A novel secure authentication protocol for eHealth records in cloud with a new key generation method and minimized key exchange

被引:8
|
作者
Singh, B. Mohinder [1 ]
Natarajan, Jaisankar [1 ]
机构
[1] Vellore Inst Technol, Sch Comp Sci & Engn, Vellore 632014, Tamilnadu, India
关键词
Authentication protocol; eHealth records; Post -quantum crypto algorithm; Symmetric crypto-algorithm; Asymmetric crypto-algorithm; Minimized key exchange; ELLIPTIC CURVE CRYPTOGRAPHY; MUTUAL AUTHENTICATION; AGREEMENT SCHEME; HEALTH-CARE;
D O I
10.1016/j.jksuci.2023.101629
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In wake of covid19, many countries are shifting their paper-based health record management from manual processes to digital ones. The major benefit of digital health record is that data can be easily shared. As health data is sensitive, more security is to be provided to gain the trust of stakeholders. In this paper, a novel secure authentication protocol is planned for digitalizing personal health record that will be used by the user. While transacting data, a key is used to secure it. Many protocols used elliptic curve cryptography. In this proposed protocol, at an initial stage, an asymmetric and quantum-resistant cryptoalgorithm, Kyber is used. In further stages, symmetric crypto-algorithm, Advanced Encryption Standard in Galois/Counter mode (AES-GCM) is used to secure transferred data. For every session, a new key is generated for secure transactions. The more interesting fact in this protocol is that transactions are secured without exchanging actual key and also minimized the key exchange. This protocol not only verified the authenticity of user but also checked rightful citizenship of user. This protocol is analyzed for various security traits using ProVerif tool and provided better results relating to security provisioning, cost of storage, and computation as opposed to related protocols.(c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:10
相关论文
共 50 条
  • [41] An anonymous authentication and key exchange protocol in smart grid
    Luo, Yi
    Zheng, Wei-Min
    Chen, Yeh-Cheng
    Journal of Network Intelligence, 2021, 6 (02): : 206 - 215
  • [42] A Novel Secure Authentication Protocol for IoT and Cloud Servers
    Iqbal, Ummer
    Tandon, Aditya
    Gupta, Sonali
    Yadav, Arvind R.
    Neware, Rahul
    Gelana, Fraol Waldamichael
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [43] A Lightweight Authentication and Key Exchange Protocol With Anonymity for IoT
    He, Daojing
    Cai, Yanchang
    Zhu, Shanshan
    Zhao, Ziming
    Chan, Sammy
    Guizani, Mohsen
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (11) : 7862 - 7872
  • [44] Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET
    Wei, Guoheng
    Qin, Yanlin
    Fu, Wei
    EMERGING INFORMATION SECURITY AND APPLICATIONS, EISA 2022, 2022, 1641 : 160 - 172
  • [45] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Alizadeh, Javad
    Safkhani, Masoumeh
    Allahdadi, Amir
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 126 (04) : 2911 - 2935
  • [46] A Permanent Secure QKD Protocol Realized with Asymmetric Key Authentication
    Yin, Heyu
    Xu, Qiuliang
    PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 457 - 460
  • [47] A receiver authentication and group key delivery protocol for secure multicast
    Ueno, H
    Suzuki, H
    Ishikawa, N
    Takahashi, O
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2005, E88B (03) : 1139 - 1148
  • [48] ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN
    Javad Alizadeh
    Masoumeh Safkhani
    Amir Allahdadi
    Wireless Personal Communications, 2022, 126 : 2911 - 2935
  • [49] Highly secure authentication and key agreement protocol for the internet of vehicles
    Li, Li
    Fan, Xingjuan
    Zhi, Boyuan
    Li, Shaojun
    Dabollahi, Seyyed Amirreza
    TELECOMMUNICATION SYSTEMS, 2024, 87 (01) : 73 - 88
  • [50] A NOVEL METHOD TO SECURE CLOUD COMPUTING THROUGH MULTICAST KEY MANAGEMENT
    Sriprasadh, K.
    Saicharansrinivasan
    Pandithurai, O.
    Saravanan, A.
    2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2013, : 305 - 311