MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture

被引:23
作者
Liu, Xiaoxue [1 ]
Ma, Wenping [1 ]
Cao, Hao [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Shaanxi, Peoples R China
[2] Anhui Sci & Technol Univ, Sch Informat & Network Engn, Chuzhou 233100, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
基金
美国国家科学基金会;
关键词
Cloud computing; Blockchain; Medical services; Cryptography; Authentication; Computational modeling; TMIS; MediBchain; cloud; privacy-preserving; traceability; EFFICIENT; PROTOCOL; SCHEME; SYSTEM;
D O I
10.1109/ACCESS.2019.2947313
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Telecare Medical Information System (TMIS) integrates various types of mobile devices and communication technologies to upgrade the traditional face-to-face medical treatment model to intelligent one, which can provide the flexible and convenient e-health care. Due to the complexity and openness of Internet, e-health care data is grabbing the interest of cyber attackers. Hence, security and privacy are still our dominant concerns. Fortunately, blockchain technology leverages decentralized or distributed process to ensure data security. A MediBchain-based privacy-preserving mutual authentication for mobile medical cloud architecture (abbreviated to MBPA) is proposed in this paper. MBPA scheme not only mitigates the weaknesses of existing ones, but has other advantages. First, MBPA scheme supports patients anonymity and traceability since the patients identity is hidden in two dynamic anonyms and a static anonym and only the trusted center can recover his/her real identity. Second, each MediBchain node shares a secret value, which realizes authentication with extremely low computional cost between terminals and MediBchain nodes. Finally, MBPA scheme is proven safely against passive and active attacks under elliptic curve computational Diffie-Hellman problem (ECDHP) assumption in random oracle model. Hence, these features make MBPA scheme very suitable for computation-limited mobile devices compared with other related existing schemes.
引用
收藏
页码:149282 / 149298
页数:17
相关论文
共 50 条
  • [21] A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems
    Ebrahimi, Mandieh
    Bayat, Majid
    Zahednejad, Behnam
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 14 (01): : 57 - 68
  • [22] Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage
    Liu, Jia-Nan
    Luo, Xizhao
    Weng, Jian
    Yang, Anjia
    Wang, Xu An
    Li, Ming
    Lin, Xiaodong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1518 - 1531
  • [23] Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
    Yang, Wencheng
    Hu, Jiankun
    Wang, Song
    Wu, Qianhong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [24] Privacy-Preserving Mutual Authentication in RFID with Designated Readers
    Fuchun Guo
    Yi Mu
    Willy Susilo
    Vijay Varadharajan
    Wireless Personal Communications, 2017, 96 : 4819 - 4845
  • [25] Privacy-Preserving Mutual Authentication in RFID with Designated Readers
    Guo, Fuchun
    Mu, Yi
    Susilo, Willy
    Varadharajan, Vijay
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (03) : 4819 - 4845
  • [26] A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing
    Zhang, Yin
    Xiong, Ling
    Li, Fagen
    Niu, Xianhua
    Wu, Hanzhou
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [27] On the security and improvement of privacy-preserving 3-factor authentication scheme for TMIS
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (15)
  • [28] A Conditional Privacy-Preserving Mutual Authentication Protocol With Fine-Grained Forward and Backward Security in IoV
    Xiong, Hu
    Yao, Ting
    Zhao, Yaxin
    Gong, Lingxiao
    Yeh, Kuo-Hui
    IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2024, 25 (11) : 15493 - 15511
  • [29] An Ultralightweight and Privacy-Preserving Authentication Protocol for Mobile RFID Systems
    Niu, Ben
    Zhu, Xiaoyan
    Li, Hui
    2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, : 1864 - 1869
  • [30] A Lightweight and Privacy-Preserving Authentication Protocol for Mobile Edge Computing
    Kaur, Kuljeet
    Garg, Sahil
    Kaddoum, Georges
    Guizani, Mohsen
    Jayakody, Dushantha Nalin K.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,