CSEF: Cloud-Based Secure and Efficient Framework for Smart Medical System Using ECC

被引:53
作者
Kumari, Adesh [1 ]
Kumar, Vinod [2 ]
Abbasi, M. Yahya [1 ]
Kumari, Saru [3 ]
Chaudhary, Pradeep [4 ]
Chen, Chien-Ming [5 ]
机构
[1] Jamia Millia Islamia, Dept Math, New Delhi 110025, India
[2] Univ Delhi, Dept Math, PGDAV Coll, New Delhi 110065, India
[3] Chaudhary Charan Singh Univ, Dept Math, Meerut 250004, Uttar Pradesh, India
[4] Chaudhary Charan Singh Univ, Dept Stat, Meerut 250004, Uttar Pradesh, India
[5] Shandong Univ Sci & Technol, Coll Comp Sci & Engn, Qingdao 266590, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
关键词
Cloud computing; Medical services; Authentication; Protocols; Privacy; Elliptic curve cryptography; Cloud-medical system; elliptic curve cryptography; mutual authentication; signature; security and privacy; KEY AGREEMENT SCHEME; USER AUTHENTICATION; MUTUAL AUTHENTICATION; PROTOCOL;
D O I
10.1109/ACCESS.2020.3001152
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Smart architecture is the concept to manage the facilities via internet utilization in a proper manner. There are various technologies used in smart architecture such as cloud computing, internet of things, green computing, automation and fog computing. Smart medical system (SMS) is one of the application used in architecture, which is based on communication networking along with sensor devices. In SMS, a doctor provides online treatment to patients with the help of cloud-based applications such as mobile device, wireless body area network, etc. Security and privacy are the major concern of cloud-based applications in SMS. To maintain, security and privacy, we aim to design an elliptic curve cryptography (ECC) based secure and efficient authentication framework for cloud-assisted SMS. There are six phases in the proposed protocol such as: patient registration phase, healthcare center upload phase, patient data upload phase, treatment phase, checkup phase and emergency phase. In CSEF, there are four entities like healthecare center, patient, cloud and doctor. In CSEF, mutual authentication establishes between healthcare center and cloud, patient and cloud, doctor and cloud, and patient and healthcare center by the using ECC and hash function. The CSEF is secure against security attacks, and satisfies many security attributes such as man-in-the-middle attack, impersonation attack, data non-repudiation, doctor anonymity, replay attack, known-key security property, message authentication, patient anonymity, data confidentiality, stolen-verifier attack, parallel session attack and session key security. Further, the CSEF is efficient in terms of computation and communication compared to others related frameworks. As a result, CSEF can be utilized in cloud-based SMS.
引用
收藏
页码:107838 / 107852
页数:15
相关论文
共 71 条
  • [1] A secure and efficient remote patient-monitoring authentication protocol for cloud-IoT
    Alzahrani, Bander A.
    Irshad, Azeem
    Alsubhi, Khalid
    Albeshri, Aiiad
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [2] A robust and anonymous patient monitoring system using wireless medical sensor networks
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 : 483 - 495
  • [3] Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Li, Xiong
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [4] Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Khan, Muhammad Khurram
    Obaidat, Mohammad S.
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
  • [5] [Anonymous], 2020, FUTURE GENER COMP SY, DOI DOI 10.1016/j.future.2018.04.019
  • [6] Bajpai D., 2012, ADV COMPUTING INFORM, P719, DOI DOI 10.1007/978-3-642-31513-8_73
  • [7] Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI [10.1145/2245276.2232005, DOI 10.1145/2245276.2232005]
  • [8] Cao BQ, 2009, LECT NOTES COMPUT SC, V5931, P644
  • [9] Mechanisms for SLA provisioning in cloud-based service providers
    Casalicchio, Emiliano
    Silvestri, Luca
    [J]. COMPUTER NETWORKS, 2013, 57 (03) : 795 - 810
  • [10] Cloud-based authenticated protocol for healthcare monitoring system
    Chandrakar, Preeti
    Sinha, Sonam
    Ali, Rifaqat
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (08) : 3431 - 3447