Cloud-based authenticated protocol for healthcare monitoring system
In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting t...
Gespeichert in:
Veröffentlicht in: | Journal of ambient intelligence and humanized computing 2020-08, Vol.11 (8), p.3431-3447 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3447 |
---|---|
container_issue | 8 |
container_start_page | 3431 |
container_title | Journal of ambient intelligence and humanized computing |
container_volume | 11 |
creator | Chandrakar, Preeti Sinha, Sonam Ali, Rifaqat |
description | In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application. |
doi_str_mv | 10.1007/s12652-019-01537-2 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2920238586</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2920238586</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</originalsourceid><addsrcrecordid>eNp9UE1LAzEQDaJgqf0DnhY8RzNJ87FHWfyCghc9h2w2sVu2m5pkD_33pq7ozYFh5sG8NzMPoWsgt0CIvEtABaeYQF2SM4npGVqAEgpzWPPz357JS7RKaUdKsJoBwAI1zRCmDrcmua4yU966MffW5IIOMeRgw1D5EKutM0PeWhNdtQ9jn0Psx48qHVN2-yt04c2Q3OqnLtH748Nb84w3r08vzf0GWwZ1xsYzL7xh0ioufAvSckU5dcatGVVK1V3b1dSuWym5EK1UBYsOiAdHpDfAluhm1i2XfU4uZb0LUxzLSk1rSihTXIkyRecpG0NK0Xl9iP3exKMGok9-6dkvXfzS335pWkhsJqXD6TEX_6T_YX0BZzZt8Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2920238586</pqid></control><display><type>article</type><title>Cloud-based authenticated protocol for healthcare monitoring system</title><source>SpringerLink Journals</source><source>ProQuest Databases</source><source>ProQuest Central UK/Ireland</source><creator>Chandrakar, Preeti ; Sinha, Sonam ; Ali, Rifaqat</creator><creatorcontrib>Chandrakar, Preeti ; Sinha, Sonam ; Ali, Rifaqat</creatorcontrib><description>In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application.</description><identifier>ISSN: 1868-5137</identifier><identifier>EISSN: 1868-5145</identifier><identifier>DOI: 10.1007/s12652-019-01537-2</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Artificial Intelligence ; Authentication ; Authentication protocols ; Biometrics ; Cellular telephones ; Cloud computing ; Communication ; Computational Intelligence ; Cybersecurity ; Denial of service attacks ; Engineering ; Health care ; Hospitals ; Monitoring systems ; Original Research ; Patients ; Performance evaluation ; Physicians ; Privacy ; Robotics and Automation ; Rural areas ; Telemedicine ; User Interfaces and Human Computer Interaction</subject><ispartof>Journal of ambient intelligence and humanized computing, 2020-08, Vol.11 (8), p.3431-3447</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</citedby><cites>FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</cites><orcidid>0000-0002-7387-1582</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12652-019-01537-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2920238586?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21368,27903,27904,33723,41467,42536,43784,51297,64361,64365,72215</link.rule.ids></links><search><creatorcontrib>Chandrakar, Preeti</creatorcontrib><creatorcontrib>Sinha, Sonam</creatorcontrib><creatorcontrib>Ali, Rifaqat</creatorcontrib><title>Cloud-based authenticated protocol for healthcare monitoring system</title><title>Journal of ambient intelligence and humanized computing</title><addtitle>J Ambient Intell Human Comput</addtitle><description>In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application.</description><subject>Artificial Intelligence</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Biometrics</subject><subject>Cellular telephones</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Computational Intelligence</subject><subject>Cybersecurity</subject><subject>Denial of service attacks</subject><subject>Engineering</subject><subject>Health care</subject><subject>Hospitals</subject><subject>Monitoring systems</subject><subject>Original Research</subject><subject>Patients</subject><subject>Performance evaluation</subject><subject>Physicians</subject><subject>Privacy</subject><subject>Robotics and Automation</subject><subject>Rural