Cloud-based authenticated protocol for healthcare monitoring system

In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of ambient intelligence and humanized computing 2020-08, Vol.11 (8), p.3431-3447
Hauptverfasser: Chandrakar, Preeti, Sinha, Sonam, Ali, Rifaqat
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 3447
container_issue 8
container_start_page 3431
container_title Journal of ambient intelligence and humanized computing
container_volume 11
creator Chandrakar, Preeti
Sinha, Sonam
Ali, Rifaqat
description In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application.
doi_str_mv 10.1007/s12652-019-01537-2
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2920238586</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2920238586</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</originalsourceid><addsrcrecordid>eNp9UE1LAzEQDaJgqf0DnhY8RzNJ87FHWfyCghc9h2w2sVu2m5pkD_33pq7ozYFh5sG8NzMPoWsgt0CIvEtABaeYQF2SM4npGVqAEgpzWPPz357JS7RKaUdKsJoBwAI1zRCmDrcmua4yU966MffW5IIOMeRgw1D5EKutM0PeWhNdtQ9jn0Psx48qHVN2-yt04c2Q3OqnLtH748Nb84w3r08vzf0GWwZ1xsYzL7xh0ioufAvSckU5dcatGVVK1V3b1dSuWym5EK1UBYsOiAdHpDfAluhm1i2XfU4uZb0LUxzLSk1rSihTXIkyRecpG0NK0Xl9iP3exKMGok9-6dkvXfzS335pWkhsJqXD6TEX_6T_YX0BZzZt8Q</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2920238586</pqid></control><display><type>article</type><title>Cloud-based authenticated protocol for healthcare monitoring system</title><source>SpringerLink Journals</source><source>ProQuest Databases</source><source>ProQuest Central UK/Ireland</source><creator>Chandrakar, Preeti ; Sinha, Sonam ; Ali, Rifaqat</creator><creatorcontrib>Chandrakar, Preeti ; Sinha, Sonam ; Ali, Rifaqat</creatorcontrib><description>In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application.</description><identifier>ISSN: 1868-5137</identifier><identifier>EISSN: 1868-5145</identifier><identifier>DOI: 10.1007/s12652-019-01537-2</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Artificial Intelligence ; Authentication ; Authentication protocols ; Biometrics ; Cellular telephones ; Cloud computing ; Communication ; Computational Intelligence ; Cybersecurity ; Denial of service attacks ; Engineering ; Health care ; Hospitals ; Monitoring systems ; Original Research ; Patients ; Performance evaluation ; Physicians ; Privacy ; Robotics and Automation ; Rural areas ; Telemedicine ; User Interfaces and Human Computer Interaction</subject><ispartof>Journal of ambient intelligence and humanized computing, 2020-08, Vol.11 (8), p.3431-3447</ispartof><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019</rights><rights>Springer-Verlag GmbH Germany, part of Springer Nature 2019.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</citedby><cites>FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</cites><orcidid>0000-0002-7387-1582</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12652-019-01537-2$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2920238586?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>314,776,780,21368,27903,27904,33723,41467,42536,43784,51297,64361,64365,72215</link.rule.ids></links><search><creatorcontrib>Chandrakar, Preeti</creatorcontrib><creatorcontrib>Sinha, Sonam</creatorcontrib><creatorcontrib>Ali, Rifaqat</creatorcontrib><title>Cloud-based authenticated protocol for healthcare monitoring system</title><title>Journal of ambient intelligence and humanized computing</title><addtitle>J Ambient Intell Human Comput</addtitle><description>In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application.</description><subject>Artificial Intelligence</subject><subject>Authentication</subject><subject>Authentication protocols</subject><subject>Biometrics</subject><subject>Cellular telephones</subject><subject>Cloud computing</subject><subject>Communication</subject><subject>Computational Intelligence</subject><subject>Cybersecurity</subject><subject>Denial of service attacks</subject><subject>Engineering</subject><subject>Health care</subject><subject>Hospitals</subject><subject>Monitoring systems</subject><subject>Original Research</subject><subject>Patients</subject><subject>Performance evaluation</subject><subject>Physicians</subject><subject>Privacy</subject><subject>Robotics and Automation</subject><subject>Rural areas</subject><subject>Telemedicine</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1868-5137</issn><issn>1868-5145</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp9UE1LAzEQDaJgqf0DnhY8RzNJ87FHWfyCghc9h2w2sVu2m5pkD_33pq7ozYFh5sG8NzMPoWsgt0CIvEtABaeYQF2SM4npGVqAEgpzWPPz357JS7RKaUdKsJoBwAI1zRCmDrcmua4yU966MffW5IIOMeRgw1D5EKutM0PeWhNdtQ9jn0Psx48qHVN2-yt04c2Q3OqnLtH748Nb84w3r08vzf0GWwZ1xsYzL7xh0ioufAvSckU5dcatGVVK1V3b1dSuWym5EK1UBYsOiAdHpDfAluhm1i2XfU4uZb0LUxzLSk1rSihTXIkyRecpG0NK0Xl9iP3exKMGok9-6dkvXfzS335pWkhsJqXD6TEX_6T_YX0BZzZt8Q</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Chandrakar, Preeti</creator><creator>Sinha, Sonam</creator><creator>Ali, Rifaqat</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><orcidid>https://orcid.org/0000-0002-7387-1582</orcidid></search><sort><creationdate>20200801</creationdate><title>Cloud-based