Skip to main content
Erschienen in: Journal of Medical Systems 2/2013

01.04.2013 | Original Paper

A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

verfasst von: Ya-Fen Chang, Shih-Hui Yu, Ding-Rui Shiao

Erschienen in: Journal of Medical Systems | Ausgabe 2/2013

Einloggen, um Zugang zu erhalten

Abstract

Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.
Literatur
1.
Zurück zum Zitat Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
3.
Zurück zum Zitat Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
4.
Zurück zum Zitat Pu, Q., Wang, J., and Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.CrossRef Pu, Q., Wang, J., and Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.CrossRef
5.
Zurück zum Zitat Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011.CrossRef Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011.CrossRef
6.
Zurück zum Zitat Huang, C., Lee, H., and Lee, D. H., A privacy-strengthened scheme for E-healthcare monitoring system. J. Med. Syst. 36(5):2959–2971, 2012.CrossRef Huang, C., Lee, H., and Lee, D. H., A privacy-strengthened scheme for E-healthcare monitoring system. J. Med. Syst. 36(5):2959–2971, 2012.CrossRef
7.
Zurück zum Zitat Chen, C. L., and Wu, C. Y., Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36(5):2849–2864, 2012.CrossRef Chen, C. L., and Wu, C. Y., Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36(5):2849–2864, 2012.CrossRef
8.
9.
Zurück zum Zitat Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef
10.
Zurück zum Zitat Fan, C. I., Chang, Y. C., and Zhang, Z. K., Robust remote authentication scheme with smart cards. Comput. Secur. 24(8):619–628, 2005.CrossRef Fan, C. I., Chang, Y. C., and Zhang, Z. K., Robust remote authentication scheme with smart cards. Comput. Secur. 24(8):619–628, 2005.CrossRef
11.
Zurück zum Zitat Chang, Y. F., Chang, C. C., and Kuo, J. Y., A secure one-time password authentication scheme using smart cards without limiting login times. ACM SIGOPS Oper Syst Rev 38(3):80–90, 2004.CrossRef Chang, Y. F., Chang, C. C., and Kuo, J. Y., A secure one-time password authentication scheme using smart cards without limiting login times. ACM SIGOPS Oper Syst Rev 38(3):80–90, 2004.CrossRef
12.
Zurück zum Zitat Burnett, A., Byrne, F., Dowling, T., and Duffy, A., A biometric identity based signature scheme. Int. J. Netw. Secur. 5(3):317–326, 2006. Burnett, A., Byrne, F., Dowling, T., and Duffy, A., A biometric identity based signature scheme. Int. J. Netw. Secur. 5(3):317–326, 2006.
13.
Zurück zum Zitat Lee, J. S., Chang, Y. F., and Chang, C. C., A novel authentication protocol for multi-server architecture without smart cards. Int. J. Innov. Comput. I. 4(6):1357–1364, 2008.MathSciNet Lee, J. S., Chang, Y. F., and Chang, C. C., A novel authentication protocol for multi-server architecture without smart cards. Int. J. Innov. Comput. I. 4(6):1357–1364, 2008.MathSciNet
14.
Zurück zum Zitat Jain, A. Nandakumar, K., K., and Nagar, A., Biometric temple security. EURASIP J Adv Sig Pr 2008(113), 2008. Jain, A. Nandakumar, K., K., and Nagar, A., Biometric temple security. EURASIP J Adv Sig Pr 2008(113), 2008.
15.
Zurück zum Zitat Lee, J. K., Ryu, S. R., and Yoo, K. Y., Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12):554–555, 2002.CrossRef Lee, J. K., Ryu, S. R., and Yoo, K. Y., Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12):554–555, 2002.CrossRef
16.
Zurück zum Zitat Lin, C. H., and Lai, Y. Y., A flexible biometrics remote user authentication scheme. Comput. Stand. Inter. 27(1):19–23, 2004.CrossRef Lin, C. H., and Lai, Y. Y., A flexible biometrics remote user authentication scheme. Comput. Stand. Inter. 27(1):19–23, 2004.CrossRef
17.
Zurück zum Zitat Chang, C. C., and Lin, I. C., Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Oper Syst Rev 38(4):91–96, 2004.CrossRef Chang, C. C., and Lin, I. C., Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Oper Syst Rev 38(4):91–96, 2004.CrossRef
18.
Zurück zum Zitat Kim, H. S., Lee, S. W., and Yoo, K. Y., ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 37(4):32–41, 2003.MathSciNetCrossRef Kim, H. S., Lee, S. W., and Yoo, K. Y., ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 37(4):32–41, 2003.MathSciNetCrossRef
19.
Zurück zum Zitat Scott, M., Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 38(2):73–75, 2004.CrossRef Scott, M., Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 38(2):73–75, 2004.CrossRef
20.
Zurück zum Zitat Li, C. T., and Hwang, M. S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.CrossRef Li, C. T., and Hwang, M. S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.CrossRef
21.
Zurück zum Zitat Jin, A. T. B., Ling, D. N., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern. Recogn. 37(11):2245–2255, 2004.CrossRef Jin, A. T. B., Ling, D. N., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern. Recogn. 37(11):2245–2255, 2004.CrossRef
22.
Zurück zum Zitat Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern. Recogn. 40(3):1057–1065, 2007.MATHCrossRef Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern. Recogn. 40(3):1057–1065, 2007.MATHCrossRef
23.
Zurück zum Zitat Wang, R. C., Juang, W. S., and Lei, C. L., A simple and efficient key exchange scheme against the smart card loss problem. The 2007 IFIP Int. Conf. on Embedded and Ubiquitous Computing 4809:728–744, 2007. Wang, R. C., Juang, W. S., and Lei, C. L., A simple and efficient key exchange scheme against the smart card loss problem. The 2007 IFIP Int. Conf. on Embedded and Ubiquitous Computing 4809:728–744, 2007.
24.
Zurück zum Zitat Teoh, A. B. J., Goh, A., and Ngo, D. C. L., Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE T Pattern Anal 28:1892–1901, 2006.CrossRef Teoh, A. B. J., Goh, A., and Ngo, D. C. L., Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE T Pattern Anal 28:1892–1901, 2006.CrossRef
25.
Zurück zum Zitat Nagar, A., Nandakumar, K., and Jain, A. K., Biometric template transformation: a security analysis. Proc. of Media Forensics and Security, San Jose, 2010. Nagar, A., Nandakumar, K., and Jain, A. K., Biometric template transformation: a security analysis. Proc. of Media Forensics and Security, San Jose, 2010.
Metadaten
Titel
A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
verfasst von
Ya-Fen Chang
Shih-Hui Yu
Ding-Rui Shiao
Publikationsdatum
01.04.2013
Verlag
Springer US
Erschienen in
Journal of Medical Systems / Ausgabe 2/2013
Print ISSN: 0148-5598
Elektronische ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9902-7

Weitere Artikel der Ausgabe 2/2013

Journal of Medical Systems 2/2013 Zur Ausgabe