184
Views
1
CrossRef citations to date
0
Altmetric
Articles

EAAF: ECC-based anonymous authentication framework for cloud-medical system

, &
Pages 491-500 | Received 25 Dec 2019, Accepted 19 Aug 2020, Published online: 09 Sep 2020
 

Abstract

With the fast progress of networking and the rising demand of online treatment, there is a need to provide a safe and secure treatment to patient from doctor via communication system. Telecare medical information system (TMIS) provides such facilities in network system. In TMIS, the authenticated doctor can provide online treatment to patient at anytime anywhere. The security and privacy are significant concern for medical information of the patient in healthcare system. For enhancement of security and privacy level, we propose an elliptic curve cryptography (ECC) assisted authentication framework for cloud-medical system. The proposed protocol is secure against active and passive security attacks. Further, our protocol satisfies security attributes in communication channel. The proposed framework is efficient in computation and communication cost. As a result, the proposed framework can be more applicable in the cloud-based medical system.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Notes on contributors

Adesh Kumari

Adesh Kumari received Master degree in Mathematics from M.D.U Rohtak, India. Presently, she is pursuing Ph.D. degree from Department of Mathematics, Jamia Millia Islamia, New Delhi, India. She has authored or coauthored 10 research papers in reputed international journals and conferences. Her research interests include remote user authentication protocols, smart card security, vehicular networking, information security and cloud computing.

Vinod Kumar

Vinod Kumar received Master of Philosophy in Mathematics from Chaudhary Charan Singh University, Meerut, India. He has received Master of Technology degree from IIT Kharagpur in 2013. Presently, he is working as an Assistant Professor in Department of Mathematics, PGDAV College, University of Delhi, New Delhi, India. He has authored or coauthored of 20 research papers in reputed international journals and conferences. He is a reviewer of many reputed journals. His research interests include remote user authentication protocols, information and network security, cloud computing, cryptographic security protocols, vehicular networking and applied mathematics.

M. Yahya Abbasi

M. Yahya Abbasi received the Ph.D. degree from Department of Mathematics, Aligarh Muslim University, Aligarh, India. Currently, he is Assistant Professor in the Department of Mathematics, Jamia Millia Islamia, New Delhi, India. He is edited two books and published more than 40 research papers in reputed international journals and conferences. His research interests include abstract algebra, application of algebra and cryptography.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.