Advertisement

Construction of RSA-Based Authentication Scheme in Authorized Access to Healthcare Services

Authorized Access to Healthcare Services
  • Dharminder Dharminder
  • Dheerendra MishraEmail author
  • Xiong Li
Systems-Level Quality Improvement
  • 26 Downloads
Part of the following topical collections:
  1. Systems-Level Quality Improvement

Abstract

Modern network technology yields new interface for telecare medicine information systems in short TMIS used for patient’s healthcare. This system is used to provide healthcare services to patients at their home. It can be observed, telecare medicine information systems generally suffer several attacks as information being transmitted over a public network. Therefore, various authentication and key agreement schemes are proposed for TMIS to ensure secure and authorized patients communication over given public network. However, most of the schemes fail to achieve essential attributes discussed in this article. Although the key attributes of security and efficiency should be achieved in a common framework. This paper proposes construction of an RSA based authentication scheme for authorized access to healthcare services and achieves desirable key attributes of authentication protocols. Proof of security against polynomial time adversary is given in the random oracle to justify the security of proposed scheme. Communication analysis and computation analysis of proposed scheme indicates that proposed scheme’s performance is comparable and having better security.

Keywords

Healthcare Telecare medicine information systems Authentication Privacy 

Notes

Compliance with Ethical Standards

Conflict of interests

All authors declare that they have no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

All the authors have agreed to this submission.

References

  1. 1.
    Cao, T., and Zhai, J., Improved dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9912, 2013.CrossRefGoogle Scholar
  2. 2.
    Chen, H. B., Lee, W. B., and Chen, T. H., A novel drm scheme for accommodating expectations of personal use. Multimed. Tools Appl. 77(18):23, 099–23, 114, 2018.CrossRefGoogle Scholar
  3. 3.
    Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012.CrossRefGoogle Scholar
  4. 4.
    Dolev, D., and Yao, A., On the security of public key protocols. IEEE Trans. Inf. Theory 29(2):198–208, 1983.CrossRefGoogle Scholar
  5. 5.
    Guo, C., and Chang, C. C., Chaotic maps-based password-authenticated key agreement using smart cards. Commun. Nonlinear. Sci. Num. Sim. 18(6):1433–1440, 2013.CrossRefGoogle Scholar
  6. 6.
    Jiang, Q., Ma, J., Lu, X., and Tian, Y., Robust chaotic map-based authentication and key agreement scheme with strong anonymity for telecare medicine information systems. J. Med. Syst. 38(2):12, 2014.CrossRefGoogle Scholar
  7. 7.
    Lee, T. F., Chang, I. P., Lin, T. H., and Wang, C. C., A secure and efficient password-based user authentication scheme using smart cards for the integrated epr information system. J. Med. Syst. 37(3):9941, 2013.CrossRefGoogle Scholar
  8. 8.
    Li, C. T., Lee, C. C., Weng, C. Y., and Chen, S. J., A secure dynamic identity and chaotic maps based user authentication and key agreement scheme for e-healthcare systems. J. Med. Syst. 40(11):233, 2016.CrossRefGoogle Scholar
  9. 9.
    Li, X., Liu, S., Wu, F., Kumari, S., and Rodrigues, J. J.: Privacy preserving data aggregation scheme for mobile edge computing assisted iot applications. IEEE Internet of Things Journal , 2018Google Scholar
  10. 10.
    Lin, H. Y., On the security of a dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9929, 2013.CrossRefGoogle Scholar
  11. 11.
    Madhusudhan, R., and Nayak, C. S., A robust authentication scheme for telecare medical information systems. Multimed. Tools Appl. 78(11):15, 255–15, 273, 2019.CrossRefGoogle Scholar
  12. 12.
    Mishra, D., On the security flaws in id-based password authentication schemes for telecare medical information systems. J. Med. Syst. 39(1):154, 2015.CrossRefGoogle Scholar
  13. 13.
    Mishra, D., Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems. J. Med. Syst. 39(3):19, 2015.  https://doi.org/10.1007/s10916-015-0193-7.CrossRefGoogle Scholar
  14. 14.
    Mishra, D., Mukhopadhyay, S., Kumari, S., Khan, M. K., and Chaturvedi, A., Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce. J. Med. Syst. 38 (5):41, 2014.CrossRefGoogle Scholar
  15. 15.
    Odelu, V., Das, A. K., Wazid, M., and Conti, M., Provably secure authenticated key agreement scheme for smart grid. IEEE T. Smart Grid 9(3):1900–1910, 2016.Google Scholar
  16. 16.
    Radhakrishnan, N., and Karuppiah, M.: An efficient and secure remote user mutual authentication scheme using smart cards for telecare medical information systems. Informatics in Medicine Unlocked, 2018Google Scholar
  17. 17.
    Renuka, K., Kumari, S., and Li, X., Design of a secure three-factor authentication scheme for smart healthcare. J. Med. Syst. 43(5):133, 2019.CrossRefGoogle Scholar
  18. 18.
    Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2):120–126, 1978.CrossRefGoogle Scholar
  19. 19.
    Srinivas, J., Das, A. K., Wazid, M., and Kumar, N.: Anonymous lightweight chaotic map-based authenticated key agreement protocol for industrial internet of things. IEEE Transactions on Dependable and Secure Computing, 2018Google Scholar
  20. 20.
    Srinivas, J., Mishra, D., and Mukhopadhyay, S., A mutual authentication framework for wireless medical sensor networks. J. Med. Syst. 41(5):80, 2017.CrossRefGoogle Scholar
  21. 21.
    Wei, J., Hu, X., and Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.CrossRefGoogle Scholar
  22. 22.
    Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRefGoogle Scholar
  23. 23.
    Xie, Q., Zhang, J., and Dong, N., Robust anonymous authentication scheme for telecare medical information systems. J. Med. Syst. 37(2):9911, 2013.CrossRefGoogle Scholar
  24. 24.
    Zhang, L., Zhu, S., and Tang, S., Privacy protection for telecare medicine information systems using a chaotic map-based three-factor authenticated key agreement scheme. IEEE J. Biomed. Health 21(2):465–475, 2017.CrossRefGoogle Scholar
  25. 25.
    Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838, 2012.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.The LNM Institute of Information TechnologyJaipurIndia
  2. 2.School of Computer Science and EngineeringHunan University of Science and TechnologyXiangtanChina

Personalised recommendations