Abstract

The wide applications of the Internet of Things and cloud computing technologies have driven the development of many industries. With the improvement of living standards, health has become the top priority of people’s attention. The emergence of the wireless body area network (WBAN) enables people to master their physical condition all the time and make it more convenient for patients and doctors to communicate with each other. Doctors can provide real-time online treatment with cloud-based smart healthcare environments for patients. In this process, patients, health records, and doctors need to maintain security and privacy. Recently, Kumari et al. proposed a secure framework for the smart medical system. However, we found that their framework cannot provide the anonymity of patients and doctors, data confidentiality, and patient unlinkability and also is subject to impersonation attacks and desynchronization attacks. In order to ensure the security and privacy of patients and doctors, we propose an authentication and key exchange protocol in cloud-based smart healthcare environments. Formal and informal security analyses, as well as performance analysis, demonstrated that our protocol is suitable for these environments.

Highlights

  • With the development of wireless networks, hardware, and sensing devices, the application of the Internet of ings (IoT) [1, 2] involves various fields including artificial intelligence [3,4,5,6]. e increase of the business volume of the IoT requires more data storage space and stronger analytical and computing power, and cloud computing technology can meet these demands

  • Smart healthcare uses IoT technologies to construct an electronic health information platform to realize the interaction between patients with wearable devices, medical staff, and medical institutions, greatly improve the service quality of medical treatment, and reduce the cost of medical treatment. Both patients and doctors need to register in the cloud health center to obtain legal identity and store health data and diagnostic records. e body data collected by wearable devices and the physical condition reported by patients need to be transmitted to doctors through the cloud health center, and the doctors return the diagnosis results to them

  • Our protocol can reduce the amount of information transmitted and enhance the security of doctors and patients. We provide both formal and informal security analyses, ProVerif software analysis, and performance analysis to demonstrate that our protocol can meet the requirements of the cloud-based smart healthcare environments

Read more

Summary

Introduction

With the development of wireless networks, hardware, and sensing devices, the application of the Internet of ings (IoT) [1, 2] involves various fields including artificial intelligence [3,4,5,6]. e increase of the business volume of the IoT requires more data storage space and stronger analytical and computing power, and cloud computing technology can meet these demands. Smart healthcare uses IoT technologies to construct an electronic health information platform to realize the interaction between patients with wearable devices, medical staff, and medical institutions, greatly improve the service quality of medical treatment, and reduce the cost of medical treatment In smart healthcare, both patients and doctors need to register in the cloud health center to obtain legal identity and store health data and diagnostic records. In 2018, Li et al [29] pointed out that [28] cannot guarantee the anonymity and data confidentiality of patients and is attacked by the impersonated inspection report After that, they designed a cloud-assisted mutual authentication and privacy protection protocol for the TMIS.

Limitations
Proposed Protocol
Security Analysis
Definitions
Informal Security Analysis
Performance Evaluation
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.