A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT

被引:1
|
作者
Zou, Shihong [1 ]
Cao, Qiang [1 ]
Huangqi, Chonghui [2 ]
Huang, Anpeng [3 ]
Li, Yanping [4 ]
Wang, Chenyu [1 ]
Xu, Guoai [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Univ Southern Calif, Andrew & Erna Viterbi Sch Engn, Los Angeles, CA 90007 USA
[3] Beijing Goodwill Informat Technol Ltd, Technol R&D Ctr, Beijing 100085, Peoples R China
[4] Shaanxi Normal Univ, Sch Math & Stat, Xian 710119, Peoples R China
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 17期
关键词
Authentication and key agreement (AKA); conditional anonymity; decentralized identity (DID); Internet of Medical Things (IoMT); medical data sharing; SECURITY;
D O I
10.1109/JIOT.2024.3406561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As well known, Internet of Medical Things (IoMT) produces large amounts of medical data and promotes the medical data sharing which serves the data user (i.e., physicians) to boost the clinical treatment and medical research. To protect data user's privacy and data security during the sharing of medical data, the data user must have a self-sovereign decentralized identity (DID) and data access authority. In existing solutions, data user's privacy protection and authentication-key-agreement (AKA) for protecting data security are worked independently, which easily results in typical security attacks (e.g., phishing inquiry attacks and ephemeral secret leakage attacks) during data access and system computing overload. To solve the challenge, a new credential-embedded AKA (CAKA) scheme is proposed, which can seamlessly combine DID-credentials into AKA. First, CAKA supports bilateral authentication by allowing a digital user to authenticate its service provider, which can enhance the security of unilateral scheme (such as CanDID, IEEE S&P, 2021) and prevent phishing query attacks. Second, for secure data session communication, the user's DID-credentials are used as the kernel of the session key (SK) generation. In security analysis and performance metrics comparisons, the results indicate that CAKA holds a significant advantage, especially, the storage costs, communication costs, and computation costs consumed in CAKA are at least 43% reduction, compared to the alternatives. In simulation experiments of CAKA, the results show that DID authentication and SK agreement are both less than 15 ms, that means CAKA is a practical and promising solution to medical data sharing.
引用
收藏
页码:29174 / 29189
页数:16
相关论文
共 50 条
  • [1] A Lightweight and Privacy-Preserving Mutual Authentication and Key Agreement Protocol for Internet of Drones Environment
    Pu, Cong
    Wall, Andrew
    Choo, Kim-Kwang Raymond
    Ahmed, Imtiaz
    Lim, Sunho
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (12): : 9918 - 9933
  • [2] Blockchain-based Privacy-preserving Authentication Key Agreement Protocol for Industrial Wireless Sensor Networks
    Su, Xing
    Xie, Yong
    Wang, Hongyuan
    Wang, Hui
    2022 IEEE 28TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, ICPADS, 2022, : 234 - 241
  • [3] A secure and privacy-preserving key agreement and mutual authentication scheme
    Li, Hui
    Jing, Tao
    Qian, Jin
    INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2020, 34 (04) : 201 - 213
  • [4] A Privacy-Preserving Authentication and Key Agreement Scheme with Deniability for IoT
    Zhou, Yousheng
    Liu, Tong
    Tang, Fei
    Wang, Feng
    Tinashe, Magara
    ELECTRONICS, 2019, 8 (04):
  • [5] A Location Privacy-Preserving Protocol Based on Homomorphic Encryption and Key Agreement
    Zhu, Xiaoling
    Lu, Yang
    Zhu, Xiaojuan
    Qiu, Shuwei
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 54 - 59
  • [6] BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles
    Xie, Xianwang
    Wu, Bin
    Hou, Botao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 138
  • [7] An efficient ECC-based privacy-preserving client authentication protocol with key agreement using smart card
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2015, 21 : 1 - 19
  • [8] A Privacy-Preserving Medical Data Sharing Scheme Based on Blockchain
    Xu, Guangquan
    Qi, Chen
    Dong, Wenyu
    Gong, Lixiao
    Liu, Shaoying
    Chen, Si
    Liu, Jian
    Zheng, Xi
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2023, 27 (02) : 698 - 709
  • [9] User-empowered Privacy-preserving Authentication Protocol for Electric Vehicle Charging Based on Decentralized Identity and Verifiable Credential
    Parameswarath, Rohini Poolat
    Gope, Prosanta
    Sikdar, Biplab
    ACM TRANSACTIONS ON MANAGEMENT INFORMATION SYSTEMS, 2022, 13 (04)
  • [10] Decentralized Privacy-Preserving Platform for Clinical Data Sharing and Analysis
    Tong, Sui Jun
    Yang, Yong
    Sun, Wen
    Xia, Eryu
    Li, Shao Chun
    MEDINFO 2019: HEALTH AND WELLBEING E-NETWORKS FOR ALL, 2019, 264 : 839 - 842