Skip to main content
Top

2019 | OriginalPaper | Chapter

An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing

Authors : Jinhui Liu, Yong Yu, Yannan Li, Yanqi Zhao, Xiaojiang Du

Published in: Information Security and Cryptology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

With the widespread growth of cloud computing and mobile healthcare crowd sensing (MHCS), an increasing number of individuals are outsourcing their masses of bio-information in the cloud server to achieve convenient and efficient. In this environment, Cloud Data Center (CDC) needs to authenticate masses of information without revealing owners’ sensitive information. However, tremendous communication cost, storage space cost and checking time cost lead to CDC that give rise to all kinds of privacy concerns as well. To mitigate these issues, To mitigate these issues, we propose a data anonymous batch verification scheme for MHCS based on a certificateless double authentication preventing aggregate signature. The proposed scheme can authenticate all sensing bio-information in a privacy preserving way. We then present that the proposed CL-DAPAS scheme is existentially unforgeable in the Random Oracle Model (ROM) assuming that Computational Diffie-Hellman problem is difficult to solve. Furthermore, we provide an implementation and evaluate performance of the proposed scheme and demonstrate that it achieves less efficient computational cost compared with some related schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ganti, R.K., Ye, F., Lei, H.: Mobile crowdsensing: current state and future challenges. IEEE Commun. Mag. 49(11), 32–37 (2011)CrossRef Ganti, R.K., Ye, F., Lei, H.: Mobile crowdsensing: current state and future challenges. IEEE Commun. Mag. 49(11), 32–37 (2011)CrossRef
2.
go back to reference Pryss, R., Reichert, M., Herrmann, J., Langguth, B., Schlee, W.: Mobile crowd sensing in clinical and psychological trials – a case study. In: IEEE International Symposium on Computer-Based Medical Systems, pp. 23–24 (2015) Pryss, R., Reichert, M., Herrmann, J., Langguth, B., Schlee, W.: Mobile crowd sensing in clinical and psychological trials – a case study. In: IEEE International Symposium on Computer-Based Medical Systems, pp. 23–24 (2015)
4.
go back to reference Zhang, H., Zhang, Q., Du, X.: Toward vehicle-assisted cloud computing for smartphones. IEEE Trans. Veh. Technol. 12(64), 5610–5618 (2015)CrossRef Zhang, H., Zhang, Q., Du, X.: Toward vehicle-assisted cloud computing for smartphones. IEEE Trans. Veh. Technol. 12(64), 5610–5618 (2015)CrossRef
6.
go back to reference Li, T., Li, J., Liu, Z., Li, P., Jia, C.: Differentially private naive bayes learning over multiple data sources. Inf. Sci. 444, 89–104 (2018)MathSciNetCrossRef Li, T., Li, J., Liu, Z., Li, P., Jia, C.: Differentially private naive bayes learning over multiple data sources. Inf. Sci. 444, 89–104 (2018)MathSciNetCrossRef
7.
go back to reference Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)CrossRef Yu, Y., et al.: Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans. Inf. Forensics Secur. 12(4), 767–778 (2017)CrossRef
8.
go back to reference Li, Y., Yu, Y., Susilo, W., Min, G., Ni, J., Choo, R.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secur. Comput. 16(1), 72–83 (2019)CrossRef Li, Y., Yu, Y., Susilo, W., Min, G., Ni, J., Choo, R.: Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans. Dependable Secur. Comput. 16(1), 72–83 (2019)CrossRef
10.
go back to reference Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2019)MathSciNetCrossRef Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B.: Efficient attribute-based encryption with attribute revocation for assured data deletion. Inf. Sci. 479, 640–650 (2019)MathSciNetCrossRef
11.
go back to reference He, D., Chan, S., Guizani, M.: User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 22(1), 28–34 (2015)CrossRef He, D., Chan, S., Guizani, M.: User privacy and data trustworthiness in mobile crowd sensing. IEEE Wirel. Commun. 22(1), 28–34 (2015)CrossRef
12.
go back to reference Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J. 3(5), 839–853 (2016)CrossRef Gisdakis, S., Giannetsos, T., Papadimitratos, P.: Security, privacy, and incentive provision for mobile crowd sensing systems. IEEE Internet Things J. 3(5), 839–853 (2016)CrossRef
13.
go back to reference Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)CrossRef Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)CrossRef
15.
go back to reference Xiao, Y., Rayi, V., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. J. Comput. Commun. 30(11–12), 2314–2341 (2007)CrossRef Xiao, Y., Rayi, V., Sun, B., Du, X., Hu, F., Galloway, M.: A survey of key management schemes in wireless sensor networks. J. Comput. Commun. 30(11–12), 2314–2341 (2007)CrossRef
16.
go back to reference Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007)CrossRef Du, X., Xiao, Y., Guizani, M., Chen, H.H.: An effective key management scheme for heterogeneous sensor networks. Ad Hoc Netw. 5(1), 24–34 (2007)CrossRef
17.
go back to reference Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. Mag. 15(4), 60–66 (2008)CrossRef Du, X., Chen, H.H.: Security in wireless sensor networks. IEEE Wirel. Commun. Mag. 15(4), 60–66 (2008)CrossRef
