Abstract
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.





Similar content being viewed by others
References
Amin, R., Cryptanalysis and efficient dynamic id based remote user authentication scheme in multi-server environment using smart card. IJ Netw. Secur. 18(1):172–181, 2016.
Amin, R., and Biswas, G. P, Cryptanalysis and design of a three-party authenticated key exchange protocol using smart card. Arab. J. Sci. Eng. 40(11):3135–3149, 2015.
Amin, R., and Biswas, G. P., A secure three-factor user authentication and key agreement protocol for tmis with user anonymity. J. Med. Syst. 39(8):1–19, 2015.
Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Kumar, N.: A robust and anonymous patient monitoring system using wireless medical sensor networks. Future Generation Computer Systems. doi:10.1016/j.future.2016.05.032 (2016)
Amin, R., Islam, S. H., Biswas, G. P., Khan, M. K., Li, X., Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems. J. Med. Syst. 39(11):140 , 2015.
Chaudhry, S. A., Khan, M. T., Khan, M. K., Shon, T., A multiserver biometric authentication scheme for tmis using elliptic curve cryptography. J. Med. Syst. 40(11):230, 2016.
Chaudhry, S. A., Naqvi, H., Shon, T., Sher, M., Farash, M. S., Cryptanalysis and improvement of an improved two factor authentication protocol for telecare medical information systems. J. Med. Syst. 39(6):65–75, 2015.
Chen, C. L., Yang, T. T., Chiang, M. L., Shih, T. F., A privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 38(11):1–16, 2014.
Chen, C. L., Yang, T. T., Shih, T. F., A secure medical data exchange protocol based on cloud environment. J. Med. Syst. 38(9):1–12, 2014.
Chiou, S. Y., Ying, Z., Liu, J., Improvement of a privacy authentication scheme based on cloud for medical environment. J. Med. Syst. 40(4):1–15, 2016.
Debiao, H., Jianhua, C., Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.
Giri, D., Sherratt, R. S., Maitra, T., Amin, R., Efficient biometric and password based mutual authentication for consumer usb mass storage devices. IEEE Trans. Consum. Electron. 61(4):491–499, 2015.
Gope, P., and Amin, R., A novel reference security model with the situation based access policy for accessing ephr data. J. Med. Syst. 40(11):41–53, 2016.
Gope, P., and Hwang, T., A realistic lightweight anonymous authentication protocol for securing real-time application data access in wireless sensor networks. IEEE Trans. Ind. Electron. 63(11):7124–7132, 2016.
He, D., Kumar, N., Shen, H., Lee, J. H., One-to-many authentication for access control in mobile pay-tv systems. Sci. China Inf. Sci. 59(5):1–14, 2015.
He, D., Kumar, N., Wang, H., Wang, L., Choo, K. K. R., Vinel, A.: A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Transactions on Dependable and Secure Computing (99), 1–1. doi:10.1109/TDSC.2016.2596286 (2016)
He, D., and Wang, D., Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst. J. 9(3):816–823, 2015.
He, D., Zeadally, S., Kumar, N., Lee, J. H.: Anonymous authentication for wireless body area networks with provable security (99) 1–12. doi:10.1109/JSYST.2016.2544805 (2016)
Islam, S., Obaidat, M. S., Amin, R.: An anonymous and provably secure authentication scheme for mobile user. International Journal of Communication Systems. doi:10.1002/dac.3126 (2016)
Islam, S. H., Amin, R., Biswas, G. P., Farash, M. S., Li, X., Kumari, S.: An improved three party authenticated key exchange protocol using hash function and elliptic curve cryptography for mobile-commerce environments Journal of King Saud University-Computer and Information Sciences. doi:10.1016/j.jksuci.2015.08.002 (2015)
Jiang, Q., Ma, J., Ma, Z., Li, G., A privacy enhanced authentication scheme for telecare medical information systems. J. Med. Syst. 37(1):1–8, 2013.
Karati, A., Amin, R., Biswas, G. P., Provably secure threshold-based abe scheme without bilinear map. Arab. J. Sci. Eng. 41(8):3201–3213, 2016.
Khan, M. K., and Kumari, S., An authentication scheme for secure access to healthcare services. J. Med. Syst. 37(4):1–12, 2013.
