A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT

被引:1
|
作者
Zou, Shihong [1 ]
Cao, Qiang [1 ]
Huangqi, Chonghui [2 ]
Huang, Anpeng [3 ]
Li, Yanping [4 ]
Wang, Chenyu [1 ]
Xu, Guoai [5 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Cyberspace Secur, Beijing 100876, Peoples R China
[2] Univ Southern Calif, Andrew & Erna Viterbi Sch Engn, Los Angeles, CA 90007 USA
[3] Beijing Goodwill Informat Technol Ltd, Technol R&D Ctr, Beijing 100085, Peoples R China
[4] Shaanxi Normal Univ, Sch Math & Stat, Xian 710119, Peoples R China
[5] Harbin Inst Technol, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2024年 / 11卷 / 17期
关键词
Authentication and key agreement (AKA); conditional anonymity; decentralized identity (DID); Internet of Medical Things (IoMT); medical data sharing; SECURITY;
D O I
10.1109/JIOT.2024.3406561
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As well known, Internet of Medical Things (IoMT) produces large amounts of medical data and promotes the medical data sharing which serves the data user (i.e., physicians) to boost the clinical treatment and medical research. To protect data user's privacy and data security during the sharing of medical data, the data user must have a self-sovereign decentralized identity (DID) and data access authority. In existing solutions, data user's privacy protection and authentication-key-agreement (AKA) for protecting data security are worked independently, which easily results in typical security attacks (e.g., phishing inquiry attacks and ephemeral secret leakage attacks) during data access and system computing overload. To solve the challenge, a new credential-embedded AKA (CAKA) scheme is proposed, which can seamlessly combine DID-credentials into AKA. First, CAKA supports bilateral authentication by allowing a digital user to authenticate its service provider, which can enhance the security of unilateral scheme (such as CanDID, IEEE S&P, 2021) and prevent phishing query attacks. Second, for secure data session communication, the user's DID-credentials are used as the kernel of the session key (SK) generation. In security analysis and performance metrics comparisons, the results indicate that CAKA holds a significant advantage, especially, the storage costs, communication costs, and computation costs consumed in CAKA are at least 43% reduction, compared to the alternatives. In simulation experiments of CAKA, the results show that DID authentication and SK agreement are both less than 15 ms, that means CAKA is a practical and promising solution to medical data sharing.
引用
收藏
页码:29174 / 29189
页数:16
相关论文
共 50 条
  • [41] A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks
    Odelu, Vanga
    Zeadally, Sherali
    Das, Ashok Kumar
    Wazid, Mohammad
    He, Debiao
    TELECOMMUNICATION SYSTEMS, 2018, 69 (04) : 431 - 445
  • [42] Privacy-Preserving Photo Sharing based on a Public Key Infrastructure
    Yuan, Lin
    McNally, David
    Kupcu, Alptekin
    Ebrahimi, Touradj
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXVIII, 2015, 9599
  • [43] Lightweight Privacy-Preserving Remote User Authentication and Key Agreement Protocol for Next-Generation IoT-Based Smart Healthcare
    Ashraf, Zeeshan
    Mahmood, Zahid
    Iqbal, Muddesar
    FUTURE INTERNET, 2023, 15 (12)
  • [44] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Xu, Tao
    Xu, Cheng
    Xu, Zisang
    CHINA COMMUNICATIONS, 2021, 18 (12) : 315 - 331
  • [45] An Efficient Three-Party Authentication and Key Agreement Protocol for Privacy-Preserving of IoT Devices in Mobile Edge Computing
    Ji, Sai
    Yuan, Yang
    Shen, Jian
    Lai, Chin-Feng
    Chen, Bofan
    JOURNAL OF INTERNET TECHNOLOGY, 2022, 23 (03): : 437 - 448
  • [46] An Efficient Three-Factor Privacy-Preserving Authentication and Key Agreement Protocol for Vehicular Ad-Hoc Network
    Tao Xu
    Cheng Xu
    Zisang Xu
    China Communications, 2021, 18 (12) : 315 - 331
  • [47] Scalable and Privacy-Preserving Data Sharing Based on Blockchain
    Zheng, Bao-Kun
    Zhu, Lie-Huang
    Shen, Meng
    Gao, Feng
    Zhang, Chuan
    Li, Yan-Dong
    Yang, Jing
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2018, 33 (03) : 557 - 567
  • [48] Scalable and Privacy-Preserving Data Sharing Based on Blockchain
    Bao-Kun Zheng
    Lie-Huang Zhu
    Meng Shen
    Feng Gao
    Chuan Zhang
    Yan-Dong Li
    Jing Yang
    Journal of Computer Science and Technology, 2018, 33 : 557 - 567
  • [49] Blockchain-based verifiable privacy-preserving data classification protocol for medical data
    Zheng, Xiaokun
    Zhao, Yanqi
    Li, Huilin
    Chen, Ruonan
    Zheng, Dong
    COMPUTER STANDARDS & INTERFACES, 2022, 82
  • [50] Lightweight authentication protocol for connected medical IoT through privacy-preserving access
    Tanveer, Muhammad
    Chelloug, Samia Allaoua
    Alabdulhafith, Maali
    Abd El-Latif, Ahmed A.
    EGYPTIAN INFORMATICS JOURNAL, 2024, 26