4.6 Article

Cloud Centric Authentication for Wearable Healthcare Monitoring System

Journal

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2018.2828306

Keywords

Biomedical monitoring; Cloud computing; Medical services; Authentication; Monitoring; Wearable sensors; Wearable sensors; healthcare; bigdata; cloud computing; authentication; security

Funding

  1. FCT - Fundacao para a Ciencia e a Tecnologia [UID/EEA/50008/2013]
  2. Government of Russian Federation [074-U01]
  3. Brazilian National Council for Research and Development (CNPq) [309335/2017 - 5]
  4. Finep under the Centro de Referencia em Radiocomunicacoes - CRR project of the Instituto Nacional de Telecomunicacoes (Inatel), Brazil [01.14.0231.00]
  5. Information Security Education & Awareness (ISEA) Phase II Project, Department of Electronics and Information Technology (DeitY), India

Ask authors/readers for more resources

Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers. These become more challenging especially for the data generated from the wearable devices as it is highly sensitive and heterogeneous in nature. Most of the existing techniques reported in the literature are having high computation and communication costs and are vulnerable to various known attacks, which reduce their importance for applicability in real-world environment. Hence, in this paper, we propose a new cloud based user authentication scheme for secure authentication of medical data. After successful mutual authentication between a user and wearable sensor node, both establish a secret session key that is used for future secure communications. The extensively-used Real-Or-Random (ROR) model based formal security analysis and the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool based formal security verification show that the proposed scheme provides the session-key security and protects active attacks. The proposed scheme is also informally analyzed to show its resilience against other known attacks. Moreover, we have done a detailed comparative analysis for the communication and computation costs along with security and functionality features which proves its efficiency in comparison to the other existing schemes of its category.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available