Literature DB >> 29477428

Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

Chun-Ta Li1, Dong-Her Shih2, Chun-Cheng Wang3.   

Abstract

BACKGROUND AND
OBJECTIVE: With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.
METHODS: Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.
RESULTS: The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.
CONCLUSIONS: We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency.
Copyright © 2018 Elsevier B.V. All rights reserved.

Entities:  

Keywords:  Authentication; Cloud computing; Cryptanalysis; Privacy preservation; Telecare medical information system

Mesh:

Year:  2018        PMID: 29477428     DOI: 10.1016/j.cmpb.2018.02.002

Source DB:  PubMed          Journal:  Comput Methods Programs Biomed        ISSN: 0169-2607            Impact factor:   5.428


  3 in total

1.  A Robust and Efficient ECC-based Mutual Authentication and Session Key Generation Scheme for Healthcare Applications.

Authors:  Arezou Ostad-Sharif; Dariush Abbasinezhad-Mood; Morteza Nikooghadam
Journal:  J Med Syst       Date:  2018-12-01       Impact factor: 4.460

2.  Dependable and Provable Secure Two-Factor Mutual Authentication Scheme Using ECC for IoT-Based Telecare Medical Information System.

Authors:  Niranchana Radhakrishnan; Amutha Prabakar Muniyandi
Journal:  J Healthc Eng       Date:  2022-02-14       Impact factor: 2.682

3.  Security Privacy and Policy for Cryptographic Based Electronic Medical Information System.

Authors:  Hsuan-Yu Chen; Zhen-Yu Wu; Tzer-Long Chen; Yao-Min Huang; Chia-Hui Liu
Journal:  Sensors (Basel)       Date:  2021-01-21       Impact factor: 3.576

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.