Design of Secure Authentication Protocol for Cloud-Assisted Telecare Medical Information System Using Blockchain

Telecare medical information system (TMIS) implemented in wireless body area network (WBAN) is convenient and time-saving for patients and doctors. TMIS is realized using wearable devices worn by a patient, and wearable devices generate patient health data and transmit them to a server through a public channel. Unfortunately, a malicious attacker can attempt performing various attacks through such a channel. Therefore, establishing a secure authentication process between a patient and a server is essential. Moreover, wearable devices have limited storage power. Cloud computing can be considered to resolve this problem by providing a storage service in the TMIS environment. In this environment, access control of the patient health data is essential for the quality of healthcare. Furthermore, the database of the cloud server is a major target for an attacker. The attacker can try to modify, forge, or delete the stored data. To resolve these problems, we propose a secure authentication protocol for a cloud-assisted TMIS with access control using blockchain. We employ ciphertext-policy attribute-based encryption (CP-ABE) to establish access control for health data stored in the cloud server, and apply blockchain to guarantee data integrity. To prove robustness of the proposed protocol, we conduct informal analysis and Burrows-Adabi-Needham (BAN) logic analysis, and we formally validate the proposed protocol using automated validation of internet security protocols and applications (AVISPA). Consequently, we show that the proposed protocol provides more security and has better efficiency compared to related protocols. Therefore, the proposed protocol is proper for a practical TMIS environment.

[1]  Muhammad Khurram Khan,et al.  A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System , 2017, Journal of Medical Systems.

[2]  YoHan Park,et al.  Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks , 2016, Sensors.

[3]  Joel J. P. C. Rodrigues,et al.  TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment , 2019, IEEE Transactions on Vehicular Technology.

[4]  Samiran Chattopadhyay,et al.  A Provably Secure and Lightweight Anonymous User Authenticated Session Key Exchange Scheme for Internet of Things Deployment , 2019, IEEE Internet of Things Journal.

[5]  Tugrul Yanik,et al.  A Survey of SIP Authentication and Key Agreement Schemes , 2014, IEEE Communications Surveys & Tutorials.

[6]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[7]  Zhenguo Zhao,et al.  An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.

[8]  YoungHo Park,et al.  Secure Authentication Protocol for Wireless Sensor Networks in Vehicular Communications , 2018, Sensors.

[9]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[10]  Chao Yang,et al.  A bilinear pairing based anonymous authentication scheme in wireless body area networks for mHealth , 2016, Journal of Medical Systems.

[11]  Atif Alamri,et al.  Privacy-Preserved, Provable Secure, Mutually Authenticated Key Agreement Protocol for Healthcare in a Smart City Environment , 2019, IEEE Access.

[12]  Samiran Chattopadhyay,et al.  Provably Secure Fine-Grained Data Access Control Over Multiple Cloud Servers in Mobile Cloud Computing Based Healthcare Applications , 2019, IEEE Transactions on Industrial Informatics.

[13]  Ashok Kumar Das,et al.  On the Design of Secure and Efficient Three-Factor Authentication Protocol Using Honey List for Wireless Sensor Networks , 2020, IEEE Access.

[14]  Aiqing Zhang,et al.  Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain , 2018, Journal of Medical Systems.

[15]  Ashok Kumar Das,et al.  Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks , 2017, IEEE Access.

[16]  Sherali Zeadally,et al.  Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks , 2018, IEEE Systems Journal.

[17]  Sebastian Mödersheim,et al.  OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.

[18]  Zibin Zheng,et al.  Blockchain for cloud exchange: A survey , 2020, Comput. Electr. Eng..

[19]  YoHan Park,et al.  Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment , 2020, Applied Sciences.

[20]  Hao Wang,et al.  Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain , 2018, Journal of Medical Systems.

[21]  David von Oheimb The High-Level Protocol Specification Language HLPSL developed in the EU project AVISPA , 2005 .

[22]  Young-Ho Park,et al.  A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks , 2020, Applied Sciences.

[23]  Samiran Chattopadhyay,et al.  On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems , 2017, IEEE Access.

[24]  Eun-Jun Yoon,et al.  Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications , 2017, IEEE Access.

[25]  YoHan Park,et al.  Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments , 2019, Sensors.

