A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT

被引:1
|
作者
Zou, Shihong [1 ]
Cao, Qiang [1 ]
Huangqi, Chonghui [2 ]
Huang, Anpeng [3 ]
Li, Yanping [4 ]
Wang, Chenyu [1 ]
Xu, Guoai [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Univ Southern Calif, Andrew & Erna Viterbi Sch Engn, Los Angeles, CA 90007 USA
[3] Beijing Goodwill Informat Technol Ltd, Technol R&D Ctr, Beijing 100085, Peoples R China
[4] Shaanxi Normal Univ, Sch Math & Stat, Xian 710119, Peoples R China
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 17期
关键词
Authentication and key agreement (AKA); conditional anonymity; decentralized identity (DID); Internet of Medical Things (IoMT); medical data sharing; SECURITY;
D O I
10.1109/JIOT.2024.3406561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As well known, Internet of Medical Things (IoMT) produces large amounts of medical data and promotes the medical data sharing which serves the data user (i.e., physicians) to boost the clinical treatment and medical research. To protect data user's privacy and data security during the sharing of medical data, the data user must have a self-sovereign decentralized identity (DID) and data access authority. In existing solutions, data user's privacy protection and authentication-key-agreement (AKA) for protecting data security are worked independently, which easily results in typical security attacks (e.g., phishing inquiry attacks and ephemeral secret leakage attacks) during data access and system computing overload. To solve the challenge, a new credential-embedded AKA (CAKA) scheme is proposed, which can seamlessly combine DID-credentials into AKA. First, CAKA supports bilateral authentication by allowing a digital user to authenticate its service provider, which can enhance the security of unilateral scheme (such as CanDID, IEEE S&P, 2021) and prevent phishing query attacks. Second, for secure data session communication, the user's DID-credentials are used as the kernel of the session key (SK) generation. In security analysis and performance metrics comparisons, the results indicate that CAKA holds a significant advantage, especially, the storage costs, communication costs, and computation costs consumed in CAKA are at least 43% reduction, compared to the alternatives. In simulation experiments of CAKA, the results show that DID authentication and SK agreement are both less than 15 ms, that means CAKA is a practical and promising solution to medical data sharing.
引用
收藏
页码:29174 / 29189
页数:16
相关论文
共 50 条
  • [31] Identity (ID)-based authentication and the key agreement protocol
    School of Electronics and Information Engineering, Beijing Jiaotong Univ., Beijing 100044, China
    不详
    不详
    Xi'an Dianzi Keji Daxue Xuebao, 2008, 3 (559-562):
  • [32] BPDS: A Blockchain based Privacy-Preserving Data Sharing for Electronic Medical Records
    Liu, Jingwei
    Li, Xiaolu
    Ye, Lin
    Zhang, Hongli
    Du, Xiaojiang
    Guizani, Mohsen
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,
  • [33] A blockchain-based scheme for privacy-preserving and secure sharing of medical data
    Huang, Haiping
    Zhu, Peng
    Xiao, Fu
    Sun, Xiang
    Huang, Qinglong
    COMPUTERS & SECURITY, 2020, 99
  • [34] Shared group session key-based conditional privacy-preserving authentication protocol for VANETs
    Zhang, Run
    Zhou, Wenan
    VEHICULAR COMMUNICATIONS, 2024, 47
  • [35] Similarity Test for Privacy-Preserving Medical Data Sharing Based on NTRU Encryption
    Xie, Shaofen
    Wu, Faguo
    Zhang, Xiao
    Yao, Wang
    Zheng, Zhiming
    PROCEEDINGS OF 2019 IEEE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2019), 2019, : 20 - 23
  • [36] Data Sharing and Privacy-Preserving of Medical Records Using Blockchain
    Kavathekar, Shraddha Suhas
    Patil, Rahul
    SUSTAINABLE COMMUNICATION NETWORKS AND APPLICATION, ICSCN 2019, 2020, 39 : 65 - 72
  • [37] Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication
    Xiaofen Wang
    Yi Mu
    Rongmao Chen
    Wireless Personal Communications, 2017, 95 : 3509 - 3537
  • [38] Privacy-Preserving Data Packet Filtering Protocol with Source IP Authentication
    Wang, Xiaofen
    Mu, Yi
    Chen, Rongmao
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (04) : 3509 - 3537
  • [39] An efficient and certificateless conditional privacy-preserving authentication and key agreement scheme for smart healthcare
    Hu, Yihao
    Huang, Chunguang
    Cheng, Hai
    COMPUTER COMMUNICATIONS, 2024, 219 : 29 - 41
  • [40] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Vanga Odelu
    Sherali Zeadally
    Ashok Kumar Das
    Mohammad Wazid
    Debiao He
    Telecommunication Systems, 2018, 69 : 431 - 445