Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing

Peer-to-Peer Networking and Applications - Tập 12 - Trang 924-933 - 2018
Jian Shen1,2,3, Huijie Yang1,2, Anxi Wang1,2, Tianqi Zhou1,3, Chen Wang1,2
1School of Computer & Software, Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing, China
2Guangxi Key Laboratory of Cryptography and Information Security, Guilin, China
3State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China

Tóm tắt

Healthcare in fog computing is a novel topic in recent year. With the development of technology, it is a pressing issue to accomplish the secure healthcare in fog computing. Moreover, how to ensure the security and efficiency of the transmission healthcare data in open channel is a challenge to be solved. In this paper, a lightweight authentication and matrix-based key agreement scheme is proposed to support the communication of multi parties in fog computing. On the one hand, the lightweight authentication technology is needed to verify the identity of multi-parties that assure the facticity of communication parties in the open channel. On the other hand, using the matrix-based key agreement technology encrypts the healthcare data and uploads to the cloud server with the aid of the doubly-linked cyclic (DLC) tables. The security analysis shows that the proposed scheme is secure to transmit the data for healthcare. The performance analysis shows that the proposed scheme reduces the communication cost.

Tài liệu tham khảo

Zhu N, Craddock I, Diethe T et al (2015) Bridging e-health and the internet of things: the SPHERE project[J]. IEEE Intell Syst 30(4):39–46 Shen J, Zhou T, Chen X, Li J, Susilo W (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925 Chen S-L, Nie J, Lin T-L, Chung R-L, Hsia C-H, Liu Z-Y, Wu H-X (2018) VLSI implementation of an ultra low-cost and low-power image compressor for wireless camera networks. J Real-Time Image Proc 14(4):803–812 Hsia C-H, Dai Y-J, Chen S-L, Lin T-L, Shen J (2018) A gait sequence analysis for IP camera using a modified LBP. Journal of Internet Technology (JIT) 19(2):451–458 Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2017) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secure Comput 2017. https://doi.org/10.1109/TDSC.2017.2725953 Vasilakos AV, Vasilakos AV, Vasilakos AV et al (2017) Fog computing for sustainable smart cities: a survey[J]. ACM Comput Surv 50(3):32 Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415 Hsia C-H (2018) New verification method for finger-vein recognition system. IEEE Sensors J 18(2):790–797 Hsia C-H, Guo J-M, Wu C-S (2017) Finger-vein recognition based on parametric-oriented corrections. Multimedia Tools and Applications (MTAP) 76(23):25179–25196 Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity[J]. Inf Sci 321:162–178 Kim SS (2016) Mutual authentication scheme between biosensor device and data manager in healthcare environment[J]. J Supercomput 72(1):1–8 Shen J, Wang C, Lai CF, Wang A, Chao HC (2016) Direction density-based secure routing protocol for healthcare data in incompletely predictable networks[J]. IEEE Access 4:9163–9173 Wang C, Shen J, Liu Q, Ren Y, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things[J]. Security and Communication Networks (SCN) 2018:1–7. https://doi.org/10.1155/2018/3680851 Shen J, Wang C, Wang A, Ji S, Zhang Y (2018) A searchable and verifiable data protection scheme for scholarly big data. IEEE Transactions on Emerging Topics in Computing (TETC). https://doi.org/10.1109/TETC.2018.2830368 Cilardo A, Coppolino L, Mazzocca N, Romano L (2006) Elliptic curve cryptography engineering[J]. Proc IEEE 94(2):395–406 Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 2013(730831):51–59 Shen J, Shen J, Lai C-F, Liu Q, Zhou T (2018) Cloud based data protection in anonymously controlled SDN. Security and Communication Networks (SCN) 2018:1–8. https://doi.org/10.1155/2018/9845426 Barua R, Dutta R, Sarkar P (2003) Extending Joux’s protocol to multi party key agreement. In: International Conference on Cryptology in India, vol 2904. Springer, Berlin, Heidelberg, pp 205–217 Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195 Shen J, Liu D, Bhuiyan MZA, Shen J, Sun X, Castiglione A (2017) Secure verifiable database supporting efficient dynamic operations in cloud computing[J]. IEEE Transactions on Emerging Topics in Computing (TETC). https://doi.org/10.1109/TETC.2017.2776402 Xu J, Xue K, Yang Q, Hong P (2018) PSAP: pseudonym-based secure authentication protocol for NFC applications[J]. IEEE Trans Consum Electron 64(1):83–91 Ni J, Lin X, Shen XS (2018) Efficient and Secure service-oriented authentication supporting network slicing for 5G-Enabled IoT. IEEE J Sel Areas Commun 36(3):644–657 Madhusudhan R, Mittal RC (2012) Dynamic ID-based remote user password authentication schemes using smart cards: a review. J Netw Comput Appl 35(4):1235–1248 Shen J, Liu D, He D, Huang X, Xiang Y (2017) Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing. IEEE Transactions on Sustainable Computing (T-SUSC). https://doi.org/10.1109/TSUSC.2017.2781232 Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Transactions on Parallel & Distributed Systems(TPDS) 25(9):2386–2396 Chuang MC, Lee JFTEAM (2011) Trust-extended authentication mechanism for vehicular ad hoc networks[C]//. International Conference on Consumer Electronics, Communications and Networks. International Conference on Consumer Electronics, Communications and Networks (CECNet):1758–1761 Shi W, Gong P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. International Journal of Distributed Sensor Networks (IJDSN), 2013, (2013–4–11), 2013, 2013(730831):51–59 Tan Z. Secure delegation-based authentication for telecare medicine information systems[J]. IEEE Access, 2018, PP(99):1–1, 6, 26091, 26110 Hwang S J, You C H. A delegation-based Unlinkable authentication protocol for portable communication systems with non-repudiation[J]. 2013 Shen J, Zhou T, Wei F et al (2018) Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things[J]. IEEE Internet Things J 2017. https://doi.org/10.1109/JIOT.2017.2775248