Skip navigation
  • 中文
  • English

DSpace CRIS

  • DSpace logo
  • Home
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
  • Explore by
    • Research Outputs
    • Researchers
    • Organizations
    • Projects
  • Communities & Collections
  • SDGs
  • Sign in
  • 中文
  • English
  1. National Taiwan Ocean University Research Hub
  2. 電機資訊學院
  3. 資訊工程學系
Please use this identifier to cite or link to this item: http://scholars.ntou.edu.tw/handle/123456789/5844
Title: A secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems
Authors: Lin, Han-Yu 
Keywords: REMOTE USER AUTHENTICATION;PASSWORD AUTHENTICATION;EFFICIENT;CRYPTANALYSIS;ANONYMITY;PROTOCOL;PRIVACY;ATTACKS
Issue Date: 12-Dec-2018
Publisher: PUBLIC LIBRARY SCIENCE
Journal Volume: 13
Journal Issue: 12
Source: PLOS ONE
Abstract: 
Heterogeneous mobile authentication is a crucial technique to securely retrieve the resource of e-healthcare cloud servers which are commonly implemented in a public key Infrastructure (PKI). Conventionally, a mobile data user can utilize a self-chosen password along with a portable device to request the access privilege of clouds. However, to validate the membership of users, a cloud server usually has to make use of a password table, which not only increases the burden of management, but also raises the possibility of information leakage. In this paper, we propose a secure heterogeneous mobile authentication and key agreement scheme for e-healthcare cloud systems. In our system structure, an e-healthcare cloud server of traditional PKIs does not have to store a password table. A legitimate data user only possesses a security token hardware and keeps an offline updatable password without using any private key. Our scheme is classified into the category of dynamic ID authentication techniques, since a data user is able to preserve his/her anonymity during authentication processes. We formally prove that the proposed mechanism fulfills the essential authenticated key exchange (AKE) security and owns lower computational costs. To further ensure the practical application security, an automatic security validation tool called AVISPA is also adopted to analyze possible attacks and pitfalls of our designed protocol.
URI: http://scholars.ntou.edu.tw/handle/123456789/5844
ISSN: 1932-6203
DOI: 10.1371/journal.pone.0208397
Appears in Collections:03 GOOD HEALTH AND WELL-BEING
資訊工程學系

Show full item record

WEB OF SCIENCETM
Citations

1
Last Week
0
Last month
0
checked on Jun 27, 2023

Page view(s)

162
Last Week
0
Last month
5
checked on Jun 30, 2025

Google ScholarTM

Check

Altmetric

Altmetric

Related Items in TAIR


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Explore by
  • Communities & Collections
  • Research Outputs
  • Researchers
  • Organizations
  • Projects
Build with DSpace-CRIS - Extension maintained and optimized by Logo 4SCIENCE Feedback