Skip to main content
Erschienen in: Information Systems Frontiers 4/2021

18.03.2021

Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System

verfasst von: Trupil Limbasiya, Sanjay Kumar Sahay, Bharath Sridharan

Erschienen in: Information Systems Frontiers | Ausgabe 4/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The usage of different technologies and smart devices helps people to get medical services remotely for multiple benefits. Thus, critical and sensitive data is exchanged between a user and a doctor. When health data is transmitted over a common channel, it becomes essential to preserve various privacy and security properties in the system. Further, the number of users for remote services is increasing day-by-day exponentially, and thus, it is not adequate to deal with all users using the one server due to the verification overhead, server failure, and scalability issues. Thus, researchers proposed various authentication protocols for multi-server architecture, but most of them are vulnerable to different security attacks and require high computational resources during the implementation. To Tackle privacy and security issues using less computational resources, we propose a privacy-preserving mutual authentication and key agreement protocol for a multi-server healthcare system. We discuss the proposed scheme’s security analysis and performance results to understand its security strengths and the computational resource requirement, respectively. Further, we do the comparison of security and performance results with recent relevant authentication protocols.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of medical systems, 36(1), 93–101. Al Ameen, M., Liu, J., & Kwak, K. (2012). Security and privacy issues in wireless sensor networks for healthcare applications. Journal of medical systems, 36(1), 93–101.
Zurück zum Zitat Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787–2805.CrossRef Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer networks, 54(15), 2787–2805.CrossRef
Zurück zum Zitat Chen, C.T., & Lee, C.C. (2015). A two-factor authentication scheme with anonymity for multi-server environments. Security and Communication Networks, 8(8), 1608–1625. Chen, C.T., & Lee, C.C. (2015). A two-factor authentication scheme with anonymity for multi-server environments. Security and Communication Networks, 8(8), 1608–1625.
Zurück zum Zitat Dang, Q.H. (2015). Secure hash standard (No. Federal Inf. Process. Stds.(NIST FIPS)-180-4), pp. 1–36. Dang, Q.H. (2015). Secure hash standard (No. Federal Inf. Process. Stds.(NIST FIPS)-180-4), pp. 1–36.
Zurück zum Zitat Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks. Ferrag, M.A., Maglaras, L.A., Janicke, H., Jiang, J., & Shu, L. (2017). Authentication protocols for internet of things: a comprehensive survey. Security and Communication Networks.
Zurück zum Zitat Hsiang, H.C., & Shih, W.K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118–1123. Hsiang, H.C., & Shih, W.K. (2009). Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(6), 1118–1123.
Zurück zum Zitat Irshad, A., Sher, M., Nawaz, O., Chaudhry, S.A., Khan, I., & Kumari, S. (2017). A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multimedia Tools and Applications, 76(15), 16463–16489. Irshad, A., Sher, M., Nawaz, O., Chaudhry, S.A., Khan, I., & Kumari, S. (2017). A secure and provable multi-server authenticated key agreement for TMIS based on Amin et al. scheme. Multimedia Tools and Applications, 76(15), 16463–16489.
Zurück zum Zitat Islam, S.R., Kwak, D., Kabir, M.H., Hossain, M., & Kwak, K.S. (2015). The internet of things for health care: a comprehensive survey. IEEE Access, 3, 678–708. Islam, S.R., Kwak, D., Kabir, M.H., Hossain, M., & Kwak, K.S. (2015). The internet of things for health care: a comprehensive survey. IEEE Access, 3, 678–708.
Zurück zum Zitat Ji, Y., Zhang, J., Ma, J., Yang, C., & Yao, X. (2018). BMPLS: blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems. Journal of medical systems, 42(8), 147. Ji, Y., Zhang, J., Ma, J., Yang, C., & Yao, X. (2018). BMPLS: blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems. Journal of medical systems, 42(8), 147.
