On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems

被引:29
作者
Chatterjee, Santanu [1 ]
Roy, Sandip [2 ]
Das, Ashok Kumar [3 ]
Chattopadhyay, Samiran [4 ]
Kumar, Neeraj [5 ]
Reddy, Alavalapati Goutham [6 ]
Park, Kisung [7 ]
Park, Youngho [7 ]
机构
[1] Res Ctr Imarat, Def Res & Dev Org, Hyderabad 500069, Andhra Pradesh, India
[2] Asansol Engn Coll, Dept Comp Sci & Engn, Asansol 713305, India
[3] Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, Andhra Pradesh, India
[4] Jadavpur Univ, Dept Informat Technol, Kolkata 700098, India
[5] Thapar Univ, Dept Comp Sci & Engn, Patiala 147004, Punjab, India
[6] Qatar Univ, Dept Comp Sci & Engn, KINDI Lab, Doha 2713, Qatar
[7] Kyungpook Natl Univ, Sch Elect Engn, Daegu 702701, South Korea
关键词
Fine-grained access control; biometric authentication; bilinear maps; telecare medicine information systems; fuzzy extractor; security; BAN logic; ROR model; KEY AGREEMENT SCHEME; SECURE; EFFICIENT; ANONYMITY; PROTOCOL;
D O I
10.1109/ACCESS.2017.2694044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A telecare medicine information system (TMIS) for health-care delivery service requires information exchange among multiple IT systems, where different types of users with different access privileges are involved. In TMIS, users generally communicate via public channels. Hence, authentication is essential to provide access to the genuine users. However, access rights for the correct information and resources for different services to the genuine users can be provided with the help of efficient user access control mechanism. The existing user authentication protocols designed for THIS only provide authentication, but for this kind of application, it is required that the authorized users should also have unique access privilege to access specific data. This paper puts forwards a new fine grained access control with user authentication scheme for THIS. We present the formal security analysis using both the widely accepted real-or-random model and Burrows Abadi Needham logic. The proposed scheme supports user anonymity, forward secrecy, and efficient password change without contacting the remote server. In addition, the proposed scheme is comparable with respect to communication and computation costs as compared with other related schemes proposed in THIS. Moreover, better tradeoff among security and functionality features, and communication and computation costs makes the proposed scheme suitable and practical for telecare medicine environments as compared with other existing related schemes.
引用
收藏
页码:7012 / 7030
页数:19
相关论文
共 52 条
[31]  
Kocher P., 1999, LECT NOTES COMPUTER, V1666, P388, DOI DOI 10.1007/3-540-48405-1_25
[32]   Examining smart-card security under the threat of power analysis attacks [J].
Messerges, TS ;
Dabbish, EA ;
Sloan, RH .
IEEE TRANSACTIONS ON COMPUTERS, 2002, 51 (05) :541-552
[33]   A secure and efficient ECC-based user anonymity-preserving session initiation authentication protocol using smart card [J].
Mishra, Dheerendra ;
Das, Ashok Kumar ;
Mukhopadhyay, Sourav .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2016, 9 (01) :171-192
[34]  
Mishra D, 2014, J MED SYST, V38, DOI [10.1007/s10916-014-0120-3, 10.1007/s10916-014-0024-2]
[35]   Soft Biometric Traits for Continuous User Authentication [J].
Niinuma, Koichiro ;
Park, Unsang ;
Jain, Anil K. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2010, 5 (04) :771-780
[36]   An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards [J].
Odelu, Vanga ;
Das, Ashok Kumar ;
Goswami, Adrijit .
SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) :4136-4156
[37]   A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards [J].
Odelu, Vanga ;
Das, Ashok Kumar ;
Goswami, Adrijit .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) :1953-1966
[38]  
Pathak MA, 2013, IEEE SIGNAL PROC MAG, V30, P62, DOI 10.1109/MSP.2012.2230222
[39]  
Pointcheval D, 2008, LECT NOTES COMPUT SC, V5037, P277, DOI 10.1007/978-3-540-68914-0_17
[40]  
Ruj S., 2011, Proceedings of the 25th IEEE International Parallel & Distributed Processing Symposium (IPDPS 2011), P352, DOI 10.1109/IPDPS.2011.42