A privacy preserving three-factor authentication protocol for e-Health clouds

被引:154
作者
Jiang, Qi [1 ,2 ]
Khan, Muhammad Khurram [3 ]
Lu, Xiang [4 ]
Ma, Jianfeng [1 ]
He, Debiao [5 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Nanjing, Jiangsu, Peoples R China
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[4] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[5] Wuhan Univ, Sch Comp Sci & Technol, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Authentication; Password; Biometrics; Anonymity; Privacy; E-Health; Cloud computing; SCHEME; BIOMETRICS; SECURITY; CRYPTANALYSIS; IMPROVEMENT; FRAMEWORK;
D O I
10.1007/s11227-015-1610-x
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of big data in healthcare. However, such an adoption also brings about a series of challenges, especially, how to ensure the security and privacy of highly sensitive health data. Among them, one of the major issues is authentication, which ensures that sensitive medical data in the cloud are not available to illegal users. Three-factor authentication combining password, smart card and biometrics perfectly matches this requirement by providing high security strength. Recently, Wu et al. proposed a three-factor authentication protocol based on elliptic curve cryptosystem which attempts to fulfill three-factor security and resist various existing attacks, providing many advantages over existing schemes. However, we first show that their scheme is susceptible to user impersonation attack in the registration phase. In addition, their scheme is also vulnerable to offline password guessing attack in the login and password change phase, under the condition that the mobile device is lost or stolen. Furthermore, it fails to provide user revocation when the mobile device is lost or stolen. To remedy these flaws, we put forward a robust three-factor authentication protocol, which not only guards various known attacks, but also provides more desired security properties. We demonstrate that our scheme provides mutual authentication using the Burrows-Abadi-Needham logic.
引用
收藏
页码:3826 / 3849
页数:24
相关论文
共 59 条
[1]   A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds [J].
Abbas, Assad ;
Khan, Samee U. .
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) :1431-1441
[2]   Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards [J].
An, Younghwa .
JOURNAL OF BIOMEDICINE AND BIOTECHNOLOGY, 2012,
[3]   Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF SUPERCOMPUTING, 2015, 71 (08) :3163-3180
[4]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[5]   Mobile device integration of a fingerprint biometric remote authentication scheme [J].
Chen, Chin-Ling ;
Lee, Cheng-Chi ;
Hsu, Chao-Yung .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2012, 25 (05) :585-597
[6]   Towards secure and efficient user authentication scheme using smart card for multi-server environments [J].
Chen, Te-Yu ;
Lee, Cheng-Chi ;
Hwang, Min-Shiang ;
Jan, Jinn-Ke .
JOURNAL OF SUPERCOMPUTING, 2013, 66 (02) :1008-1032
[7]   Analysis and improvement on an efficient biometric-based remote user authentication scheme using smart cards [J].
Das, A. K. .
IET INFORMATION SECURITY, 2011, 5 (03) :145-151
[8]  
Dodis Y, 2004, LECT NOTES COMPUT SC, V3027, P523
[9]   Provably Secure Remote Truly Three-Factor Authentication Scheme With Privacy Protection on Biometrics [J].
Fan, Chun-I ;
Lin, Yi-Hui .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2009, 4 (04) :933-945
[10]   An efficient client-client password-based authentication scheme with provable security [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian .
JOURNAL OF SUPERCOMPUTING, 2014, 70 (02) :1002-1022