Zurück zum Zitat Juang, W.S. (2004). Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 251–255. Juang, W.S. (2004). Efficient multi-server password authenticated key agreement using smart cards. IEEE Transactions on Consumer Electronics, 50(1), 251–255.
Zurück zum Zitat Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Annual International Cryptology Conference (pp. 388–397). Springer, Berlin. Kocher, P., Jaffe, J., & Jun, B. (1999). Differential power analysis. In Annual International Cryptology Conference (pp. 388–397). Springer, Berlin.
Zurück zum Zitat Lee, C.C., Lou, D.C., Li, C.T., & Hsu, C.W. (2014). An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dynamics, 76(1), 853–866. Lee, C.C., Lou, D.C., Li, C.T., & Hsu, C.W. (2014). An extended chaotic-maps-based protocol with key agreement for multiserver environments. Nonlinear Dynamics, 76(1), 853–866.
Zurück zum Zitat Li, C.T., Lee, C.C., Weng, C.Y., & Fan, C.I. (2013). An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Transactions on Internet & Information Systems, 7(1), 119–131. Li, C.T., Lee, C.C., Weng, C.Y., & Fan, C.I. (2013). An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity. KSII Transactions on Internet & Information Systems, 7(1), 119–131.
Zurück zum Zitat Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless communications, 17(1), 51–58. Li, M., Lou, W., & Ren, K. (2010). Data security and privacy in wireless body area networks. IEEE Wireless communications, 17(1), 51–58.
Zurück zum Zitat Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769. Li, X., Xiong, Y., Ma, J., & Wang, W. (2012). An efficient and security dynamic identity based authentication protocol for multi-server architecture using smart cards. Journal of Network and Computer Applications, 35(2), 763–769.
Zurück zum Zitat Liao, Y.P., & Wang, S.S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24–29. Liao, Y.P., & Wang, S.S. (2009). A secure dynamic ID based remote user authentication scheme for multi-server environment. Computer Standards & Interfaces, 31(1), 24–29.
Zurück zum Zitat Limbasiya, T., & Doshi, N. (2017). An analytical study of biometric based remote user authentication schemes using smart cards. Computers & Electrical Engineering, 59, 305–321. Limbasiya, T., & Doshi, N. (2017). An analytical study of biometric based remote user authentication schemes using smart cards. Computers & Electrical Engineering, 59, 305–321.
Zurück zum Zitat Limbasiya, T., & Sahay, S.K. (2019). Secure and Energy-Efficient Key-Agreement Protocol for Multi-server Architecture. In International Conference On Secure Knowledge Management In Artificial Intelligence Era (pp. 82–97). Springer, Singapore. Limbasiya, T., & Sahay, S.K. (2019). Secure and Energy-Efficient Key-Agreement Protocol for Multi-server Architecture. In International Conference On Secure Knowledge Management In Artificial Intelligence Era (pp. 82–97). Springer, Singapore.
Zurück zum Zitat Limbasiya, T., & Das, D. (2020). SearchCom: Vehicular Cloud-based Secure and Energy-Efficient Communication and Searching System for Smart Transportation. In Proceedings of the 21st International Conference on Distributed Computing and Networking (pp. 1–10). Limbasiya, T., & Das, D. (2020). SearchCom: Vehicular Cloud-based Secure and Energy-Efficient Communication and Searching System for Smart Transportation. In Proceedings of the 21st International Conference on Distributed Computing and Networking (pp. 1–10).
Zurück zum Zitat Lu, Y., Li, L., Yang, X., & Yang, Y. (2015). Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS One, 10(5), e0126323–e0126323. Lu, Y., Li, L., Yang, X., & Yang, Y. (2015). Robust biometrics based authentication and key agreement scheme for multi-server environments using smart cards. PLoS One, 10(5), e0126323–e0126323.
Zurück zum Zitat Lwamo, N.M., Zhu, L., Xu, C., Sharif, K., Liu, X., & Zhang, C. (2019). SUAA: A secure user authentication scheme with anonymity for the single and multi-server environments. Information Sciences, 477, 369–385. Lwamo, N.M., Zhu, L., Xu, C., Sharif, K., Liu, X., & Zhang, C. (2019). SUAA: A secure user authentication scheme with anonymity for the single and multi-server environments. Information Sciences, 477, 369–385.