[26]  Mauro Conti,et al.  Design of Secure User Authenticated Key Management Protocol for Generic IoT Networks , 2018, IEEE Internet of Things Journal.

[27]  Ting Li,et al.  Medical Data Sharing Scheme Based on Attribute Cryptosystem and Blockchain Technology , 2020, IEEE Access.

[28]  Chin-Ling Chen,et al.  A Privacy Authentication Scheme Based on Cloud for Medical Environment , 2014, Journal of Medical Systems.

[29]  Zibin Zheng,et al.  An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends , 2017, 2017 IEEE International Congress on Big Data (BigData Congress).

[30]  Sheetal Kalra,et al.  A Lightweight User Authentication Scheme for Cloud-IoT Based Healthcare Services , 2018, Iranian Journal of Science and Technology, Transactions of Electrical Engineering.

[31]  Rui Guo,et al.  Flexible and Efficient Blockchain-Based ABE Scheme With Multi-Authority for Medical on Demand in Telemedicine System , 2019, IEEE Access.

[32]  YoHan Park,et al.  Secure user authentication scheme with novel server mutual verification for multiserver environments , 2019, Int. J. Commun. Syst..

[33]  Roberto Baldoni,et al.  PBFT vs Proof-of-Authority: Applying the CAP Theorem to Permissioned Blockchain , 2018, ITASEC.

[34]  Chunhua Jin,et al.  An Improved Two-Layer Authentication Scheme for Wireless Body Area Networks , 2018, Journal of Medical Systems.

[35]  Chun-Ta Li,et al.  Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems. , 2018, Computer methods and programs in biomedicine.

[36]  Ashok Kumar Das,et al.  Certificate-Based Anonymous Device Access Control Scheme for IoT Environment , 2019, IEEE Internet of Things Journal.

[37]  Kyung Sup Kwak,et al.  Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[38]  Willy Susilo,et al.  Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment , 2020, IEEE Transactions on Dependable and Secure Computing.

[39]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[40]  Junqiang Liu,et al.  Improvement of a Privacy Authentication Scheme Based on Cloud for Medical Environment , 2016, Journal of Medical Systems.

[41]  Mathieu Turuani,et al.  The CL-Atse Protocol Analyser , 2006, RTA.

[42]  Abbas Jamalipour,et al.  Wireless Body Area Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.

[43]  Ashok Kumar Das,et al.  An Enhanced Access Control Scheme in Wireless Sensor Networks , 2014, Ad Hoc Sens. Wirel. Networks.

[44]  Chin-Chen Chang,et al.  A Provably Secure, Efficient, and Flexible Authentication Scheme for Ad hoc Wireless Sensor Networks , 2016, IEEE Transactions on Wireless Communications.

[45]  Yong Wang,et al.  Cloud-Assisted EHR Sharing With Security and Privacy Preservation via Consortium Blockchain , 2019, IEEE Access.

[46]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[47]  Dezhong Peng,et al.  Analysis and Improvement of a Mutual Authentication Scheme for Wireless Body Area Networks , 2019, Journal of Medical Systems.

[48]  Rui Guo,et al.  Secure Attribute-Based Signature Scheme With Multiple Authorities for Blockchain in Electronic Health Records Systems , 2018, IEEE Access.

[49]  Martín Abadi,et al.  A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.

[50]  Athanasios V. Vasilakos,et al.  Biometrics-Based Privacy-Preserving User Authentication Scheme for Cloud-Based Industrial Internet of Things Deployment , 2018, IEEE Internet of Things Journal.

[51]  Yanmei Zhang,et al.  New Authentication Scheme for Wireless Body Area Networks Using the Bilinear Pairing , 2015, Journal of Medical Systems.

[52]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[53]  Haleh Amintoosi,et al.  Cryptanalysis of Khatoon et al.'s ECC-based Authentication Protocol for Healthcare Systems , 2019, ArXiv.

[54]  YoungHo Park,et al.  Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain , 2020, Sensors.

[55]  Athanasios V. Vasilakos,et al.  Design of secure key management and user authentication scheme for fog computing services , 2019, Future Gener. Comput. Syst..

[56]  Chen Li,et al.  A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT , 2019, IEEE Access.

[57]  Ikram Ali,et al.  Certificateless authenticated key agreement for blockchain-based WBANs , 2020, J. Syst. Archit..