Journal
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 17, Issue 5, Pages 942-956Publisher
IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2018.2828306
Keywords
Biomedical monitoring; Cloud computing; Medical services; Authentication; Monitoring; Wearable sensors; Wearable sensors; healthcare; bigdata; cloud computing; authentication; security
Categories
Funding
- FCT - Fundacao para a Ciencia e a Tecnologia [UID/EEA/50008/2013]
- Government of Russian Federation [074-U01]
- Brazilian National Council for Research and Development (CNPq) [309335/2017 - 5]
- Finep under the Centro de Referencia em Radiocomunicacoes - CRR project of the Instituto Nacional de Telecomunicacoes (Inatel), Brazil [01.14.0231.00]
- Information Security Education & Awareness (ISEA) Phase II Project, Department of Electronics and Information Technology (DeitY), India
Ask authors/readers for more resources
Security and privacy are the major concerns in cloud computing as users have limited access on the stored data at the remote locations managed by different service providers. These become more challenging especially for the data generated from the wearable devices as it is highly sensitive and heterogeneous in nature. Most of the existing techniques reported in the literature are having high computation and communication costs and are vulnerable to various known attacks, which reduce their importance for applicability in real-world environment. Hence, in this paper, we propose a new cloud based user authentication scheme for secure authentication of medical data. After successful mutual authentication between a user and wearable sensor node, both establish a secret session key that is used for future secure communications. The extensively-used Real-Or-Random (ROR) model based formal security analysis and the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool based formal security verification show that the proposed scheme provides the session-key security and protects active attacks. The proposed scheme is also informally analyzed to show its resilience against other known attacks. Moreover, we have done a detailed comparative analysis for the communication and computation costs along with security and functionality features which proves its efficiency in comparison to the other existing schemes of its category.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available