Skip to main content
Log in

Mutual authentication framework using fog computing in healthcare

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

The development of the medical services framework is advanced by the development of the Internet of Things (IoT) innovation. There are many hindrances in the current healthcare framework, for example, security and privacy concerns, information irregularity, opportune admittance to the correct records across numerous medical services. Notwithstanding, there is an assortment of options available for the collection of medical data. Since the health data are exceptionally private, it requires proper vigilance and ingress for people dealing with them. So, one such solution; to secure data is the authentication of the communicating entities. Authentication is used to secure the information transferred over the public channels. There are many protocols proposed; however, the conventional authentication models cannot be applied straightforwardly to situations requiring low-latency in specific. Moreover, they are inefficient for two reasons: first, they are unable to adapt to the extending volume of generated data, and second, they are vulnerable to cyber-attacks. Hence, in this paper, we try to give a feasible solution as a “Mutual Authentication framework using Fog Computing in Healthcare” that is fully resilient and addresses the aforementioned concerns. The framework uses elliptic curve cryptography, aptly suitable for low constrained devices, to secure patients’ data during communication with primacy. In addition to this, fog computing minimizes network latency, and cost, which efficiently manages the medical resources and altogether fulfills the high-security norms guaranteeing data confidentiality. Furthermore, a review of the most relevant techniques has been discussed. Finally, a comparison of these approaches, along with the security investigation, is made, and subsequently, the model’s feasibility, stability, and security are evaluated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  1. Aghili SF, Mala H, Shojafar M, Peris-Lopez P (2019) LACO: lightweight three-factor authentication, access control and ownership transfer scheme for e-health systems in IoT. Futur Gener Comput Syst 96:410–424

    Article  Google Scholar 

  2. Akrivopoulos O, Chatzigiannakis I, Tselios C, Antoniou A (2017) On the deployment of healthcare applications over fog computing infrastructure. In: 2017 IEEE 41st Annual computer software and applications conference (COMPSAC), vol 2. IEEE, pp 288–293

  3. Ali Z, Ghani A, Khan I, Chaudhry SA, Islam SH, Giri D (2020) A robust authentication and access control protocol for securing wireless healthcare sensor networks. Journal of Information Security and Applications 52:102502

    Article  Google Scholar 

  4. Alzahrani BA, Irshad A, Albeshri A, Alsubhi K (2021) A provably secure and lightweight patient-healthcare authentication protocol in wireless body area networks. Wirel Pers Commun 117(1):47–69

    Article  Google Scholar 

  5. Amin R, Islam SH, Biswas GP, Khan MK, Kumar N (2018) A robust and anonymous patient monitoring system using wireless medical sensor networks. Futur Gener Comput Syst 80:483–495

    Article  Google Scholar 

  6. Amin R, Islam SH, Biswas GP, Khan MK, Leng L, Kumar N (2016) Design of an anonymity-preserving three-factor authenticated key exchange protocol for wireless sensor networks. Comput Netw 101:42–62

    Article  Google Scholar 

  7. Armando A, Basin D, Boichut Y, Chevalier Y, Compagna L, Cuéllar J, Vigneron L (2005) The AVISPA tool for the automated validation of internet security protocols and applications. In: International conference on computer-aided verification. Springer, Berlin, pp 281–285

  8. Armando A, Basin D, Cuellar J, Rusinowitch M, Viganò L (2006) Avispa: automated validation of internet security protocols and applications. ERCIM News 64(January). http://www.avispa-project.org/

  9. Bellavista P, Berrocal J, Corradi A, Das SK, Foschini L, Zanni A (2019) A survey on fog computing for the internet of things. Pervasive and Mobile Computing 52:71–99

    Article  Google Scholar 

  10. Burrows M, Abadi M, Needham RM (1989) A logic of authentication. Proc R Soc Lond Math Phys Sci 426(1871):233–271

    MathSciNet  MATH  Google Scholar 

  11. Das AK, Sutrala AK, Odelu V, Goswami A (2017) A secure smartcard-based anonymous user authentication scheme for healthcare applications using wireless medical sensor networks. Wirel Pers Commun 94(3):1899–1933

    Article  Google Scholar 

  12. Dharminder D, Mishra D, Li X (2020) Construction of RSA-based authentication scheme in authorized access to healthcare services. J Med Syst 44(1):1–9

    Article  Google Scholar 

  13. Dhillon PK, Kalra S (2018) Multi-factor user authentication scheme for IoT-based healthcare services. Journal of Reliable Intelligent Environments 4 (3):141–160

    Article  Google Scholar 

  14. Dwivedi AD, Malina L, Dzurenda P, Srivastava G (2019) Optimized blockchain model for internet of things based healthcare applications. In: 2019 42nd International conference on telecommunications and signal processing (TSP). IEEE, pp 135–139

