A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange

被引:8
|
作者
Singh, B. Mohinder [1 ]
Natarajan, Jaisankar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamilnadu, India
关键词
Authentication protocol; eHealth records; Post -quantum crypto algorithm; Symmetric crypto-algorithm; Asymmetric crypto-algorithm; Minimized key exchange; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; HEALTH-CARE;
D O I
10.1016/j.jksuci.2023.101629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wake of covid19, many countries are shifting their paper-based health record management from manual processes to digital ones. The major benefit of digital health record is that data can be easily shared. As health data is sensitive, more security is to be provided to gain the trust of stakeholders. In this paper, a novel secure authentication protocol is planned for digitalizing personal health record that will be used by the user. While transacting data, a key is used to secure it. Many protocols used elliptic curve cryptography. In this proposed protocol, at an initial stage, an asymmetric and quantum-resistant cryptoalgorithm, Kyber is used. In further stages, symmetric crypto-algorithm, Advanced Encryption Standard in Galois/Counter mode (AES-GCM) is used to secure transferred data. For every session, a new key is generated for secure transactions. The more interesting fact in this protocol is that transactions are secured without exchanging actual key and also minimized the key exchange. This protocol not only verified the authenticity of user but also checked rightful citizenship of user. This protocol is analyzed for various security traits using ProVerif tool and provided better results relating to security provisioning, cost of storage, and computation as opposed to related protocols.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [31] A new provably secure authentication and key agreement protocol for SIP using ECC
    Wu, Liufei
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) : 286 - 291
  • [32] A provable secure authentication protocol given forward secure session key
    Shi, Wenbo
    Jang, Injoo
    Yoo, Hyeong Seon
    PROGRESS IN WWW RESEARCH AND DEVELOPMENT, PROCEEDINGS, 2008, 4976 : 309 - 318
  • [33] A Secure Key Exchange Protocol and a Public Key Cryptosystem for Healthcare Systems
    Yuvasri, R.
    Manimaran, A.
    CONTEMPORARY MATHEMATICS, 2024, 5 (02): : 2402 - 2418
  • [34] Key generation schemes for channel authentication in quantum key distribution protocol
    Borodin, Mikhail
    Zhilyaev, Andrey
    Urivskiy, Alexey
    IET QUANTUM COMMUNICATION, 2021, 2 (03): : 90 - 97
  • [35] Traceable Anonymous Authentication and Key Exchange Protocol for Privacy-Aware Cloud Environments
    Lin H.-Y.
    IEEE Systems Journal, 2019, 13 (02) : 1608 - 1617
  • [36] A Provably Secure Authentication and Key Agreement Protocol in Cloud-Based Smart Healthcare Environments
    Wu, Tsu-Yang
    Yang, Lei
    Luo, Jia-Ning
    Wu, Jimmy Ming-Tai
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [37] A new secure three-party authenticated key exchange protocol
    Xi'an Communications Institute, Xi'an 710106, Shannxi, China
    Int. Rev. Comput. Softw., 7 (3633-3638):
  • [38] A new key exchange protocol
    Majhi, Banshider
    Reddy, Y. Santhosh
    Turuk, A. K.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2006, 1 : 301 - 307
  • [39] SYMMETRIC KEY BASED RFID AUTHENTICATION PROTOCOL WITH A SECURE KEY-UPDATING SCHEME
    Zhu, Guangyu
    Khan, Gul N.
    2013 26TH ANNUAL IEEE CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2013, : 353 - 357
  • [40] Quantum Key Distribution Approach for Secure Authentication of Cloud Servers
    Fatima, Shahin
    Ahmad, Shish
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2021, 11 (03) : 19 - 32