Zurück zum Zitat Madhusudhan, R., & Mittal, R.C. (2012). Dynamic ID-based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications, 35(4), 1235–1248. Madhusudhan, R., & Mittal, R.C. (2012). Dynamic ID-based remote user password authentication schemes using smart cards: A review. Journal of Network and Computer Applications, 35(4), 1235–1248.
Zurück zum Zitat Masdari, M., & Ahmadzadeh, S. (2017). A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems. Journal of Network and Computer Applications, 87, 1–19. Masdari, M., & Ahmadzadeh, S. (2017). A survey and taxonomy of the authentication schemes in Telecare Medicine Information Systems. Journal of Network and Computer Applications, 87, 1–19.
Zurück zum Zitat Messerges, T.S., Dabbish, E.A., & Sloan, R.H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE transactions on computers, 51(5), 541–552. Messerges, T.S., Dabbish, E.A., & Sloan, R.H. (2002). Examining smart-card security under the threat of power analysis attacks. IEEE transactions on computers, 51(5), 541–552.
Zurück zum Zitat Mishra, D., Das, A.K., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129–8143. Mishra, D., Das, A.K., & Mukhopadhyay, S. (2014). A secure user anonymity-preserving biometric-based multi-server authenticated key agreement scheme using smart cards. Expert Systems with Applications, 41(18), 8129–8143.
Zurück zum Zitat Mishra, D., & Dhal, S. (2018). Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card. Wireless Personal Communications, 99(1), 1–21. Mishra, D., & Dhal, S. (2018). Privacy Preserving Password-Based Multi-server Authenticated Key Agreement Protocol Using Smart Card. Wireless Personal Communications, 99(1), 1–21.
Zurück zum Zitat Odelu, V., Das, A.K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966. Odelu, V., Das, A.K., & Goswami, A. (2015). A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Transactions on Information Forensics and Security, 10(9), 1953–1966.
Zurück zum Zitat Qiao, H., Dong, X., & Shen, Y. (2019). Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS. Journal of medical systems, 43(11), 321. Qiao, H., Dong, X., & Shen, Y. (2019). Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS. Journal of medical systems, 43(11), 321.
Zurück zum Zitat Sood, S.K., Sarje, A.K., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618. Sood, S.K., Sarje, A.K., & Singh, K. (2011). A secure dynamic identity based authentication protocol for multi-server architecture. Journal of Network and Computer Applications, 34(2), 609–618.
Zurück zum Zitat Tsaur, W.J., Li, J.H., & Lee, W.B. (2012). An efficient and secure multi-server authentication scheme with key agreement. Journal of Systems and Software, 85(4), 876–882. Tsaur, W.J., Li, J.H., & Lee, W.B. (2012). An efficient and secure multi-server authentication scheme with key agreement. Journal of Systems and Software, 85(4), 876–882.
Zurück zum Zitat Xue, K., Hong, P., & Ma, C. (2014). A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. Journal of Computer and System Sciences, 80(1), 195–206. Xue, K., Hong, P., & Ma, C. (2014). A lightweight dynamic pseudonym identity based authentication and key agreement protocol without verification tables for multi-server architecture. Journal of Computer and System Sciences, 80(1), 195–206.
Zurück zum Zitat Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258. Yang, Y., Wu, L., Yin, G., Li, L., & Zhao, H. (2017). A survey on security and privacy issues in Internet-of-Things. IEEE Internet of Things Journal, 4(5), 1250–1258.
Zurück zum Zitat Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things journal, 1(1), 22–32. Zanella, A., Bui, N., Castellani, A., Vangelista, L., & Zorzi, M. (2014). Internet of things for smart cities. IEEE Internet of Things journal, 1(1), 22–32.
Metadaten
Titel
Privacy-Preserving Mutual Authentication and Key Agreement Scheme for Multi-Server Healthcare System
verfasst von
Trupil Limbasiya
Sanjay Kumar Sahay
Bharath Sridharan
Publikationsdatum
18.03.2021
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 4/2021
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-021-10115-x

Weitere Artikel der Ausgabe 4/2021

Information Systems Frontiers 4/2021 Zur Ausgabe

Premium Partner