On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems

被引:29
作者
Chatterjee, Santanu [1 ]
Roy, Sandip [2 ]
Das, Ashok Kumar [3 ]
Chattopadhyay, Samiran [4 ]
Kumar, Neeraj [5 ]
Reddy, Alavalapati Goutham [6 ]
Park, Kisung [7 ]
Park, Youngho [7 ]
机构
[1] Res Ctr Imarat, Def Res & Dev Org, Hyderabad 500069, Andhra Pradesh, India
[2] Asansol Engn Coll, Dept Comp Sci & Engn, Asansol 713305, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[4] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[5] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[6] Qatar Univ, Dept Comp Sci & Engn, KINDI Lab, Doha 2713, Qatar
[7] Kyungpook Natl Univ, Sch Elect Engn, Daegu 702701, South Korea
关键词
Fine-grained access control; biometric authentication; bilinear maps; telecare medicine information systems; fuzzy extractor; security; BAN logic; ROR model; KEY AGREEMENT SCHEME; SECURE; EFFICIENT; ANONYMITY; PROTOCOL;
D O I
10.1109/ACCESS.2017.2694044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A telecare medicine information system (TMIS) for health-care delivery service requires information exchange among multiple IT systems, where different types of users with different access privileges are involved. In TMIS, users generally communicate via public channels. Hence, authentication is essential to provide access to the genuine users. However, access rights for the correct information and resources for different services to the genuine users can be provided with the help of efficient user access control mechanism. The existing user authentication protocols designed for THIS only provide authentication, but for this kind of application, it is required that the authorized users should also have unique access privilege to access specific data. This paper puts forwards a new fine grained access control with user authentication scheme for THIS. We present the formal security analysis using both the widely accepted real-or-random model and Burrows Abadi Needham logic. The proposed scheme supports user anonymity, forward secrecy, and efficient password change without contacting the remote server. In addition, the proposed scheme is comparable with respect to communication and computation costs as compared with other related schemes proposed in THIS. Moreover, better tradeoff among security and functionality features, and communication and computation costs makes the proposed scheme suitable and practical for telecare medicine environments as compared with other existing related schemes.
引用
收藏
页码:7012 / 7030
页数:19
相关论文
共 52 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3386, P65
[2]  
[Anonymous], 2001, FIPS PUB
[3]  
[Anonymous], 1995, 1801 NIST FIPS PUB
[4]   A Biometric Authentication Scheme for Telecare Medicine Information Systems with Nonce [J].
Awasthi, Amit K. ;
Srivastava, Keerti .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (05)
[5]   Security of public-key cryptosystems based on Chebyshev polynomials [J].
Bergamo, P ;
D'Arco, P ;
De Santis, A ;
Kocarev, L .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2005, 52 (07) :1382-1393
[6]  
Blakley GR, 1979, P NAT COMP C, P313, DOI 10.1109/MARK.1979.8817296
[7]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[8]   Logic of authentication [J].
Burrows, Michael ;
Abadi, Martin ;
Needham, Roger .
Operating Systems Review (ACM), 1989, 23 (05) :1-13
[9]   A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care [J].
Chang, Ya-Fen ;
Yu, Shih-Hui ;
Shiao, Ding-Rui .
JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (02)
[10]  
Chatterjee S., 2015, 2015 International Conference on Energy Economics and Environment (ICEEE), P1, DOI 10.1109/EnergyEconomics.2015.7235085