NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture

被引:0
作者
Xiaoxue Liu
Wenping Ma
Hao Cao
机构
[1] Xidian University,
[2] Anhui Science and Technology University,undefined
来源
Journal of Medical Systems | 2019年 / 43卷
关键词
Mobile edge-cloud network; Privacy-preserving; Authentication; TMIS; Dynamic anonym;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile Edge-Cloud Network is a new network structure after fog-cloud computing, where service and data computing are scattered in the most logical, nearby and efficient place. It provides better services than fog-cloud computing with better performance in reasonably low cost way and allows users to eliminate numerous limitations inherent in fog-cloud computing, although it inherits those security-privacy issues from fog-cloud computing. A novel privacy-preserving mutual authentication in TMIS for mobile Edge-Cloud architecture (abbreviated to NPMA) is constructed in this paper. NPMA scheme not only mitigates some weaknesses of fog-cloud computing, but has other advantages. First, NPMA scheme supports patients(edge-servers) anonymity and forward-backward untraceability (traceability, when needed), since their identities are hidden in two distinct dynamic anonyms and a static one and only the trusted center can recover their real identities, when needed. Second, each edge-server shares a secret value, which realizes authentication with extremely low computional cost in authentication phase. Finally, NPMA scheme is proven safely against passive and active attacks under elliptic curve computable Diffie-Hellman problem (ECDHP) assumption in random oracle model. Hence, it achieves the required security properties and outperforms prior approaches in terms of energy and computational costs.
引用
收藏
相关论文
共 62 条
[1]  
Yang Y(2017)Lightweight distributed secure data management system for health internet of things[J] J. Netw. Comput. Appl. 89 26-37
[2]  
Zheng X(2019)Design of secure key management and user authentication scheme for fog computing services[J] Futur. Gener. Comput. Syst. 91 475-492
[3]  
Tang C(2017)Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges[J] IEEE Commun. Mag. 91 54C61-20
[4]  
Wazid M(2019)User centric three-factor authentication protocol for cloud-assisted wearable devices[J] Int. J. Commun. Syst. 32 1-195
[5]  
Das A(2017)Efficient end-to-end authentication protocol for wearable health monitoring systems[J] Comput. Electr. Eng. 63 182-1615
[6]  
Kumar N(2017)A robust and energy efficient authentication protocol for industrial internet of things[J] IEEE Internet Things J. 5 1606-33528
[7]  
Tran T(2018)ETAP: energy-efficient and traceable authentication protocol in mobile medical cloud architecture[J] IEEE Access 6 33513-622
[8]  
Hajisami A(2017)A scalable and pragmatic method for the safe sharing of high-quality health data[J] IEEE J. Biomed. Health Inform. 22 611-42
[9]  
Pandey P(2017)Survey on fog computing: architecture, key technologies, applications and open issues J. Netw. Comput. Appl. 98 27-752
[10]  
Jiang Q(2018)Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing[J] Futur. Gener. Comput. Syst. 78 739-719