A Novel User Authentication and Key Management Protocol for Cloud Assisted Body Area Network

Sensors in Body Area Network generate a huge amount of patient health data, but they have limited storage and computing capability. These data need to be transmitted to and aggregated by a gateway node which in turn can send the data to a cloud server. However, secure transmission, storage and access control of these data are of utmost importance to get useful insight from these data. Hence, there is a need for user authentication and key management scheme for the cloud assisted health-care services. Traditional password based or bio-metric based authentications mechanism suffer from security and privacy issues. State of the art multi-factor authentications schemes are the need of the hour. In this paper, a novel multi-factor authentication scheme has been designed using verifiable random functions. Thereafter, a key management scheme has been proposed. The performance analysis for the proposed scheme has been carried out and compared with related well known schemes.

[1]  Ashutosh Saxena,et al.  A dynamic ID-based remote user authentication scheme , 2004, IEEE Transactions on Consumer Electronics.

[2]  Qiang Liu,et al.  A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing , 2017, 2017 International Conference on Networking and Network Applications (NaNA).

[3]  Melissa Chase,et al.  FAME: Fast Attribute-based Message Encryption , 2017, CCS.

[4]  Yan Zhang,et al.  An identity authentication scheme based on cloud computing environment , 2017, Multimedia Tools and Applications.

[5]  Brent Waters,et al.  Constructing Verifiable Random Functions with Large Input Spaces , 2010, EUROCRYPT.

[6]  Peter J. Tonellato,et al.  Cloud computing for comparative genomics , 2010, BMC Bioinformatics.

[7]  Jianfeng Ma,et al.  A privacy preserving three-factor authentication protocol for e-Health clouds , 2016, The Journal of Supercomputing.

[8]  Peter J. Tonellato,et al.  Cost-Effective Cloud Computing: A Case Study Using the Comparative Genomics Tool, Roundup , 2010, Evolutionary bioinformatics online.

[9]  Nigel P. Smart,et al.  Lattice Attacks on Digital Signature Schemes , 2001, Des. Codes Cryptogr..

[10]  Min Chen,et al.  NDNC-BAN: Supporting rich media healthcare services via named data networking in cloud-assisted wireless body area networks , 2014, Inf. Sci..

[11]  Jian Shen,et al.  Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks , 2018, J. Netw. Comput. Appl..

[12]  Ling Tian,et al.  Identity-Based Authentication for Cloud Computing , 2009, CloudCom.

[13]  Yan-yan Wang,et al.  A more efficient and secure dynamic ID-based remote user authentication scheme , 2009, Comput. Commun..

[14]  Jen-Ho Yang,et al.  An ID-Based User Authentication Scheme for Cloud Computing , 2014, 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[15]  Michael C. Schatz,et al.  Cloud Computing and the DNA Data Race , 2010, Nature Biotechnology.

[16]  Athanasios V. Vasilakos,et al.  Authenticated key management protocol for cloud-assisted body area sensor networks , 2018, J. Netw. Comput. Appl..

[17]  Athanasios V. Vasilakos,et al.  Design and analysis of authenticated key agreement scheme in cloud-assisted cyber-physical systems , 2020, Future Gener. Comput. Syst..

[18]  Jia-Lun Tsai,et al.  A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services , 2015, IEEE Systems Journal.

[19]  Athanasios V. Vasilakos,et al.  Cloud-assisted body area networks: state-of-the-art and future challenges , 2014, Wirel. Networks.

[20]  Vanga Odelu,et al.  A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards , 2015, IEEE Transactions on Information Forensics and Security.

[21]  Wei-Kuan Shih,et al.  An Advanced ECC Dynamic ID-Based Remote Mutual Authentication Scheme for Cloud Computing , 2011, 2011 Fifth FTRA International Conference on Multimedia and Ubiquitous Engineering.

[22]  Xuejie Zhang,et al.  Identity-Based Authentication in Cloud Storage Sharing , 2010, 2010 International Conference on Multimedia Information Networking and Security.

[23]  Behnam Bahrak,et al.  An improved authentication protocol for distributed mobile cloud computing services , 2017, Int. J. Crit. Infrastructure Prot..

[24]  Ashok Kumar Das,et al.  A new two-server authentication and key agreement protocol for accessing secure cloud services , 2018, Comput. Networks.

[25]  Silvio Micali,et al.  How to construct random functions , 1986, JACM.

[26]  M. S. Avila-Garcia,et al.  Lowering the Barriers to Cancer Imaging , 2008, 2008 IEEE Fourth International Conference on eScience.

[27]  Jin-Mook Kim,et al.  Secure Authentication System for Hybrid Cloud Service in Mobile Communication Environments , 2014, Int. J. Distributed Sens. Networks.

[28]  Silvio Micali,et al.  Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).