18.
go back to reference Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Transactions papers, a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2009)CrossRef Du, X., Guizani, M., Xiao, Y., Chen, H.H.: Transactions papers, a routing-driven elliptic curve cryptography based key management scheme for heterogeneous sensor networks. IEEE Trans. Wirel. Commun. 8(3), 1223–1229 (2009)CrossRef
20.
go back to reference Xiong, H., Guan, Z., Chen, Z., Li, F.: An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219, 225–235 (2013)MathSciNetMATHCrossRef Xiong, H., Guan, Z., Chen, Z., Li, F.: An efficient certificateless aggregate signature with constant pairing computations. Inf. Sci. 219, 225–235 (2013)MathSciNetMATHCrossRef
21.
go back to reference Shen, L., Ma, J., Liu, X., Wei, F., Miao, M.: A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J. 4(2), 546–554 (2017)CrossRef Shen, L., Ma, J., Liu, X., Wei, F., Miao, M.: A secure and efficient id-based aggregate signature scheme for wireless sensor networks. IEEE Internet Things J. 4(2), 546–554 (2017)CrossRef
22.
go back to reference Kumar, P., Kumari, S., Sharma, V., Sangaiah, A.K., Wei, J., Li, X.: A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput. Inform. Syst. 18, 80–89 (2018) Kumar, P., Kumari, S., Sharma, V., Sangaiah, A.K., Wei, J., Li, X.: A certificateless aggregate signature scheme for healthcare wireless sensor network. Sustain. Comput. Inform. Syst. 18, 80–89 (2018)
23.
24.
go back to reference Deng, J., Xu, C., Wu, H., Dong, L.: A new certificateless signature with enhanced security and aggregation version. Concurr. Comput. Pract. Exp. 28(4), 1124–1133 (2016)CrossRef Deng, J., Xu, C., Wu, H., Dong, L.: A new certificateless signature with enhanced security and aggregation version. Concurr. Comput. Pract. Exp. 28(4), 1124–1133 (2016)CrossRef
25.
go back to reference Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificateless aggregate signatures from bilinear maps. In: IEEE SNPD 2007, vol. 3, pp. 188–193 (2007) Gong, Z., Long, Y., Hong, X., Chen, K.: Two certificateless aggregate signatures from bilinear maps. In: IEEE SNPD 2007, vol. 3, pp. 188–193 (2007)
26.
go back to reference Au, M.H., Yang, G., Susilo, W., Zhang, Y.: (Strong) Multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8), 1574–1592 (2014)CrossRef Au, M.H., Yang, G., Susilo, W., Zhang, Y.: (Strong) Multidesignated verifiers signatures secure against rogue key attack. Concurr. Comput. Pract. Exp. 26(8), 1574–1592 (2014)CrossRef
27.
go back to reference Tu, H., He, D., Huang, B.: Reattack of a certificateless aggregate signature scheme with constant pairing computations. Sci. World J. 2014, 1–9 (2014) Tu, H., He, D., Huang, B.: Reattack of a certificateless aggregate signature scheme with constant pairing computations. Sci. World J. 2014, 1–9 (2014)
28.
go back to reference Malhi, A.K., Batra, S.: An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discret. Math. Theor. Comput. Sci. 17(1), 317–320 (2015)MathSciNetMATH Malhi, A.K., Batra, S.: An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discret. Math. Theor. Comput. Sci. 17(1), 317–320 (2015)MathSciNetMATH
29.
go back to reference Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21(5), 1–11 (2014) Bayat, M., Barmshoory, M., Rahimi, M., Aref, M.R.: A secure authentication scheme for VANETs with batch verification. Wirel. Netw. 21(5), 1–11 (2014)
31.
go back to reference Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction. Theory Comput. Sci. 469, 1–14 (2013)MathSciNetMATHCrossRef Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction. Theory Comput. Sci. 469, 1–14 (2013)MathSciNetMATHCrossRef
35.
go back to reference Mao, S., Zhang, P., Wang, H., Zhang, H., Wu, W.: Cryptanalysis of a lattice based key exchange protocol. Sci. China Inf. Sci. 60(2), 028101–028105 (2017)CrossRef Mao, S., Zhang, P., Wang, H., Zhang, H., Wu, W.: Cryptanalysis of a lattice based key exchange protocol. Sci. China Inf. Sci. 60(2), 028101–028105 (2017)CrossRef
36.
go back to reference Wu, W., Zhang, H., Wang, H., Mao, S., Wu, S., Han, H.: Cryptanalysis of an MOR cryptosystem based on a finite associative algebra. Sci. China Inf. Sci. 59(3), 32111 (2016)CrossRef Wu, W., Zhang, H., Wang, H., Mao, S., Wu, S., Han, H.: Cryptanalysis of an MOR cryptosystem based on a finite associative algebra. Sci. China Inf. Sci. 59(3), 32111 (2016)CrossRef
37.
go back to reference Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signatures: new schemes and security models. Comput. J. 55(4), 457–474 (2011)CrossRef Huang, X., Mu, Y., Susilo, W., Wong, D.S., Wu, W.: Certificateless signatures: new schemes and security models. Comput. J. 55(4), 457–474 (2011)CrossRef
38.
go back to reference He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)CrossRef He, D., Zeadally, S., Xu, B., Huang, X.: An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans. Inf. Forensics Secur. 10(12), 2681–2691 (2015)CrossRef
Metadata
Title
An Efficient Anonymous Authentication Scheme Based on Double Authentication Preventing Signature for Mobile Healthcare Crowd Sensing
Authors
Jinhui Liu
Yong Yu
Yannan Li
Yanqi Zhao
Xiaojiang Du
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-14234-6_34

Premium Partner