An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing

被引:50
作者
Kumar, Vinod [1 ]
Jangirala, Srinivas [2 ]
Ahmad, Musheer [1 ]
机构
[1] Jamia Millia Islamia, Dept Appl Sci & Humanities, Fac Engn & Technol, New Delhi 110025, India
[2] Indian Inst Technol Kharagpur, Dept Math, Khargpur 721302, India
关键词
Cloud computing; TMIS; Mutual authentication; Signature; Medical data; KEY AGREEMENT SCHEME; USER AUTHENTICATION; CRYPTANALYSIS; PROTOCOL;
D O I
10.1007/s10916-018-0987-5
中图分类号
R19 [保健组织与事业(卫生事业管理)];
学科分类号
摘要
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
引用
收藏
页数:25
相关论文
共 59 条
[1]  
Abdalla M, 2008, LECT NOTES COMPUT SC, V5339, P133, DOI 10.1007/978-3-540-89641-8_10
[2]  
Abor P. A., 2012, ANN C INN BUS MAN LO, P21
[3]  
Amin Ruhul, 2016, International Journal of Network Security, V18, P172
[4]   A robust and anonymous patient monitoring system using wireless medical sensor networks [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 80 :483-495
[5]   Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems [J].
Amin, Ruhul ;
Islam, S. K. Hafizul ;
Biswas, G. P. ;
Khan, Muhammad Khurram ;
Li, Xiong .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (11)
[6]   Cryptanalysis and Design of a Three-Party Authenticated Key Exchange Protocol Using Smart Card [J].
Amin, Ruhul ;
Biswas, G. P. .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2015, 40 (11) :3135-3149
[7]  
Bajpai D., 2012, ADV COMPUTING INFORM, P719, DOI DOI 10.1007/978-3-642-31513-8_73
[8]  
Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
[9]  
Bresson Emmanuel., 2003, ACM C COMPUTER COMMU, P241, DOI DOI 10.1145/948109.948142
[10]  
Cao BQ, 2009, LECT NOTES COMPUT SC, V5931, P644