY AND MANAGEMENT SCIENCE (ITMS 2015), 2015, 34 : 933 - 936
  • [44] An efficient two-party authentication key exchange protocol for mobile environment
    Qi, Mingping
    Chen, Jianhua
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (16)
  • [45] VESecure: Verifiable authentication and efficient key exchange for secure intelligent transport systems deployment
    Surapaneni, Praneetha
    Bojjagani, Sriramulu
    Khan, Muhammad Khurram
    VEHICULAR COMMUNICATIONS, 2024, 49
  • [46] S-AKA: A Provable and Secure Authentication Key Agreement Protocol for UMTS Networks
    Huang, Yu-Lun
    Shen, Chih-Ya
    Shieh, Shiuhpyng Winston
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2011, 60 (09) : 4509 - 4519
  • [47] An Efficient and Secure Key Exchange Protocol Based on Elliptic Curve and Security Models
    Abusukhon, Ahmad
    Mohammad, Zeyad
    Al-Thaher, Ali
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 73 - 78
  • [48] New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group
    Meshram, Chandrashekhar
    Li, Xiangxue
    JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (02) : 391 - 400
  • [49] A new ECC-based wireless authentication and key agreement protocol
    Zhang, Juan
    Chen, Guanghui
    Deng, Fangmin
    FIFTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1219 - 1225
  • [50] A New Enhanced Authentication Mechanism Using Session Key Agreement Protocol
    Usha, S.
    Kuppuswami, S.
    Karthik, M.
    CYBERNETICS AND INFORMATION TECHNOLOGIES, 2018, 18 (04) : 61 - 74