scholarly journals New Efficient and Secured Authentication Protocol for Remote Healthcare Systems in Cloud-IoT

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Mourade Azrour ◽  
Jamal Mabrouki ◽  
Rajasekhar Chaganti

Recently, Internet of Things and cloud computing are known to be emerged technologies in digital evolution. The first one is a large network used to interconnect embedded devices, while the second one refers to the possibility of offering infrastructure that can be used from anywhere and anytime. Due to their ability to provide remote services, IoT and cloud computing are actually integrated in various areas especially in the healthcare domain. However, the user private data such as health data must be secured by enhancing the authentication methods. Recently, Sharma and Kalra projected an authentication scheme for distant healthcare service-based cloud-IoT. Then, authors demonstrated that the proposed scheme is secure against various attacks. However, we prove in this paper that Sharma and Kalra’s protocol is prone to password guessing and smart card stolen attacks. Besides, we show that it has some security issues. For that reason, we propose an efficient and secured authentication scheme for remote healthcare systems in cloud-IoT. Then, we prove informally that our projected authentication scheme is secure against multiple attacks. Furthermore, the experimental tests done using Scyther tool show that our proposed scheme can withstand against known attacks as it ensures security requirements.

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Jin-Xin Hu ◽  
Chin-Ling Chen ◽  
Chun-Long Fan ◽  
Kun-hao Wang

Internet of Things (IoT) is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2098 ◽  
Author(s):  
Rafael Martínez-Peláez ◽  
Homero Toral-Cruz ◽  
Jorge R. Parra-Michel ◽  
Vicente García ◽  
Luis J. Mena ◽  
...  

With the rapid deployment of the Internet of Things and cloud computing, it is necessary to enhance authentication protocols to reduce attacks and security vulnerabilities which affect the correct performance of applications. In 2019 a new lightweight IoT-based authentication scheme in cloud computing circumstances was proposed. According to the authors, their protocol is secure and resists very well-known attacks. However, when we evaluated the protocol we found some security vulnerabilities and drawbacks, making the scheme insecure. Therefore, we propose a new version considering login, mutual authentication and key agreement phases to enhance the security. Moreover, we include a sub-phase called evidence of connection attempt which provides proof about the participation of the user and the server. The new scheme achieves the security requirements and resists very well-known attacks, improving previous works. In addition, the performance evaluation demonstrates that the new scheme requires less communication-cost than previous authentication protocols during the registration and login phases.


Author(s):  
Baldev Singh

Cloud computing is one of the emerged technologies in the past decade. Tremendous growth is noticed in the usage and implementation of Cloud computing. Although cloud spectrum is widely popular still there are lot of challenges and issues to be addressed for its optimal usage. Vulnerabilities and threats to the cloud services leads to attacks and exploitation of resources as well as data breaches and privacy violations that need to be addressed at the cloud customer satisfaction level. This paper highlights different cloud security issues and their security requirements. The review aspects and findings of the paper can be used as a reference for further appropriate and effective implementation from the suggested practically viable cloud security solution in an independent manner or using as a hybrid technique.


2019 ◽  
pp. 165-187 ◽  
Author(s):  
Ganesh Chandra Deka

To get the desired benefits for the IT enterprise, NoSQL databases must be combined with proven and reliable SQL features into a single proven infrastructure meeting the manageability and security requirements of cloud computing. Various specifications, including SAML (Security Assertions Markup Language), improved interoperability across organizational boundaries are coming up. This chapter discuses some of the security issues of NoSQL databases. All the related technology used in the chapter are explained either where they appear or at the end of the chapter.


Big Data ◽  
2016 ◽  
pp. 1129-1158
Author(s):  
Philip Groth ◽  
Gerhard Reuter ◽  
Sebastian Thieme

A new trend for data analysis in the life sciences is Cloud computing, enabling the analysis of large datasets in short time. This chapter introduces Big Data challenges in the genomic era and how Cloud computing can be one feasible approach for solving them. Technical and security issues are discussed and a case study where Clouds are successfully applied to resolve computational bottlenecks in the analysis of genomic data is presented. It is an intentional outcome of this chapter that Cloud computing is not essential for analyzing Big Data. Rather, it is argued that for the optimized utilization of IT, it is required to choose the best architecture for each use case, either by security requirements, financial goals, optimized runtime through parallelization, or the ability for easier collaboration and data sharing with business partners on shared resources.


