Abstract
Healthcare in fog computing is a novel topic in recent year. With the development of technology, it is a pressing issue to accomplish the secure healthcare in fog computing. Moreover, how to ensure the security and efficiency of the transmission healthcare data in open channel is a challenge to be solved. In this paper, a lightweight authentication and matrix-based key agreement scheme is proposed to support the communication of multi parties in fog computing. On the one hand, the lightweight authentication technology is needed to verify the identity of multi-parties that assure the facticity of communication parties in the open channel. On the other hand, using the matrix-based key agreement technology encrypts the healthcare data and uploads to the cloud server with the aid of the doubly-linked cyclic (DLC) tables. The security analysis shows that the proposed scheme is secure to transmit the data for healthcare. The performance analysis shows that the proposed scheme reduces the communication cost.


Similar content being viewed by others
References
Zhu N, Craddock I, Diethe T et al (2015) Bridging e-health and the internet of things: the SPHERE project[J]. IEEE Intell Syst 30(4):39–46
Shen J, Zhou T, Chen X, Li J, Susilo W (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925
Chen S-L, Nie J, Lin T-L, Chung R-L, Hsia C-H, Liu Z-Y, Wu H-X (2018) VLSI implementation of an ultra low-cost and low-power image compressor for wireless camera networks. J Real-Time Image Proc 14(4):803–812
Hsia C-H, Dai Y-J, Chen S-L, Lin T-L, Shen J (2018) A gait sequence analysis for IP camera using a modified LBP. Journal of Internet Technology (JIT) 19(2):451–458
Shen J, Zhou T, He D, Zhang Y, Sun X, Xiang Y (2017) Block design-based key agreement for group data sharing in cloud computing. IEEE Trans Dependable Secure Comput 2017. https://doi.org/10.1109/TDSC.2017.2725953
Vasilakos AV, Vasilakos AV, Vasilakos AV et al (2017) Fog computing for sustainable smart cities: a survey[J]. ACM Comput Surv 50(3):32
Shen J, Shen J, Chen X, Huang X, Susilo W (2017) An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur 12(10):2402–2415
Hsia C-H (2018) New verification method for finger-vein recognition system. IEEE Sensors J 18(2):790–797
Hsia C-H, Guo J-M, Wu C-S (2017) Finger-vein recognition based on parametric-oriented corrections. Multimedia Tools and Applications (MTAP) 76(23):25179–25196
Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity[J]. Inf Sci 321:162–178
Kim SS (2016) Mutual authentication scheme between biosensor device and data manager in healthcare environment[J]. J Supercomput 72(1):1–8
Shen J, Wang C, Lai CF, Wang A, Chao HC (2016) Direction density-based secure routing protocol for healthcare data in incompletely predictable networks[J]. IEEE Access 4:9163–9173
Wang C, Shen J, Liu Q, Ren Y, Li T (2018) A novel security scheme based on instant encrypted transmission for internet of things[J]. Security and Communication Networks (SCN) 2018:1–7. https://doi.org/10.1155/2018/3680851
Shen J, Wang C, Wang A, Ji S, Zhang Y (2018) A searchable and verifiable data protection scheme for scholarly big data. IEEE Transactions on Emerging Topics in Computing (TETC). https://doi.org/10.1109/TETC.2018.2830368
Cilardo A, Coppolino L, Mazzocca N, Romano L (2006) Elliptic curve cryptography engineering[J]. Proc IEEE 94(2):395–406
Shi W, Gong P (2013) A new user authentication protocol for wireless sensor networks using elliptic curves cryptography. Int J Distrib Sens Netw 2013(730831):51–59
Shen J, Shen J, Lai C-F, Liu Q, Zhou T (2018) Cloud based data protection in anonymously controlled SDN. Security and Communication Networks (SCN) 2018:1–8. https://doi.org/10.1155/2018/9845426
Barua R, Dutta R, Sarkar P (2003) Extending Joux’s protocol to multi party key agreement. In: International Conference on Cryptology in India, vol 2904. Springer, Berlin, Heidelberg, pp 205–217
Chen X, Li J, Weng J, Ma J, Lou W (2016) Verifiable computation over large database with incremental updates. IEEE Trans Comput 65(10):3184–3195
Shen J, Liu D, Bhuiyan MZA, Shen J, Sun X, Castiglione A (2017) Secure verifiable database supporting efficient dynamic operations in cloud computing[J]. IEEE Transactions on Emerging Topics in Computing (TETC). https://doi.org/10.1109/TETC.2017.2776402
Xu J, Xue K, Yang Q, Hong P (2018) PSAP: pseudonym-based secure authentication protocol for NFC applications[J]. IEEE Trans Consum Electron 64(1):83–91
Ni J, Lin X, Shen XS (2018) Efficient and Secure service-oriented authentication supporting network slicing for 5G-Enabled IoT. IEEE J Sel Areas Commun 36(3):644–657
Madhusudhan R, Mittal RC (2012) Dynamic ID-based remote user password authentication schemes using smart cards: a review. J Netw Comput Appl 35(4):1235–1248
Shen J, Liu D, He D, Huang X, Xiang Y (2017) Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing. IEEE Transactions on Sustainable Computing (T-SUSC). https://doi.org/10.1109/TSUSC.2017.2781232
Chen X, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Transactions on Parallel & Distributed Systems(TPDS) 25(9):2386–2396
Chuang MC, Lee JFTEAM (2011) Trust-extended authentication mechanism for vehicular ad hoc networks[C]//. International Conference on Consumer Electronics, Communications and Networks. International Conference on Consumer Electronics, Communications and Networks (CECNet):1758–1761
Shi W, Gong P. A new user authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. International Journal of Distributed Sensor Networks (IJDSN), 2013, (2013–4–11), 2013, 2013(730831):51–59
Tan Z. Secure delegation-based authentication for telecare medicine information systems[J]. IEEE Access, 2018, PP(99):1–1, 6, 26091, 26110
Hwang S J, You C H. A delegation-based Unlinkable authentication protocol for portable communication systems with non-repudiation[J]. 2013
Shen J, Zhou T, Wei F et al (2018) Privacy-preserving and lightweight key agreement protocol for V2G in the social internet of things[J]. IEEE Internet Things J 2017. https://doi.org/10.1109/JIOT.2017.2775248
Acknowledgements
This work is supported by the National Natural Science Foundation of China under Grant No. 61672295, No. 61672290, and No. 61772280, Guangxi Key Laboratory of Cryptography and Information Security under Grant No. GCIS201715, the CICAEET fund, and the PAPD fund.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Shen, J., Yang, H., Wang, A. et al. Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing. Peer-to-Peer Netw. Appl. 12, 924–933 (2019). https://doi.org/10.1007/s12083-018-0696-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-018-0696-3