  15. Hamidi H (2019) An approach to develop the smart health using Internet of Things and authentication based on biometric technology. Futur Gener Comput Syst 91:434–449

    Article  Google Scholar 

  16. Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications, and open issues. J Netw Comput Appl 98:27–42

    Article  Google Scholar 

  17. Jiang Q, Khan MK, Lu X, Ma J, He D (2016) A privacy-preserving three-factor authentication protocol for e-Health clouds. J Supercomput 72(10):3826–3849

    Article  Google Scholar 

  18. Jiang Q, Zeadally S, Ma J, He D (2017) Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks. IEEE Access 5:3376–3392

    Article  Google Scholar 

  19. Koblitz N (1987) Elliptic curve cryptosystems. Math Comput 48 (177):203–209

    Article  MathSciNet  Google Scholar 

  20. Li CT, Wu TY, Chen CL, Lee CC, Chen CM (2017) An efficient user authentication and user anonymity scheme with provably security for IoT-based medical care system. Sensors 17(7):1482

    Article  Google Scholar 

  21. Miller VS (1985) Use of elliptic curves in cryptography. In: Conference on the theory and application of cryptographic techniques. Springer, Berlin, pp 417–426

  22. Mir O, van der Weide T, Lee CC (2015) A secure user anonymity and authentication scheme using AVISPA for telecare medical information systems. J Med Syst 39(9):1–16

    Article  Google Scholar 

  23. Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2017) A comprehensive survey on fog computing: State-of-the-art and research challenges. IEEE Communications Surveys & Tutorials 20(1):416–464

    Article  Google Scholar 

  24. Mukherjee M, Shu L, Wang D (2018) Survey of fog computing: Fundamental, network applications, and research challenges. IEEE Communications Surveys & Tutorials 20(3):1826–1857

    Article  Google Scholar 

  25. Radhakrishnan N, Karuppiah M (2019) An efficient and secure remote user mutual authentication scheme using smart cards for Telecare medical information systems. Informatics in Medicine Unlocked 16:100092

    Article  Google Scholar 

  26. Renuka K, Kumari S, Li X (2019) Design of a secure three-factor authentication scheme for smart healthcare. J Med Syst 43(5):1–12

    Article  Google Scholar 

  27. Shakil KA, Zareen FJ, Alam M, Jabin S (2020) BAMHealthCloud: a biometric authentication and data management system for healthcare data in the cloud. Journal of King Saud University-Computer and Information Sciences 32 (1):57–64

    Article  Google Scholar 

  28. Singh S, Chaurasiya VK (2021) Mutual authentication scheme of IoT devices in fog computing environment. Clust Comput 24:1643–1657. https://doi.org/10.1007/s10586-020-03211-1

    Article  Google Scholar 

  29. Singh D, Kumar B, Singh S, Chand S (2021) A secure iot-based mutual authentication for healthcare applications in wireless sensor networks using ECC. International Journal of Healthcare Information Systems and Informatics (IJHISI) 16(2):21–48

    Article  Google Scholar 

  30. Srinivas J, Das AK, Kumar N, Rodrigues JJ (2018) Cloud centric authentication for wearable healthcare monitoring system. IEEE Transactions on Dependable and Secure Computing 17(5):942–956

    Article  Google Scholar 

  31. Usman M, Jan MA, He X, Chen J (2019) P2DCA: a privacy-preserving-based data collection and analysis framework for IoMT applications. IEEE Journal on Selected Areas in Communications 37(6):1222–1230

    Article  Google Scholar 

  32. Wazid M, Das AK, Kumar N, Vasilakos AV (2019) Design of secure key management and user authentication scheme for fog computing services. Futur Gener Comput Syst 91:475–492

    Article  Google Scholar 

  33. Wu F, Li X, Sangaiah AK, Xu L, Kumari S, Wu L, Shen J (2018) A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks. Futur Gener Comput Syst 82:727–737

    Article  Google Scholar 

  34. Xu Z, Xu C, Chen H, Yang F (2019) A lightweight anonymous mutual authentication and key agreement scheme for WBAN. Concurrency and Computation: Practice and Experience 31(14):e5295

    Article  Google Scholar 

  35. Zhou L, Li X, Yeh KH, Su C, Chiu W (2019) Lightweight IoT-based authentication scheme in cloud computing circumstance. Futur Gener Comput Syst 91:244–251

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported and funded by the Ministry of Education, Government of India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sunakshi Singh.

Ethics declarations

Conflict of Interests

‘The author(s) declare that there is no conflict of interest.’

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Singh, S., Chaurasiya, V.K. Mutual authentication framework using fog computing in healthcare. Multimed Tools Appl 81, 31977–32003 (2022). https://doi.org/10.1007/s11042-022-12131-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-022-12131-8

Keywords

Navigation