Abstract
The e-healthcare systems provide many services to the patients and the users, including patient health record management, remote patient monitoring, and emergency response system. Nowadays, many e-healthcare systems include emergency care, but the services can only be available to registered patients. Ansari et al. recently proposed a secure and privacy-preserving framework for e-healthcare systems. The emergency phase of the framework provides emergency care only to patients with Wireless Body Area Network (WBAN). This paper extends the above framework to include unregistered patients for emergency care and registered patients without WBAN. The proposed scheme uses hash functions and elliptic curve cryptography (ECC) to provide mutual authentication and security, and it is evaluated using the AVISPA tool and traditional security analysis. The result of security analysis and simulation results demonstrate that the suggested scheme is protected from all known attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Althebyan Q, Yaseen Q, Jararweh Y, Al-Ayyoub M (2016) Cloud support for large scale e-healthcare systems 71(9–10):503–515. https://doi.org/10.1007/s12243-016-0496-9
Nkenyereye L, Islam SMR, Hossain M, Abdullah-Al-Wadud M, Alamri A (2020) Blockchain-enabled EHR framework for internet of medical things. https://doi.org/10.32604/cmc.2021.013796
Kumari S, Khan MK, Kumar R (2013) Cryptanalysis and improvement of ‘A privacy enhanced scheme for telecare medical information systems.’ J Med Syst 37(4):1–11. https://doi.org/10.1007/s10916-013-9952-5
Jiang Q, Ma J, Ma Z, Li G (2013) A privacy enhanced authentication scheme for telecare medical information systems. J Med Syst 37(1):1–8. https://doi.org/10.1007/s10916-012-9897-0
Abd-El-Atty B, Iliyasu AM, Alaskar H, El-Latif AAA (2020) A robust quasi-quantum walks-based steganography protocol for secure transmission of images on cloud-based e-healthcare platforms. Sensors 20(11):3108. https://doi.org/10.3390/S20113108
Abd EL-Latif AA, Abd-El-Atty B, Abou-Nassar EM, Venegas-Andraca SE (2020) Controlled alternate quantum walks based privacy preserving healthcare images in internet of things. Opt Laser Technol 124:105942. https://doi.org/10.1016/J.OPTLASTEC.2019.105942
Chen C-LL, Yang T-TT, Chiang M-LL, Shih T-FF (2014) A privacy authentication scheme based on cloud for medical environment. J Med Syst 38(11):143. https://doi.org/10.1007/s10916-014-0143-9
Chiou SY, Ying Z, Liu J (2016) Improvement of a privacy authentication scheme based on cloud for medical environment. J Med Syst 40(4):1–15. https://doi.org/10.1007/s10916-016-0453-1
Challa S et al (2020) Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Futur Gener Comput Syst 108:1267–1286. https://doi.org/10.1016/j.future.2018.04.019
Chaudhry SA, Shon T, Al-Turjman F, Alsharif MH (2020) Correcting design flaws: an improved and cloud assisted key agreement scheme in cyber physical systems. Comput Commun 153:527–537. https://doi.org/10.1016/j.comcom.2020.02.025
Kumari A, Kumar V, Abbasi MY (2020) EAAF: ECC-based anonymous authentication framework for cloud-medical system. Int J Comput Appl 0(0):1–10. https://doi.org/10.1080/1206212X.2020.1815334
Khan AA, Kumar V, Ahmad M, Rana S (2021) LAKAF: lightweight authentication and key agreement framework for smart grid network. J Syst Archit 116:102053. https://doi.org/10.1016/J.SYSARC.2021.102053
Kumari A et al (2020) CSEF: cloud-based secure and efficient framework for smart medical system using ECC. IEEE Access 8:107838–107852. https://doi.org/10.1109/ACCESS.2020.3001152
Wu TY, Yang L, Luo JN, Ming-Tai Wu J (2021) A provably secure authentication and key agreement protocol in cloud-based smart healthcare environments. Secur Commun Netw 2021. https://doi.org/10.1155/2021/2299632
Ansari AA et al (2022) Privacy-enabling framework for cloud-assisted digital healthcare industry. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2022.3170148
Dolev D, Yao AC (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208. https://doi.org/10.1109/TIT.1983.1056650
Chen CL, Yang TT, Shih TF (2014) A secure medical data exchange protocol based on cloud environment. J Med Syst 38(9):1–12. https://doi.org/10.1007/s10916-014-0112-3
Li CT, Shih DH, Wang CC (2018) Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. Comput Methods Programs Biomed 157:191–203. https://doi.org/10.1016/j.cmpb.2018.02.002
Chandrakar P, Sinha S, Ali R (2020) Cloud-based authenticated protocol for healthcare monitoring system. J Ambient Intell Humaniz Comput 11(8):3431–3447. https://doi.org/10.1007/s12652-019-01537-2
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ansari, A.A., Mishra, B., Gera, P. (2023). A Secured Framework for Emergency Care in the E-Healthcare System. In: Rao, U.P., Alazab, M., Gohil, B.N., Chelliah, P.R. (eds) Security, Privacy and Data Analytics. ISPDA 2022. Lecture Notes in Electrical Engineering, vol 1049. Springer, Singapore. https://doi.org/10.1007/978-981-99-3569-7_23
Download citation
DOI: https://doi.org/10.1007/978-981-99-3569-7_23
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-3568-0
Online ISBN: 978-981-99-3569-7
eBook Packages: Computer ScienceComputer Science (R0)