Mutual Authentication Protocol for Cloud-based E-health Systems
Resumo
The development of the Internet of Things predicts several new applications, of which some are designed to be incorporated to e-health systems. The assistance of cloud computing in the authentication procedure can relieve resource-constrained devices employed in Telecare Medicine Information Systems (TMIS). Their security is fundamental for the achievement of optimal performance, regarding the sensibility of e-health shared data and, especially, the anonymity of patients and other entities. This paper introduces a new mutual authentication protocol for e-health systems that ensures security and surpasses the performance and security of other authentication procedures reported in the literature.
Referências
Mohit, P., Amin, R., Karati, A., Biswas, G. P., Khan, M. K., (2017) "A standard mutual authentication protocol for cloud computing based health care system.", Journal of medical systems, v.41, n. 4, p. 50.
Jiang, Q., Khan, K. M., Lu, X., Ma, J. and He, D., (2016) “A privacy preserving three-factor authentication protocol for e-health clouds.” In The Journal of Supercomputing, v. 72, n. 10, p. 3826–3849.
Jiang, Q., Lian, X., Yang, Chao., Ma, J., Tian, Y. and Yang, Y., (2016) “A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth.”, In Journal of medical systems, v. 40, n. 11, p. 4650–4666.
Li, X., Niu, J., Karuppiah, M., Kumari, S. and Wu, F., (2016) “Secure and efficient twofactor user authentication scheme with user anonymity for network based e-health care applications.”, In Journal of medical systems, v. 40, n. 12, p. 268.
Amin, R., Islam, S. K., Biswas, G. P., Giri, D., Khan, K. M. and Kumar, N., (2016“A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.”, In Security and Communication Networks, v. 9, n. 17, p. 4650–4666.
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H. and Tang, Y., (2018), “Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks.”, In Journal of Network and Computer Applications, v. 106, p. 117-123.
Rghioui, A., Sendra, S., Lloret, J., Oumnad, A., (2016) “Internet of things for measuring human activities in ambient assisted living and e-health”, In Network Protocols and Algorithms, v.8, n. 3, p. 15-28.
Silva, BMC., Rodrigues, JJPC., Canelo, F., Lopes, IMC., Lloret, J., (2014) “Towards a cooperative security system for mobile-health applications”, In Electronic Commerce Research, p. 1-27.