Skip to main content

2017 | OriginalPaper | Buchkapitel

On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment

verfasst von : Chun-Ta Li, Dong-Her Shih, Chun-Cheng Wang

Erschienen in: Information Science and Applications 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, Chiou et al. proposed a secure authentication scheme which not only ensures message confidentiality and patient anonymity but also provides real telemedicine system implementation. However, in this paper, we found that Chiou et al.’s telemedicine scheme has some security weaknesses such as (1) it fails to protect the confidentiality of patient’s inspection report and doctor’s treatment record, (2) it fails to provide the property of unlinkability. The above-mentioned design flaws in Chiou et al.’s scheme may lead to privacy exposure and malicious outsider can link and discover the sensitive relationship between the patient and the doctor.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Banerjee, A., Agrawal, P., Rajkumar, R.: Design of a cloud based emergency healthcare service model. Int. J. Appl. Eng. Res. 8(19), 2261–2264 (2013) Banerjee, A., Agrawal, P., Rajkumar, R.: Design of a cloud based emergency healthcare service model. Int. J. Appl. Eng. Res. 8(19), 2261–2264 (2013)
2.
Zurück zum Zitat Chen, C.L., Yang, T.T., Shih, T.F.: A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38(9), 1–12 (2014). article no. 112 Chen, C.L., Yang, T.T., Shih, T.F.: A secure medical data exchange protocol based on cloud environments. J. Med. Syst. 38(9), 1–12 (2014). article no. 112
3.
Zurück zum Zitat Chen, C.L., Yang, T.T., Chiang, M.L., Shih, T.F.: A privacy authentication scheme based on cloud for medical environments. J. Med. Syst. 38(11), 1–16 (2014). article no. 143 Chen, C.L., Yang, T.T., Chiang, M.L., Shih, T.F.: A privacy authentication scheme based on cloud for medical environments. J. Med. Syst. 38(11), 1–16 (2014). article no. 143
4.
Zurück zum Zitat Chiou, S.Y., Ying, Z., Liu, J.: Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4), 1–15 (2016). article no. 101CrossRef Chiou, S.Y., Ying, Z., Liu, J.: Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4), 1–15 (2016). article no. 101CrossRef
5.
Zurück zum Zitat He, D., Zeadally, S.: Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1), 71–77 (2015)CrossRef He, D., Zeadally, S.: Authentication protocol for ambient assisted living system. IEEE Commun. Mag. 35(1), 71–77 (2015)CrossRef
6.
Zurück zum Zitat He, D., Kumar, N., Chen, J.: Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Syst. 21(1), 49–60 (2015)CrossRef He, D., Kumar, N., Chen, J.: Robust anonymous authentication protocol for healthcare applications using wireless medical sensor networks. Multimedia Syst. 21(1), 49–60 (2015)CrossRef
7.
Zurück zum Zitat Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking Appl. 8(6), 1070–1081 (2015)CrossRef Jiang, Q., Ma, J., Lu, X., Tian, Y.: An efficient two-factor user authentication scheme with unlinkability for wireless sensor networks. Peer-to-Peer Networking Appl. 8(6), 1070–1081 (2015)CrossRef
8.
Zurück zum Zitat Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4), 2085–2101 (2016)MathSciNetCrossRefMATH Jiang, Q., Wei, F., Fu, S., Ma, J., Li, G., Alelaiwi, A.: Robust extended chaotic maps-based three-factor authentication scheme preserving biometric template privacy. Nonlinear Dyn. 83(4), 2085–2101 (2016)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Li, C.T., Lee, C.C., Wang, C.C., Yang, T.H., Chen, S.J.: Design flaws in a secure medical data exchange protocol based on cloud environments. In: Wang, G., Zomaya, A., Perez, G.M., Li, K. (eds.) ICA3PP 2015. LNCS, vol. 9532, pp. 435–444. Springer, Cham (2015). doi:10.1007/978-3-319-27161-3_39 CrossRef Li, C.T., Lee, C.C., Wang, C.C., Yang, T.H., Chen, S.J.: Design flaws in a secure medical data exchange protocol based on cloud environments. In: Wang, G., Zomaya, A., Perez, G.M., Li, K. (eds.) ICA3PP 2015. LNCS, vol. 9532, pp. 435–444. Springer, Cham (2015). doi:10.​1007/​978-3-319-27161-3_​39 CrossRef
10.
Zurück zum Zitat Li, C.T., Weng, C.Y., Lee, C.C.: A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8), 1–8 (2015). article no. 77CrossRef Li, C.T., Weng, C.Y., Lee, C.C.: A secure RFID tag authentication protocol with privacy preserving in telecare medicine information systems. J. Med. Syst. 39(8), 1–8 (2015). article no. 77CrossRef
11.
Zurück zum Zitat Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C.: A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11), 1–11 (2015). article no. 144CrossRef Li, C.T., Weng, C.Y., Lee, C.C., Wang, C.C.: A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. J. Med. Syst. 39(11), 1–11 (2015). article no. 144CrossRef
12.
Zurück zum Zitat Li, C.T., Lee, C.C., Weng, C.Y.: A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med. Syst. 40(5), 1–15 (2016). article no. 117CrossRef Li, C.T., Lee, C.C., Weng, C.Y.: A secure cloud-assisted wireless body area network in mobile emergency medical care system. J. Med. Syst. 40(5), 1–15 (2016). article no. 117CrossRef
13.
Zurück zum Zitat Padhy, R.P., Patra, M.R., Satapathy, S.C.: Design and implementation of a cloud based rural healthcare information system model. Univ. J. Comput. Sci. Eng. Technol. 2(1), 149–157 (2012) Padhy, R.P., Patra, M.R., Satapathy, S.C.: Design and implementation of a cloud based rural healthcare information system model. Univ. J. Comput. Sci. Eng. Technol. 2(1), 149–157 (2012)
Metadaten
Titel
On the Security of a Privacy Authentication Scheme Based on Cloud for Medical Environment
verfasst von
Chun-Ta Li
Dong-Her Shih
Chun-Cheng Wang
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-4154-9_28

Neuer Inhalt