Abstract
Healthcare is one of the realms in which security plays an integral role in piling up the quality of an entity. The emergence of the medical field has laid a patch of immense opportunities in the path of advanced healthcare. Cloud storage has also obtained massive valuations in the medical world. We propose a framework that paves the way for storing and retrieving the data more securely, and also privacy has been maintained. In this paper, we proposed a protocol for the patient, doctor, and the hospital under the healthcare system that blows away the flaws and checks out the safety of the proposed work using Scyther—an automated security protocol verification tool. In the healthcare habitat, our outcome delivers an adequate means to form a medium skilled in setting up, registering, storing, retrieving, authenticating, and verifying electronic healthcare data to protect patients’ personal information.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Mamdouh M, Awad AI, Khalaf AA, Hamed HF (2021) Authentication and identity management of IoHT devices: achievements, challenges, and future directions. Comput Secur 111:102491
Sowmya K, Srinivasan C, Lakshmy KV, Kumar Bansal T (2021) A secure protocol for the delivery of firmware updates over the air in IoT devices. In: Soft computing and signal processing. Springer, Singapore, pp 213–224
Chen MT, Lin TH (2021) A provable and secure patient electronic health record fair exchange scheme for health information systems. Appl Sci 11(5):2401
Ayub MF, Mahmood K, Kumari S, Sangaiah AK (2021) Lightweight authentication protocol for e-health clouds in IoT-based applications through 5G technology. Dig Commun Netw 7(2):235–244
Kumari S, Karuppiah M, Das AK, Li X, Wu F, Kumar N (2018) A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers. J Supercomput 74(12):6428–6453
Chang CC, Wu HL, Sun CY (2017) Notes on ‘Secure authentication scheme for IoT and cloud servers’. Pervasive Mob Comput 38:275–278
Izza S, Benssalah M, Drouiche K (2021) An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment. J Inf Secur Appl 58:102705
Chatterjee K (2020) An improved authentication protocol for wireless body sensor networks applied in healthcare applications. Wirel Pers Commun 111(4):2605–2623
Harn L, Lin C (2010) Strong (n, t, n) verifiable secret sharing scheme. Inf Sci 180(16):3059–3064
Hamed NM, Yassin AA (2022) Secure patient authentication scheme in the healthcare system using symmetric encryption. Iraqi J Electr Electron Eng 18(1)
Kaur S, Kaur G, Shabaz M (2022) A secure two-factor authentication framework in cloud computing. Secur Commun Netw
Panda PK, Chattopadhyay S (2020) A secure mutual authentication protocol for IoT environment. J Reliab Intell Environ 6(2):79–94
Anjum S, Ramaguru R, Sethumadhavan M (2021) Medical records management using distributed ledger and storage. In: International conference on advances in computing and data sciences. Springer, Cham, pp 52–62
Arumugam S, Lakshmanan R, Nagar AK (2014) On (k, n)*-visual cryptography scheme. Des Codes Cryptogr 71(1):153–162
Matsuo T (2007) Proxy re-encryption systems for identity-based encryption. In: International conference on pairing-based cryptography. Springer, Berlin, Heidelberg, pp 247–267
James M, Srinivasan C, Lakshmy KV, Sethumadhavan M (2016) Decrypting shared encrypted data files stored in a cloud using dynamic key aggregation. In: Computational intelligence, cyber security and computational models. Springer, Singapore, pp 385–392
Praveen K, Rajeev K, Sethumadhavan M (2014) On the extensions of (k, n)*-visual cryptographic schemes. In: International conference on security in computer networks and distributed systems. Springer, Berlin, Heidelberg, pp 231–238
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Preethi, R., Shrivastava, S., Lakshmy, K.V. (2023). A Secure Protocol for Authentication and Data Storage for Healthcare System. In: Senjyu, T., So–In, C., Joshi, A. (eds) Smart Trends in Computing and Communications. SMART 2023. Lecture Notes in Networks and Systems, vol 645. Springer, Singapore. https://doi.org/10.1007/978-981-99-0769-4_3
Download citation
DOI: https://doi.org/10.1007/978-981-99-0769-4_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0768-7
Online ISBN: 978-981-99-0769-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)