Cloud Centric Authentication for Wearable Healthcare Monitoring System

被引:116
作者
Jangirala, Srinivas [1 ]
Das, Ashok Kumar [1 ]
Kumar, Neeraj [2 ]
Rodrigues, Joel J. P. C. [3 ,4 ,5 ,6 ]
机构
[1] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India
[2] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[3] Natl Inst Telecommun Inatel, BR-37540000 Santa Rita Do Sapuca, Brazil
[4] Inst Telecomunicacoes, P-1049001 Lisbon, Portugal
[5] ITMO Univ, St Petersburg 197101, Russia
[6] Univ Fortaleza UNIFOR, BR-0811905 Fortaleza, Ceara, Brazil
关键词
Biomedical monitoring; Cloud computing; Medical services; Authentication; Monitoring; Wearable sensors; healthcare; bigdata; cloud computing; authentication; security; KEY AGREEMENT SCHEME; BIG DATA ANALYTICS; USER AUTHENTICATION; SECURITY; EXCHANGE; DESIGN; FUTURE; PROTOCOLS; MEDICINE; SERVICES;
D O I
10.1109/TDSC.2018.2828306
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers. These become more challenging especially for the data generated from the wearable devices as it is highly sensitive and heterogeneous in nature. Most of the existing techniques reported in the literature are having high computation and communication costs and are vulnerable to various known attacks, which reduce their importance for applicability in real-world environment. Hence, in this paper, we propose a new cloud based user authentication scheme for secure authentication of medical data. After successful mutual authentication between a user and wearable sensor node, both establish a secret session key that is used for future secure communications. The extensively-used Real-Or-Random (ROR) model based formal security analysis and the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool based formal security verification show that the proposed scheme provides the session-key security and protects active attacks. The proposed scheme is also informally analyzed to show its resilience against other known attacks. Moreover, we have done a detailed comparative analysis for the communication and computation costs along with security and functionality features which proves its efficiency in comparison to the other existing schemes of its category.
引用
收藏
页码:942 / 956
页数:15
相关论文
共 48 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
Alguliyev R, 2014, I C APPL INF COMM TE, P216
[3]  
[Anonymous], INT J TRUST MANAG CO
[4]  
[Anonymous], J SENS
[5]   Big Data computing and clouds: Trends and future directions [J].
Assuncao, Marcos D. ;
Calheiros, Rodrigo N. ;
Bianchi, Silvia ;
Netto, Marco A. S. ;
Buyya, Rajkumar .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2015, 79-80 :3-15
[6]   Ten commandments for effective clinical decision support: Making the practice of evidence-based medicine a reality [J].
Bates, DW ;
Kuperman, GJ ;
Wang, S ;
Gandhi, T ;
Kittler, A ;
Volk, L ;
Spurr, C ;
Khorasani, R ;
Tanasijevic, M ;
Middleton, B .
JOURNAL OF THE AMERICAN MEDICAL INFORMATICS ASSOCIATION, 2003, 10 (06) :523-530
[7]   Wearable Sensors and Systems From Enabling Technology to Clinical Applications [J].
Bonato, Paolo .
IEEE ENGINEERING IN MEDICINE AND BIOLOGY MAGAZINE, 2010, 29 (03) :25-36
[8]   Cloud-Centric Multi-Level Authentication as a Service for Secure Public Safety Device Networks [J].
Butun, Ismail ;
Erol-Kantarci, Melike ;
Kantarci, Burak ;
Song, Houbing .
IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (04) :47-53
[9]  
Canetti R, 2001, LECT NOTES COMPUT SC, V2045, P453
[10]  
Canetti R, 2002, LECT NOTES COMPUT SC, V2332, P337