Literature DB >> 31522286

NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.

Xiaoxue Liu1, Wenping Ma2, Hao Cao2,3.   

Abstract

Mobile Edge-Cloud Network is a new network structure after fog-cloud computing, where service and data computing are scattered in the most logical, nearby and efficient place. It provides better services than fog-cloud computing with better performance in reasonably low cost way and allows users to eliminate numerous limitations inherent in fog-cloud computing, although it inherits those security-privacy issues from fog-cloud computing. A novel privacy-preserving mutual authentication in TMIS for mobile Edge-Cloud architecture (abbreviated to NPMA) is constructed in this paper. NPMA scheme not only mitigates some weaknesses of fog-cloud computing, but has other advantages. First, NPMA scheme supports patients(edge-servers) anonymity and forward-backward untraceability (traceability, when needed), since their identities are hidden in two distinct dynamic anonyms and a static one and only the trusted center can recover their real identities, when needed. Second, each edge-server shares a secret value, which realizes authentication with extremely low computional cost in authentication phase. Finally, NPMA scheme is proven safely against passive and active attacks under elliptic curve computable Diffie-Hellman problem (ECDHP) assumption in random oracle model. Hence, it achieves the required security properties and outperforms prior approaches in terms of energy and computational costs.

Entities:  

Keywords:  Authentication; Dynamic anonym; Mobile edge-cloud network; Privacy-preserving; TMIS

Mesh:

Year:  2019        PMID: 31522286     DOI: 10.1007/s10916-019-1444-9

Source DB:  PubMed          Journal:  J Med Syst        ISSN: 0148-5598            Impact factor:   4.460


  4 in total

1.  Design of a Secure Three-Factor Authentication Scheme for Smart Healthcare.

Authors:  Km Renuka; Saru Kumari; Xiong Li
Journal:  J Med Syst       Date:  2019-04-03       Impact factor: 4.460

2.  A Scalable and Pragmatic Method for the Safe Sharing of High-Quality Health Data.

Authors:  Fabian Prasser; Florian Kohlmayer; Helmut Spengler; Klaus A Kuhn
Journal:  IEEE J Biomed Health Inform       Date:  2017-03-23       Impact factor: 5.772

3.  CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS.

Authors:  Xiaoxue Liu; Wenping Ma
Journal:  J Med Syst       Date:  2018-06-18       Impact factor: 4.460

4.  A Novel Authentication and Key Agreement Scheme for Implantable Medical Devices Deployment.

Authors:  Mohammad Wazid; Ashok Kumar Das; Neeraj Kumar; Mauro Conti; Athanasios V Vasilakos; Mohammad Wazid; Ashok Kumar Das; Neeraj Kumar; Mauro Conti; Athanasios V Vasilakos
Journal:  IEEE J Biomed Health Inform       Date:  2017-06-29       Impact factor: 5.772

  4 in total
  2 in total

1.  Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage.

Authors:  Hassan Mansur Hussien; Sharifah Md Yasin; Nur Izura Udzir; Mohd Izuan Hafez Ninggal
Journal:  Sensors (Basel)       Date:  2021-04-02       Impact factor: 3.576

Review 2.  IoMT amid COVID-19 pandemic: Application, architecture, technology, and security.

Authors:  Azana Hafizah Mohd Aman; Wan Haslina Hassan; Shilan Sameen; Zainab Senan Attarbashi; Mojtaba Alizadeh; Liza Abdul Latiff
Journal:  J Netw Comput Appl       Date:  2020-11-02       Impact factor: 6.281

  2 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.