Conference Proceeding

Mathematics in Space and Applied Sciences (ICMSAS-2023)
ICMSAS-2023

Subject Area: Mathematics
Pages: 331
Published On: 03-Mar-2023
Online Since: 04-Mar-2023

 Read More >>

Author(s): Diksha, Meenakshi

Email(s): dikshachouhan1035@gmail.com

Address: Diksha1*, Meenakshi2
1*,2Srinivasa Ramanujan Department Of Mathematics, Central University Of Himachal Pradesh, Dharamshala,176215, Himachal Pradesh, India.
*Corresponding Author

Published In:   Conference Proceeding, Mathematics in Space and Applied Sciences (ICMSAS-2023)

Year of Publication:  March, 2023

Online since:  March 04, 2023

DOI: Not Available

ABSTRACT:
The creation of TMIS (Telecare Medical Information System) makes it simpler for patients to receive healthcare services and opens up options for seeking medical attention and storing medical records with access control. With Wireless Medical Sensor Network and cloud-based architecture, TMIS gives the chance to patients to collect their physical health information from medical sensors and also upload this information to the cloud through their mobile devices. The communication is held through internet connectivity, therefore security and privacy are the main motive aspects of a secure cloud-assisted TMIS. However, because very sensitive data is transmitted between patients and doctors through the cloud server, thus security protection is important for this system. Recently, Kumar et al designed a mutual authentication protocol for cloud-assisted TMIS based on ECC [2]. In this paper, we revisited this scheme and traced out that their scheme has some significant pitfalls like health report revelation attack, and report confidentiality. In this study, we will provide the cryptanalysis of the scheme developed by Kumar et al.


Cite this article:
Diksha, Meenakshi. Cryptanalysis on Secure ECC based Mutual Authentication Protocol for Cloud-Assisted TMIS. Proceedings of 2nd International Conference on Mathematics in Space and Applied Sciences. 2023;1:130-135.


REFERENCES:

1.         C.-T. Li, D.-H. Shih, C.-C. Wang, Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems, Computer methods and programs in biomedicine 157 (2018) 191–203

2.         Kumar, V., Ahmad, M., Kumari, A., A Secure Elliptic Curve Cryptography Based Mutual Authentication Protocol for Cloud-assisted TMIS, Telematics and Informatics (2018).

3.         CSA, “The notorious nine cloud computing top threats in 2013,” The Notorious Nine Cloud Computing Top Threats in2013: pdf.

4.         Patra, M. R.; Das, R. K.; Padhy, R. P. CRHIS: Cloud Based Rural Healthcare Information System. In Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance; ACM: Albany New York USA, 2012; pp 402–405.

5.         C.-L. Chen, T.-T. Yang, T.-F. Shih, A secure medical data exchange protocol based on cloud environment, Journal of medical systems 38 (9) (2014) 112

6.         C.-T. Li, C.-C. Lee, C.-C. Wang, T.-H. Yang, S.-J. Chen, Design flaws in a secure medical data exchange protocol based on cloud environments, in: International Conference on Algorithms and Architectures for Parallel Processing, Springer, 2015, pp. 435–444.

7.         R. Amin, S. H. Islam, G. Biswas, M. K. Khan, M. S. Obaidat, Design and analysis of an enhanced patient-server mutual authentication protocol for telecare medical information system, Journal of medical systems 39 (11) (2015) 137.

8.         Wu, F., and Xu, L., Security analysis and improvement of a privacy authentication scheme for telecare medical information systems. J. Med. Syst 37(4):1–9, 2012. doi:10.1007/s10916-013-9958-z

9.         Wen, F., and Guo, D., An improved anonymous authentication scheme for telecare medical information systems.J. Med. Syst. 38(5):26, 2014. doi:10.1007/s10916-014-0026-0

10.      Xu, X., Zhu, P., Wen, Q., Jin, Z., Zhang, H., and He, L., A secure and efficient authentication and key agreement scheme based on ecc for telecare medicine information systems. J. Med. Syst. 38(1):9994, 2013. doi:10.1007/s10916-013-9994-8

11.      D. He, N. Kumar, J. Chen, C.-C. Lee, N. Chilamkurti, S.-S. Yeo, Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks, Multimedia Systems 21 (1) (2015) 49–60.

12.      J. Srinivas, D. Mishra, S. Mukhopadhyay, A mutual authentication framework for wireless medical sensor networks, Journal of medical systems 41 (5) (2017) 80

13.      C.-L. Chen, T.-T. Yang, M.-L. Chiang, T.-F. Shih, A privacy authentication scheme based on cloud for medical environment, Journal of medical systems 38 (11) (2014) 143.

14.      S.-Y. Chiou, Z. Ying, J. Liu, Improvement of a privacy authentication scheme based on cloud for medical environment, Journal of medical systems 40 (4) (2016) 101.

15.      P. Mohit, R. Amin, A. Karati, G. Biswas, M. K. Khan, A standard mutual authentication protocol for cloud computing based health care system, Journal of medical systems 41 (4) (2017) 50

16.      V. Kumar, S. Jangirala, M. Ahmad, An efficient mutual authentication framework for healthcare system in cloud computing, Journal of medical systems 42 (8) (2018) 142

17.      C.-T. Li, D.-H. Shih, C.-C. Wang, Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems, Computer methods and programs in biomedicine 157 (2018) 191–203





Author/Editor Information

Dr. Sanjay Kango

Department of Mathematics, Neta Ji Subhash Chander Bose Memorial, Government Post Graduate College, Hamirpur Himachal Pradesh-177 005, INDIA