authenticated protocol for healthcare monitoring system</title><author>Chandrakar, Preeti ; Sinha, Sonam ; Ali, Rifaqat</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-af3f6fa37c856fb17c58252eae4328889dbd92c4b77566b78dbd6d10f1e07fa13</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Artificial Intelligence</topic><topic>Authentication</topic><topic>Authentication protocols</topic><topic>Biometrics</topic><topic>Cellular telephones</topic><topic>Cloud computing</topic><topic>Communication</topic><topic>Computational Intelligence</topic><topic>Cybersecurity</topic><topic>Denial of service attacks</topic><topic>Engineering</topic><topic>Health care</topic><topic>Hospitals</topic><topic>Monitoring systems</topic><topic>Original Research</topic><topic>Patients</topic><topic>Performance evaluation</topic><topic>Physicians</topic><topic>Privacy</topic><topic>Robotics and Automation</topic><topic>Rural areas</topic><topic>Telemedicine</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Chandrakar, Preeti</creatorcontrib><creatorcontrib>Sinha, Sonam</creatorcontrib><creatorcontrib>Ali, Rifaqat</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Databases</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest advanced technologies &amp; aerospace journals</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of ambient intelligence and humanized computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Chandrakar, Preeti</au><au>Sinha, Sonam</au><au>Ali, Rifaqat</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cloud-based authenticated protocol for healthcare monitoring system</atitle><jtitle>Journal of ambient intelligence and humanized computing</jtitle><stitle>J Ambient Intell Human Comput</stitle><date>2020-08-01</date><risdate>2020</risdate><volume>11</volume><issue>8</issue><spage>3431</spage><epage>3447</epage><pages>3431-3447</pages><issn>1868-5137</issn><eissn>1868-5145</eissn><abstract>In this paper, we have developed cloud-based authentication protocol for e-health care monitoring system which provides a secure platform to the patients. By using this system, the patients can get best medical facilities and treatment from the doctors via mobile phones without physically visiting the hospitals. To provide the privacy of patients and the guarantee of the reliability of the system, we have done an informal security analysis of the proposed protocol which validates that it is defending various kinds of security threats. Apart from it, the security of the proposed protocol is also analyzed by using popular automated pro-verif tool. In addition, we compared the proposed protocol with other existing protocols in terms of performance evaluation. The performance evaluation is measured in the context of security features, communication and computation cost as well as execution time also which proves that the same protocol is more efficient, cost effective and applicable for real-life application.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12652-019-01537-2</doi><tpages>17</tpages><orcidid>https://orcid.org/0000-0002-7387-1582</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 1868-5137
ispartof Journal of ambient intelligence and humanized computing, 2020-08, Vol.11 (8), p.3431-3447
issn 1868-5137
1868-5145
language eng
recordid cdi_proquest_journals_2920238586
source SpringerLink Journals; ProQuest Databases; ProQuest Central UK/Ireland
subjects Artificial Intelligence
Authentication
Authentication protocols
Biometrics
Cellular telephones
Cloud computing
Communication
Computational Intelligence
Cybersecurity
Denial of service attacks
Engineering
Health care
Hospitals
Monitoring systems
Original Research
Patients
Performance evaluation
Physicians
Privacy
Robotics and Automation
Rural areas
Telemedicine
User Interfaces and Human Computer Interaction
title Cloud-based authenticated protocol for healthcare monitoring system
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-24T19%3A18%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cloud-based%20authenticated%20protocol%20for%20healthcare%20monitoring%20system&rft.jtitle=Journal%20of%20ambient%20intelligence%20and%20humanized%20computing&rft.au=Chandrakar,%20Preeti&rft.date=2020-08-01&rft.volume=11&rft.issue=8&rft.spage=3431&rft.epage=3447&rft.pages=3431-3447&rft.issn=1868-5137&rft.eissn=1868-5145&rft_id=info:doi/10.1007/s12652-019-01537-2&rft_dat=%3Cproquest_cross%3E2920238586%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2920238586&rft_id=info:pmid/&rfr_iscdi=true