Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.

Comput Methods Programs Biomed

Department of Information Management, National Yunlin University of Science and Technology, 123 University Road, Yunlin 64002, Taiwan, ROC.

Published: April 2018

Background And Objective:  With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated.

Methods:  Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks.

Results:  The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS.

Conclusions:  We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency.

Download full-text PDF

Source
http://dx.doi.org/10.1016/j.cmpb.2018.02.002DOI Listing

Publication Analysis

Top Keywords

mutual authentication
12
privacy preservation
12
authentication protocol
12
mohit et al's
12
cloud-assisted tmis
12
protocol
11
authentication privacy
8
preservation protocol
8
telecare medical
8
patient anonymity
8

Similar Publications

Introduction: The Centers for Disease Control and Prevention (CDC) funded Cancer Prevention and Control Research Network (CPCRN) is a national network which aims to accelerate the adoption and implementation of evidence-based cancer prevention and control strategies and interventions in communities, enhance large-scale efforts to reach underserved populations and reduce their cancer-related health disparities, and develop the capacity of the dissemination and implementation work force specifically in cancer prevention and control.

Methods: Our site has been a part of the CPCRN since its inception in 2002 with the exception of the 2004-2009 funding cycle. As community-based participatory research is a core value of our center, we examined the development and continued engagement of our community partners using a qualitative, inductive approach to identify emergent themes from focus group sessions with current and past investigators.

View Article and Find Full Text PDF

Physical Layer Security (PLS) in Cognitive Radio Networks (CRN) improves the confidentiality, availability, and integrity of the external communication between the devices/ users. The security models for sensing and beamforming reduce the impact of adversaries such as eavesdroppers in the signal processing layer. To such an extent, this article introduces a Secure Channel Estimation Model (SCEM) using Channel State Information (CSI) and Deep Learning (DL) to improve the PLS.

View Article and Find Full Text PDF

The Internet of Vehicles (IoV), a key component of smart transportation systems, leverages 5G communication for low-latency data transmission, facilitating real-time interactions between vehicles, roadside units (RSUs), and sensor networks. However, the open nature of 5G communication channels exposes IoV systems to significant security threats, such as eavesdropping, replay attacks, and message tampering. To address these challenges, this paper proposes the Efficient Cluster-based Mutual Authentication and Key Update Protocol (ECAUP) designed to secure IoV systems within 5G-enabled sensor networks.

View Article and Find Full Text PDF

With recent significant advancements in artificial intelligence, the necessity for more reliable recognition systems has rapidly increased to safeguard individual assets. The use of brain signals for authentication has gained substantial interest within the scientific community over the past decade. Most previous efforts have focused on identifying distinctive information within electroencephalogram (EEG) recordings.

View Article and Find Full Text PDF

This perspective article shares the viewpoints of two long-standing patient safety advocates who have participated first-hand in the evolution of patient engagement in healthcare quality and safety. Their involvement is motivated by a rejection of the common cruelty of institutional betrayal that compounds harm when patient safety fails. The advocates have sought to understand how it can be that fractured trust spreads so predictably after harm, just when it most needs strengthening.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!