Abstract
The development of the medical services framework is advanced by the development of the Internet of Things (IoT) innovation. There are many hindrances in the current healthcare framework, for example, security and privacy concerns, information irregularity, opportune admittance to the correct records across numerous medical services. Notwithstanding, there is an assortment of options available for the collection of medical data. Since the health data are exceptionally private, it requires proper vigilance and ingress for people dealing with them. So, one such solution; to secure data is the authentication of the communicating entities. Authentication is used to secure the information transferred over the public channels. There are many protocols proposed; however, the conventional authentication models cannot be applied straightforwardly to situations requiring low-latency in specific. Moreover, they are inefficient for two reasons: first, they are unable to adapt to the extending volume of generated data, and second, they are vulnerable to cyber-attacks. Hence, in this paper, we try to give a feasible solution as a “Mutual Authentication framework using Fog Computing in Healthcare” that is fully resilient and addresses the aforementioned concerns. The framework uses elliptic curve cryptography, aptly suitable for low constrained devices, to secure patients’ data during communication with primacy. In addition to this, fog computing minimizes network latency, and cost, which efficiently manages the medical resources and altogether fulfills the high-security norms guaranteeing data confidentiality. Furthermore, a review of the most relevant techniques has been discussed. Finally, a comparison of these approaches, along with the security investigation, is made, and subsequently, the model’s feasibility, stability, and security are evaluated.
Similar content being viewed by others
References
Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Futur Gener Comput Syst 96:410–424
Akrivopoulos O, Chatzigiannakis I, Tselios C, Antoniou A (2017) On the deployment of healthcare applications over fog computing infrastructure. In: 2017 IEEE 41st Annual computer software and applications conference (COMPSAC), vol 2. IEEE, pp 288–293
Ali Z, Ghani A, Khan I, Chaudhry SA, Islam SH, Giri D (2020) A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications 52:102502
Alzahrani BA, Irshad A, Albeshri A, Alsubhi K (2021) A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wirel Pers Commun 117(1):47–69
Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483–495
Amin R, Islam SH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62
Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Vigneron L (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer-aided verification. Springer, Berlin, pp 281–285
Armando A, Basin D, Cuellar J, Rusinowitch M, Viganò L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64(January). http://www.avispa-project.org/
Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A (2019) A survey on fog computing for the internet of things. Pervasive and Mobile Computing 52:71–99
Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271
Das AK, Sutrala AK, Odelu V, Goswami A (2017) A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wirel Pers Commun 94(3):1899–1933
Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services. J Med Syst 44(1):1–9
Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments 4 (3):141–160
Dwivedi AD, Malina L, Dzurenda P, Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. In: 2019 42nd International conference on telecommunications and signal processing (TSP). IEEE, pp 135–139
Hamidi H (2019) An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Futur Gener Comput Syst 91:434–449
Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications, and open issues. J Netw Comput Appl 98:27–42
Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy-preserving three-factor authentication protocol for e-Health clouds. J Supercomput 72(10):3826–3849
Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392
Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48 (177):203–209
Li CT, Wu TY, Chen CL, Lee CC, Chen CM (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7):1482
Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin, pp 417–426
Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst 39(9):1–16
Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2017) A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials 20(1):416–464
Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: Fundamental, network applications, and research challenges. IEEE Communications Surveys & Tutorials 20(3):1826–1857
Radhakrishnan N, Karuppiah M (2019) An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems. Informatics in Medicine Unlocked 16:100092
Renuka K, Kumari S, Li X (2019) Design of a secure three-factor authentication scheme for smart healthcare. J Med Syst 43(5):1–12
Shakil KA, Zareen FJ, Alam M, Jabin S (2020) BAMHealthCloud: a biometric authentication and data management system for healthcare data in the cloud. Journal of King Saud University-Computer and Information Sciences 32 (1):57–64
Singh S, Chaurasiya VK (2021) Mutual authentication scheme of IoT devices in fog computing environment. Clust Comput 24:1643–1657. https://doi.org/10.1007/s10586-020-03211-1
Singh D, Kumar B, Singh S, Chand S (2021) A secure iot-based mutual authentication for healthcare applications in wireless sensor networks using ECC. International Journal of Healthcare Information Systems and Informatics (IJHISI) 16(2):21–48
Srinivas J, Das AK, Kumar N, Rodrigues JJ (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing 17(5):942–956
Usman M, Jan MA, He X, Chen J (2019) P2DCA: a privacy-preserving-based data collection and analysis framework for IoMT applications. IEEE Journal on Selected Areas in Communications 37(6):1222–1230
Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492
Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:727–737
Xu Z, Xu C, Chen H, Yang F (2019) A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and Computation: Practice and Experience 31(14):e5295
Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Futur Gener Comput Syst 91:244–251
Acknowledgements
This work was supported and funded by the Ministry of Education, Government of India.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interests
‘The author(s) declare that there is no conflict of interest.’
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Singh, S., Chaurasiya, V.K. Mutual authentication framework using fog computing in healthcare. Multimed Tools Appl 81, 31977–32003 (2022). https://doi.org/10.1007/s11042-022-12131-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-022-12131-8