Author(s):  
Philip Groth ◽  
Gerhard Reuter ◽  
Sebastian Thieme

A new trend for data analysis in the life sciences is Cloud computing, enabling the analysis of large datasets in short time. This chapter introduces Big Data challenges in the genomic era and how Cloud computing can be one feasible approach for solving them. Technical and security issues are discussed and a case study where Clouds are successfully applied to resolve computational bottlenecks in the analysis of genomic data is presented. It is an intentional outcome of this chapter that Cloud computing is not essential for analyzing Big Data. Rather, it is argued that for the optimized utilization of IT, it is required to choose the best architecture for each use case, either by security requirements, financial goals, optimized runtime through parallelization, or the ability for easier collaboration and data sharing with business partners on shared resources.


Software-Defined Network (SDN) is regarded as one of the most significant areas for future networking. SDN architecture is a revolutionary new concept that offers more mobility, a high degree of automation and shorter delivery time by pushing the conventional network to be software-based. SDN architecture dynamically separates the control plane from the network data (forwarding) plane, providing a centralized view of the network as a whole and making it easier to manage and monitor the resources of the network. Furthermore, the SDN's initial design, with its centralized control point, does not accurately perceive the security requirements, which poses additional challenges to security issues. Security and authentication scheme in SDN is being surveyed in this paper providing advances in this field to both the research community and the industry. Then start with a list of identified threats to security and SDN breaches. The article analyzes previously outlined security and authentication solutions for SDN. The challenges in securing the network from the attacker are discussed and the holistic security approach required for SDN is described. It will identify future directions for research that will be key to providing network security in SDN.


2011 ◽  
Vol 225-226 ◽  
pp. 706-709 ◽  
Author(s):  
Shu Guo Yang

Cloud computing is regarded as one of the most enticing technologies and potential silver bullet in the IT industry. Because of open condition and general-purpose nature of cloud, security issue is becoming a bottle neck of rapid development and broad application of cloud computing. Firstly, this paper addresses cloud customers’ significant concerns about and requirements of cloud security. Secondly, cloud security risks and threats posed by the pervasive and ad hoc nature of the cloud are comprehensively analyzed. Finally, some effective and dependable security mechanisms are proposed to lower cloud security risks and meet security requirements of cloud customers. Especially, a novel scheme for integrity and copyright protection of customers’ works in the cloud is presented based on digital watermarking and digital signature.


2018 ◽  
Vol 2018 ◽  
pp. 1-13 ◽  
Author(s):  
Chenyu Wang ◽  
Ke Ding ◽  
Bin Li ◽  
Yiming Zhao ◽  
Guoai Xu ◽  
...  

With the popularity of cloud computing, information security issues in the cloud environment are becoming more and more prominent. As the first line of defense to ensure cloud computing security, user authentication has attracted extensive attention. Though considerable efforts have been paid for a secure and practical authentication scheme in cloud computing environment, most attempts ended in failure. The design of a secure and efficient user authentication scheme for cloud computing remains a challenge on the one hand and user’s smart card or mobile devices are of limited resource; on the other hand, with the combination of cloud computing and the Internet of Things, applications in cloud environments often need to meet various security requirements and are vulnerable to more attacks. In 2018, Amin et al. proposed an enhanced user authentication scheme in cloud computing, hoping to overcome the identified security flaws of two previous schemes. However, after a scrutinization of their scheme, we revealed that it still suffers from the same attacks (such as no user anonymity, no forward secrecy, and being vulnerable to offline dictionary attack) as the two schemes they compromised. Consequently, we take the scheme of Amin et al. (2018) as a study case, we discussed the inherent reason and the corresponding solutions to authentication schemes for cloud computing environment in detail. Next, we not only proposed an enhanced secure and efficient scheme, but also explained the design rationales for a secure cloud environment protocol. Finally, we applied BAN logic and heuristic analysis to show the security of the protocol and compared our scheme with related schemes. The results manifest the superiority of our scheme.


Sign in / Sign up

Export Citation Format

Share Document