areas</subject><subject>Telemedicine</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1868-5137</issn><issn>1868-5145</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9UE1LAzEQDaJgqf0DnhY8RzNJ87FHWfyCghc9h2w2sVu2m5pkD_33pq7ozYFh5sG8NzMPoWsgt0CIvEtABaeYQF2SM4npGVqAEgpzWPPz357JS7RKaUdKsJoBwAI1zRCmDrcmua4yU966MffW5IIOMeRgw1D5EKutM0PeWhNdtQ9jn0Psx48qHVN2-yt04c2Q3OqnLtH748Nb84w3r08vzf0GWwZ1xsYzL7xh0ioufAvSckU5dcatGVVK1V3b1dSuWym5EK1UBYsOiAdHpDfAluhm1i2XfU4uZb0LUxzLSk1rSihTXIkyRecpG0NK0Xl9iP3exKMGok9-6dkvXfzS335pWkhsJqXD6TEX_6T_YX0BZzZt8Q</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Chandrakar, Preeti</creator><creator>Sinha, Sonam</creator><creator>Ali, Rifaqat</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-7387-1582</orcidid></search><sort><creationdate>20200801</creationdate><title>Cloud-based authenticated protocol for healthcare monitoring system</title><author>Chandrakar, Preeti ; Sinha, Sonam ; Ali, Rifaqat</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Artificial Intelligence</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Biometrics</topic><topic>Cellular telephones</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Computational Intelligence</topic><topic>Cybersecurity</topic><topic>Denial of service attacks</topic><topic>Engineering</topic><topic>Health care</topic><topic>Hospitals</topic><topic>Monitoring systems</topic><topic>Original Research</topic><topic>Patients</topic><topic>Performance evaluation</topic><topic>Physicians</topic><topic>Privacy</topic><topic>Robotics and Automation</topic><topic>Rural areas</topic><topic>Telemedicine</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chandrakar, Preeti</creatorcontrib><creatorcontrib>Sinha, Sonam</creatorcontrib><creatorcontrib>Ali, Rifaqat</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Databases</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of ambient intelligence and humanized computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chandrakar, Preeti</au><au>Sinha, Sonam</au><au>Ali, Rifaqat</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud-based authenticated protocol for healthcare monitoring system</atitle><jtitle>Journal of ambient intelligence and humanized computing</jtitle><stitle>J Ambient Intell Human Comput</stitle><date>2020-08-01</date><risdate>2020</risdate><volume>11</volume><issue>8</issue><spage>3431</spage><epage>3447</epage><pages>3431-3447</pages><issn>1868-5137</issn><eissn>1868-5145</eissn><abstract>In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12652-019-01537-2</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-7387-1582</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1868-5137 |
ispartof | Journal of ambient intelligence and humanized computing, 2020-08, Vol.11 (8), p.3431-3447 |
issn | 1868-5137 1868-5145 |
language | eng |
recordid | cdi_proquest_journals_2920238586 |
source | SpringerLink Journals; ProQuest Databases; ProQuest Central UK/Ireland |
subjects | Artificial Intelligence Authentication Authentication protocols Biometrics Cellular telephones Cloud computing Communication Computational Intelligence Cybersecurity Denial of service attacks Engineering Health care Hospitals Monitoring systems Original Research Patients Performance evaluation Physicians Privacy Robotics and Automation Rural areas Telemedicine User Interfaces and Human Computer Interaction |
title | Cloud-based authenticated protocol for healthcare monitoring system |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T19%3A18%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud-based%20authenticated%20protocol%20for%20healthcare%20monitoring%20system&rft.jtitle=Journal%20of%20ambient%20intelligence%20and%20humanized%20computing&rft.au=Chandrakar,%20Preeti&rft.date=2020-08-01&rft.volume=11&rft.issue=8&rft.spage=3431&rft.epage=3447&rft.pages=3431-3447&rft.issn=1868-5137&rft.eissn=1868-5145&rft_id=info:doi/10.1007/s12652-019-01537-2&rft_dat=%3Cproquest_cross%3E2920238586%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2920238586&rft_id=info:pmid/&rfr_iscdi=true |