Secure and Privacy preserving Biometric based User Authentication with Data Access Control System in the Healthcare Environment

被引:4
作者
Kaul, Sonam Devgan [1 ]
Murty, V. Kumar [2 ]
Hatzinakos, Dimitrios [1 ]
机构
[1] Univ Toronto, Dept ECE, Toronto, ON, Canada
[2] Univ Toronto, Dept Math, Toronto, ON, Canada
来源
2020 INTERNATIONAL CONFERENCE ON CYBERWORLDS (CW 2020) | 2020年
关键词
Security; Privacy; Healthcare; Biometric; Authentication; SCHEME; INTERNET;
D O I
10.1109/CW49994.2020.00047
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, there has been a tremendous growth worldwide in healthcare information systems to provide personalized services smartly. A digital health documentary EHR (Electronic health record) is utilized to keep users sensitive medical or personal data records, which allows medical professionals to access a patient's information in an insecure environment. Thus, providing security and privacy to e-health information is of utmost importance as private sensitive or safety critical data of the users is transmitted over a wireless channel. Motivated by this fact, in this work, we have developed a biometric based lightweight user authentication system that provides users personalized services securely, safely and efficiently. In the proposed authentication, a lightweight data access control process has been described so that only legal users can access the data as per their capability. Further, to maintain user privacy, instead of a user's global identifier, his temporary local identifier is used for communication whereas the system is designed in such a way that in case of emergency, if required, the user global identifier can be recovered. Finally, formal and informal security verification results and performance evaluation comparison demonstrates that the proposed authentication scheme is secure enough to be used in a healthcare environment.
引用
收藏
页码:249 / 256
页数:8
相关论文
共 16 条
[1]   LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT [J].
Aghili, Seyed Farhad ;
Mala, Hamid ;
Shojafar, Mohammad ;
Peris-Lopez, Pedro .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :410-424
[2]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[3]  
Armando A, 2005, LECT NOTES COMPUT SC, V3576, P281
[4]   A Secure and Efficient Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Das, Ashok Kumar ;
Goswami, Adrijit .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
[5]   Fuzzy extractors: How to generate strong keys from biometrics and other noisy data [J].
Dodis, Yevgeniy ;
Ostrovsky, Rafail ;
Reyzin, Leonid ;
Smith, Adam .
SIAM JOURNAL ON COMPUTING, 2008, 38 (01) :97-139
[6]   An exhaustive survey on security and privacy issues in Healthcare 4.0 [J].
Hathaliya, Jigna J. ;
Tanwar, Sudeep .
COMPUTER COMMUNICATIONS, 2020, 153 :311-335
[7]   Privacy in the Internet of Things for Smart Healthcare [J].
He, Daojing ;
Ye, Ran ;
Chan, Sammy ;
Guizani, Mohsen ;
Xu, Yanping .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (04) :38-44
[8]   Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks [J].
He, Debiao ;
Kumar, Neeraj ;
Chen, Jianhua ;
Lee, Cheng-Chi ;
Chilamkurti, Naveen ;
Yeo, Seng-Soo .
MULTIMEDIA SYSTEMS, 2015, 21 (01) :49-60
[9]   Privacy Model for Threshold RFID System Based on PUF [J].
Kaul, Sonam Devgan ;
Awasthi, Amit K. .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) :2803-2828
[10]   Certificateless searchable public key encryption scheme for mobile healthcare system [J].
Ma, Mimi ;
He, Debiao ;
Khan, Muhammad Khurram ;
Chen, Jianhua .
COMPUTERS & ELECTRICAL ENGINEERING, 2018, 65 :413-424