Kumar, R., Amin, R., Karati, A., Biswas, G. P.: Secure remote login scheme with password and smart card update facilities. In: Proceedings of the 4th international conference on frontiers in intelligent computing: Theory and applications (FICTA) 2015, pp. 495–505. Springer (2016)
Kumari, S., Khan, M. K., Kumar, R., Cryptanalysis and improvement of ’a privacy enhanced scheme for telecare medical information systems’. J. Med. Syst. 37(4):1–11, 2013.
Lee, C. C., Hsu, C. W., Lai, Y. M., Vasilakos, A., An enhanced mobile-healthcare emergency system based on extended chaotic maps. J. Med. Syst. 37(5):1–12, 2013.
Li, C. T., Lee, C. C., Weng, C. Y., A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems. J. Med. Syst. 38(9):1–11, 2014.
Li, X., Kumari, S., Shen, J., Wu, F., Chen, C., Islam, S. H.: Secure data access and sharing scheme for cloud storage. Wireless Personal Communications pp.1–20. doi:10.1007/s11277-016-3742-6 (2016)
Li, X., Niu, J., Karuppiah, M., Kumari, S., Wu, F., Secure and efficient two-factor user authentication scheme with user anonymity for network based e-health care applications. J. Med. Syst. 40(12):267–277, 2016.
Li, X., Niu, J., Khan, M. K., Liao, J., An enhanced smart card based remote user password authentication scheme. J. Netw. Comput. Appl. 36(5):1365–1371, 2013.
Maitra, T., Obaidat, M. S., Amin, R., Islam, S., Chaudhry, S. A., Giri, D.: A robust elgamal-based password-authentication protocol using smart card for client-server communication International Journal of Communication Systems. doi:10.1002/dac.3242 (2016)
Mishra, D., Mukhopadhyay, S., Chaturvedi, A., Kumari, S., Khan, M. K., Cryptanalysis and improvement of yan others.’s biometric-based authentication scheme for telecare medicine information systems. J. Med. Syst. 38(6):1–12, 2014.
Mishra, D., Srinivas, J., Mukhopadhyay, S., A secure and efficient chaotic map-based authenticated key agreement scheme for telecare medicine information systems. J. Med. Syst. 38(10): 1–10, 2014.
Shao, J., Lin, X., Lu, R., Zuo, C., A threshold anonymous authentication protocol for vanets. IEEE Trans. Veh. Technol. 65(3):1711–1720, 2016.
Sureshkumar, V., Anitha, R., Rajamanickam, N., Amin, R.: A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity Computers & Electrical Engineering. doi:10.1016/j.compeleceng.2016.07.014 (2016)
Sutrala, A. K., Das, A. K., Odelu, V., Wazid, M., Kumari, S., Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems. Comput. Methods Prog. Biomed. 135:167–185, 2016.
Tan, Z., An efficient biometrics-based authentication scheme for telecare medicine information systems. Network 2(3):200–204, 2013.
Wazid, M., Das, A. K., Kumari, S., Li, X., Wu, F., Design of an efficient and provably secure anonymity preserving three-factor user authentication and key agreement scheme for tmis. Secur. Commun. Netw. 9(13):1983–2001, 2016.
Wei, J., Hu, X., Liu, W., An improved authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6):3597–3604, 2012.
Wu, Z. Y., Chung, Y., Lai, F., Chen, T. S., A password-based user authentication scheme for the integrated epr information system. J. Med. Syst. 36(2):631–638, 2012.
Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.
Wu, Z. Y., Tseng, Y. J., Chung, Y., Chen, Y. C., Lai, F., A reliable user authentication and key agreement scheme for web-based hospital-acquired infection surveillance information system. J. Med. Syst. 36(4): 2547–2555, 2012.
Yan, X., Li, W., Li, P., Wang, J., Hao, X., Gong, P., A secure biometrics-based authentication scheme for telecare medicine information systems. J. Med. Syst. 35(5):1–6, 2013.
Yang, H., Kim, H., Mtonga, K., An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-to-Peer Netw. Appl. 8(6):1059–1069, 2015.
Zhu, Z., An efficient authentication scheme for telecare medicine information systems. J. Med. Syst. 36(6): 3833–3838 , 2012.
Acknowledgments
The authors extend their sincere appreciations to the Deanship of Scientific Research at King Saud University for its funding this Prolific Research Group (PRG-1436-16).
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Systems-Level Quality Improvement
Rights and permissions
About this article
Cite this article
Mohit, P., Amin, R., Karati, A. et al. A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System. J Med Syst 41, 50 (2017). https://doi.org/10.1007/s10916-017-0699-2
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s10916-017-0699-2