Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing

被引:21
作者
Shen, Jian [1 ,2 ,3 ]
Yang, Huijie [1 ,2 ]
Wang, Anxi [1 ,2 ]
Zhou, Tianqi [1 ,3 ]
Wang, Chen [1 ,2 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Sch Comp & Software, Jiangsu Engn Ctr Network Monitoring, Nanjing, Jiangsu, Peoples R China
[2] Guangxi Key Lab Cryptog & Informat Secur, Guilin, Peoples R China
[3] Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
Lightweight authentication; Key agreement; Fog computing; Healthcare;
D O I
10.1007/s12083-018-0696-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Healthcare in fog computing is a novel topic in recent year. With the development of technology, it is a pressing issue to accomplish the secure healthcare in fog computing. Moreover, how to ensure the security and efficiency of the transmission healthcare data in open channel is a challenge to be solved. In this paper, a lightweight authentication and matrix-based key agreement scheme is proposed to support the communication of multi parties in fog computing. On the one hand, the lightweight authentication technology is needed to verify the identity of multi-parties that assure the facticity of communication parties in the open channel. On the other hand, using the matrix-based key agreement technology encrypts the healthcare data and uploads to the cloud server with the aid of the doubly-linked cyclic (DLC) tables. The security analysis shows that the proposed scheme is secure to transmit the data for healthcare. The performance analysis shows that the proposed scheme reduces the communication cost.
引用
收藏
页码:924 / 933
页数:10
相关论文
共 32 条
[1]  
Barua R., 2003, PROGR CRYPTOLOGY IND, P205
[2]   Secure Smart Homes: Opportunities and Challenges [J].
Batalla, Jordi Mongay ;
Vasilakos, Athanasios ;
Gajewski, Mariusz .
ACM COMPUTING SURVEYS, 2017, 50 (05)
[3]   VLSI implementation of an ultra-low-cost and low-power image compressor for wireless camera networks [J].
Chen, Shih-Lun ;
Nie, Jing ;
Lin, Ting-Lan ;
Chung, Rih-Lung ;
Hsia, Chih-Hsien ;
Liu, Tse-Yen ;
Lin, Szu-Yin ;
Wu, Hai-Xia .
JOURNAL OF REAL-TIME IMAGE PROCESSING, 2018, 14 (04) :803-812
[4]   Verifiable Computation over Large Database with Incremental Updates [J].
Chen, Xiaofeng ;
Li, Jin ;
Weng, Jian ;
Ma, Jianfeng ;
Lou, Wenjing .
IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (10) :3184-3195
[5]   New Algorithms for Secure Outsourcing of Modular Exponentiations [J].
Chen, Xiaofeng ;
Li, Jin ;
Ma, Jianfeng ;
Tang, Qiang ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) :2386-2396
[6]  
Chuang MC, 2011, IEEE INT C COMM NETW, P1758
[7]   Elliptic curve cryptography engineering [J].
Cilardo, A ;
Coppolino, L ;
Mazzocca, N ;
Romano, L .
PROCEEDINGS OF THE IEEE, 2006, 94 (02) :395-406
[8]   A Gait Sequence Analysis for IP Camera Using a Modified LBP [J].
Hsia, Chih-Hsien ;
Dai, Yi-Jhe ;
Chen, Shih-Lun ;
Lin, Ting-Lan ;
Shen, Jian .
JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (02) :451-458
[9]   New Verification Strategy for Finger-Vein Recognition System [J].
Hsia, Chih-Hsien .
IEEE SENSORS JOURNAL, 2018, 18 (02) :790-797
[10]   Finger-vein recognition based on parametric-oriented corrections [J].
Hsia, Chih-Hsien ;
Guo, Jing-Ming ;
Wu, Chong-Sheng .
MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (23) :25179-25196