| Literature DB >> 33968292 |
Mehedi Masud1, Gurjot Singh Gaba2, Karanjeet Choudhary2, Roobaea Alroobaea1, M Shamim Hossain3.
Abstract
Traditional healthcare services have transitioned into modern healthcare services where doctors remotely diagnose the patients. Cloud computing plays a significant role in this change by providing easy access to patients' medical records to all stakeholders, such as doctors, nurses, patients, life insurance agents, etc. Cloud services are scalable, cost-effective, and offer a broad range of mobile access to patients' electronic health record (EHR). Despite the cloud's enormous benefits like real-time data access, patients' EHR security and privacy are major concerns. Since the information about patients' health is highly sensitive and crucial, sharing it over the unsecured wireless medium brings many security challenges such as eavesdropping, modifications, etc. Considering the security needs of remote healthcare, this paper proposes a robust and lightweight, secure access scheme for cloud-based E-healthcare services. The proposed scheme addresses the potential threats to E-healthcare by providing a secure interface to stakeholders and prohibiting unauthorized users from accessing information stored in the cloud. The scheme makes use of multiple keys formed through the key derivation function (KDF) to ensure end-to-end ciphering of information for preventing misuse. The rights to access the cloud services are provided based on the identity and the association between stakeholders, thus ensuring privacy. Due to its simplicity and robustness, the proposed scheme is the best fit for protecting data security and privacy in cloud-based E-healthcare services.Entities:
Keywords: Cloud; E-healthcare; Internet of things; Privacy; Secure access
Year: 2021 PMID: 33968292 PMCID: PMC8090928 DOI: 10.1007/s12083-021-01162-x
Source DB: PubMed Journal: Peer Peer Netw Appl ISSN: 1936-6442 Impact factor: 3.307
Comparison related work
| Scheme | E-Healthcare | Security Concern | Difficulty | Awareness | Impact |
|---|---|---|---|---|---|
| [ | A | I | S | L | S |
| [ | B | II | M | L | L |
| [ | C | III | S | L | S |
| [ | D | IV | M | L | S |
| [ | D | I | S | L | M |
| [ | E | V | S | S | L |
| [ | A | VI | S | M | M |
| [ | A | VII | S | M | L |
| [ | A | II | M | L | S |
Acronyms: A: Radio Frequency Identification (RFID), B: Pacemaker, C: Internet Protocol (IP), D: Implantable Medical Devices (IMDs), E: Implantable Cardiac Defibrillators (ICDs), I: Authentication issues (AU), II: Radio attack (RA), III: Hijacking attack (HA), IV: Device cloning issue (DC), V: Electromagnetic interference (EI), VI: Unauthorized remote monitoring (URM), S: Substantial, M: Moderate L: Low
Fig. 1Secure cloud based E-Healthcare system
Notations and descriptions
| Notations | Description |
|---|---|
| Temporary key of gateway and Admin | |
| Reference and Payment receipt number | |
| Public and Private key of cloud | |
| Master key and subkey | |
| doctor id, patient id, and Hospital id | |
| Key derivation function and Requested data | |
| Unique id issued by govt. and hospital | |
| Decryption, Encryption and Nonce | |
| Hash, serial number and Data to be stored | |
| ||, { | Concatenation operation, message number |
Fig. 2Hospital registration at cloud
Fig. 3Offline Registration of devices
Distribution of access rights
| Device | Read | Write |
|---|---|---|
| Doctor |
|
|
| Patient |
| × |
| Nurse |
| × |
Fig. 4Information retrieval phase
Fig. 5Information storage phase
Computational cost of proposed protocol
| Phase 1 | Phase 2 | Phase 3 | |
|---|---|---|---|
| Device | |||
| Gateway | 2 | 2 | |
| Cloud | 2 | ||
| Total cost | 4 | 4 | 4 |
Acronyms: C: Computation, E: Encryption, D: Decryption, H: Hash, Phase 1: Hospital Registration, Phase 2: Information Retrieval, Phase 3: Information Storage
Fig. 6Robustness evaluation of proposed protocol using OFMC and CL-AtSe backend of AVISPA
Comparison of protocols based on security properties
| Scheme | |||||
|---|---|---|---|---|---|
| [ | × | M | × | × | × |
| [ | × | M |
|
|
|
| [ | × | M |
|
|
|
| [ | × | × |
|
| |
| [ | × |
|
|
| |
| [ | × |
|
|
| |
| [ | × |
|
|
| |
| [ | × | × | × |
| |
| [ | × | M |
|
|
|
| [ | × |
| × |
| |
| [ | × |
| × |
| |
|
| M |
|
|
|
Acronyms: M: Mutual, O: One Way, : compliance to the security properties, ×: non compliance to the security properties, P1: Anonymity, P2: Authentication, P3: Authorization, P4: Confidentiality, P5: Integrity, P: Proposed Scheme