A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT

被引:1
|
作者
Zou, Shihong [1 ]
Cao, Qiang [1 ]
Huangqi, Chonghui [2 ]
Huang, Anpeng [3 ]
Li, Yanping [4 ]
Wang, Chenyu [1 ]
Xu, Guoai [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Univ Southern Calif, Andrew & Erna Viterbi Sch Engn, Los Angeles, CA 90007 USA
[3] Beijing Goodwill Informat Technol Ltd, Technol R&D Ctr, Beijing 100085, Peoples R China
[4] Shaanxi Normal Univ, Sch Math & Stat, Xian 710119, Peoples R China
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 17期
关键词
Authentication and key agreement (AKA); conditional anonymity; decentralized identity (DID); Internet of Medical Things (IoMT); medical data sharing; SECURITY;
D O I
10.1109/JIOT.2024.3406561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As well known, Internet of Medical Things (IoMT) produces large amounts of medical data and promotes the medical data sharing which serves the data user (i.e., physicians) to boost the clinical treatment and medical research. To protect data user's privacy and data security during the sharing of medical data, the data user must have a self-sovereign decentralized identity (DID) and data access authority. In existing solutions, data user's privacy protection and authentication-key-agreement (AKA) for protecting data security are worked independently, which easily results in typical security attacks (e.g., phishing inquiry attacks and ephemeral secret leakage attacks) during data access and system computing overload. To solve the challenge, a new credential-embedded AKA (CAKA) scheme is proposed, which can seamlessly combine DID-credentials into AKA. First, CAKA supports bilateral authentication by allowing a digital user to authenticate its service provider, which can enhance the security of unilateral scheme (such as CanDID, IEEE S&P, 2021) and prevent phishing query attacks. Second, for secure data session communication, the user's DID-credentials are used as the kernel of the session key (SK) generation. In security analysis and performance metrics comparisons, the results indicate that CAKA holds a significant advantage, especially, the storage costs, communication costs, and computation costs consumed in CAKA are at least 43% reduction, compared to the alternatives. In simulation experiments of CAKA, the results show that DID authentication and SK agreement are both less than 15 ms, that means CAKA is a practical and promising solution to medical data sharing.
引用
收藏
页码:29174 / 29189
页数:16
相关论文
共 50 条
  • [21] Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
    Xu, Ye
    Li, Fengying
    Cao, Bin
    2019 COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2019, : 157 - 162
  • [22] A privacy-preserving data sharing system with decentralized attribute-based encryption scheme
    Kang, Li
    Zhang, Leyou
    International Journal of Network Security, 2020, 22 (05) : 815 - 827
  • [23] Privacy-Preserving Blockchain-Based Data Sharing Platform for Decentralized Storage Systems
    Van-Hoan Hoang
    Lehtihet, Elyes
    Ghamri-Doudane, Yacine
    2020 IFIP NETWORKING CONFERENCE AND WORKSHOPS (NETWORKING), 2020, : 280 - 288
  • [24] An efficient biometric-based privacy-preserving three-party authentication with key agreement protocol using smart cards
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4136 - 4156
  • [25] Enabling Privacy-preserving Sharing of Genomic Data for GWASs in Decentralized Networks
    Zhang, Yanjun
    Zhao, Xin
    Li, Xue
    Zhong, Mingyang
    Curtis, Caitlin
    Chen, Chen
    PROCEEDINGS OF THE TWELFTH ACM INTERNATIONAL CONFERENCE ON WEB SEARCH AND DATA MINING (WSDM'19), 2019, : 204 - 212
  • [26] An Improved Authentication and Key Agreement Protocol Preserving User's Privacy Using Smart Cards
    Jia, Zhongtian
    Zhang, Yuan
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 577 - 582
  • [27] Permissioned Blockchain-Based Secure and Privacy-Preserving Data Sharing Protocol
    Wang, Zhiwei
    Chen, Qingqing
    Liu, Lei
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (12) : 10698 - 10707
  • [28] Blockchain-Empowered Secure and Privacy-Preserving Health Data Sharing in Edge-Based IoMT
    Nie, Xueli
    Zhang, Aiqing
    Chen, Jindou
    Qu, Youyang
    Yu, Shui
    Security and Communication Networks, 2022, 2022
  • [29] A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth
    Xu, Shujiang
    Zhong, Jinrong
    Wang, Lianhai
    He, Debiao
    Zhang, Shuhui
    Shao, Wei
    CONNECTION SCIENCE, 2023, 35 (01)
  • [30] Blockchain-Empowered Secure and Privacy-Preserving Health Data Sharing in Edge-Based IoMT
    Nie, Xueli
    Zhang, Aiqing
    Chen, Jindou
    Qu, Youyang
    Yu, Shui
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022