A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange

被引:8
|
作者
Singh, B. Mohinder [1 ]
Natarajan, Jaisankar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamilnadu, India
关键词
Authentication protocol; eHealth records; Post -quantum crypto algorithm; Symmetric crypto-algorithm; Asymmetric crypto-algorithm; Minimized key exchange; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; HEALTH-CARE;
D O I
10.1016/j.jksuci.2023.101629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wake of covid19, many countries are shifting their paper-based health record management from manual processes to digital ones. The major benefit of digital health record is that data can be easily shared. As health data is sensitive, more security is to be provided to gain the trust of stakeholders. In this paper, a novel secure authentication protocol is planned for digitalizing personal health record that will be used by the user. While transacting data, a key is used to secure it. Many protocols used elliptic curve cryptography. In this proposed protocol, at an initial stage, an asymmetric and quantum-resistant cryptoalgorithm, Kyber is used. In further stages, symmetric crypto-algorithm, Advanced Encryption Standard in Galois/Counter mode (AES-GCM) is used to secure transferred data. For every session, a new key is generated for secure transactions. The more interesting fact in this protocol is that transactions are secured without exchanging actual key and also minimized the key exchange. This protocol not only verified the authenticity of user but also checked rightful citizenship of user. This protocol is analyzed for various security traits using ProVerif tool and provided better results relating to security provisioning, cost of storage, and computation as opposed to related protocols.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [1] An authentication and key exchange protocol for secure credential services
    Shin, SeongHan
    Kobara, Kazukuni
    Imai, Hideki
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 443 - 458
  • [2] Image based Authentication with Secure Key Exchange Mechanism in Cloud
    Tomar, Anurag Singh
    Tak, Gaurav Kumar
    Chaudhary, Ruchi
    2014 INTERNATIONAL CONFERENCE ON MEDICAL IMAGING, M-HEALTH & EMERGING COMMUNICATION SYSTEMS (MEDCOM), 2015, : 428 - 431
  • [3] A Secure Authentication and Key Exchange Protocol for Vehicles to Infrastructure Network
    Xu, Peng
    Wang, Xiuzhen
    Chen, Meirong
    INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS, 2025, 18 (01)
  • [4] A new authentication and key exchange protocol in WLAN
    Zhuo, C
    Fan, H
    Liang, H
    ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 552 - 556
  • [5] A secure key exchange and mutual authentication protocol for wireless mobile communications
    He Yijun
    Xu Nan
    Li Jie
    ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 558 - +
  • [6] Towards a Secure Mutual Authentication and Key Exchange Protocol for Mobile Communications
    He, Yijun
    Lee, Moon-Chuen
    2008 6TH INTERNATIONAL SYMPOSIUM ON MODELING AND OPTIMIZATION IN MOBILE, AD HOC AND WIRELESS NETWORKS AND WORKSHOPS, VOLS 1 AND 2, 2008, : 216 - 222
  • [7] A new Authentication and Key Exchange Protocol for Insecure Networks
    Fereidooni, H.
    Taheri, H.
    Mahramian, M.
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4541 - +
  • [8] A new two-server authentication and key agreement protocol for accessing secure cloud services
    Chattaraj, Durbadal
    Sarma, Monalisa
    Das, Ashok Kumar
    COMPUTER NETWORKS, 2018, 131 : 144 - 164
  • [9] A New Strongly Secure Authenticated Key Exchange Protocol
    Cheng, Qingfeng
    Ma, Chuangui
    Hu, Xuexian
    ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 135 - 144
  • [10] Secure Key Agreement and Authentication Protocol for Message Confirmation in Vehicular Cloud Computing
    Lee, JoonYoung
    Yu, SungJin
    Kim, MyeongHyun
    Park, YoungHo
    Lee, SangWoo
    Chung, BoHeung
    APPLIED SCIENCES-BASEL, 2020, 10 (18):