Skip to main content

A Secure Protocol for Authentication and Data Storage for Healthcare System

  • Conference paper
  • First Online:
Smart Trends in Computing and Communications (SMART 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 645))

  • 297 Accesses

Abstract

Healthcare is one of the realms in which security plays an integral role in piling up the quality of an entity. The emergence of the medical field has laid a patch of immense opportunities in the path of advanced healthcare. Cloud storage has also obtained massive valuations in the medical world. We propose a framework that paves the way for storing and retrieving the data more securely, and also privacy has been maintained. In this paper, we proposed a protocol for the patient, doctor, and the hospital under the healthcare system that blows away the flaws and checks out the safety of the proposed work using Scyther—an automated security protocol verification tool. In the healthcare habitat, our outcome delivers an adequate means to form a medium skilled in setting up, registering, storing, retrieving, authenticating, and verifying electronic healthcare data to protect patients’ personal information.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Mamdouh M, Awad AI, Khalaf AA, Hamed HF (2021) Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Comput Secur 111:102491

    Google Scholar 

  2. Sowmya K, Srinivasan C, Lakshmy KV, Kumar Bansal T (2021) A secure protocol for the delivery of firmware updates over the air in IoT devices. In: Soft computing and signal processing. Springer, Singapore, pp 213–224

    Google Scholar 

  3. Chen MT, Lin TH (2021) A provable and secure patient electronic health record fair exchange scheme for health information systems. Appl Sci 11(5):2401

    Google Scholar 

  4. Ayub MF, Mahmood K, Kumari S, Sangaiah AK (2021) Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology. Dig Commun Netw 7(2):235–244

    Article  Google Scholar 

  5. Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428–6453

    Article  Google Scholar 

  6. Chang CC, Wu HL, Sun CY (2017) Notes on ‘Secure authentication scheme for IoT and cloud servers’. Pervasive Mob Comput 38:275–278

    Google Scholar 

  7. Izza S, Benssalah M, Drouiche K (2021) An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J Inf Secur Appl 58:102705

    Google Scholar 

  8. Chatterjee K (2020) An improved authentication protocol for wireless body sensor networks applied in healthcare applications. Wirel Pers Commun 111(4):2605–2623

    Article  Google Scholar 

  9. Harn L, Lin C (2010) Strong (n, t, n) verifiable secret sharing scheme. Inf Sci 180(16):3059–3064

    Article  MathSciNet  MATH  Google Scholar 

  10. Hamed NM, Yassin AA (2022) Secure patient authentication scheme in the healthcare system using symmetric encryption. Iraqi J Electr Electron Eng 18(1)

    Google Scholar 

  11. Kaur S, Kaur G, Shabaz M (2022) A secure two-factor authentication framework in cloud computing. Secur Commun Netw

    Google Scholar 

  12. Panda PK, Chattopadhyay S (2020) A secure mutual authentication protocol for IoT environment. J Reliab Intell Environ 6(2):79–94

    Article  Google Scholar 

  13. Anjum S, Ramaguru R, Sethumadhavan M (2021) Medical records management using distributed ledger and storage. In: International conference on advances in computing and data sciences. Springer, Cham, pp 52–62

    Google Scholar 

  14. Arumugam S, Lakshmanan R, Nagar AK (2014) On (k, n)*-visual cryptography scheme. Des Codes Cryptogr 71(1):153–162

    Article  MathSciNet  MATH  Google Scholar 

  15. Matsuo T (2007) Proxy re-encryption systems for identity-based encryption. In: International conference on pairing-based cryptography. Springer, Berlin, Heidelberg, pp 247–267

    Google Scholar 

  16. James M, Srinivasan C, Lakshmy KV, Sethumadhavan M (2016) Decrypting shared encrypted data files stored in a cloud using dynamic key aggregation. In: Computational intelligence, cyber security and computational models. Springer, Singapore, pp 385–392

    Google Scholar 

  17. Praveen K, Rajeev K, Sethumadhavan M (2014) On the extensions of (k, n)*-visual cryptographic schemes. In: International conference on security in computer networks and distributed systems. Springer, Berlin, Heidelberg, pp 231–238

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Preethi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Preethi, R., Shrivastava, S., Lakshmy, K.V. (2023). A Secure Protocol for Authentication and Data Storage for Healthcare System. In: Senjyu, T., So–In, C., Joshi, A. (eds) Smart Trends in Computing and Communications. SMART 2023. Lecture Notes in Networks and Systems, vol 645. Springer, Singapore. https://doi.org/10.1007/978-981-99-0769-4_3

Download citation

Publish with us

Policies and ethics