Skip to main content
Top
Published in: Journal of Medical Systems 2/2013

01-04-2013 | Original Paper

A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care

Authors: Ya-Fen Chang, Shih-Hui Yu, Ding-Rui Shiao

Published in: Journal of Medical Systems | Issue 2/2013

Login to get access

Abstract

Connected health care provides new opportunities for improving financial and clinical performance. Many connected health care applications such as telecare medicine information system, personally controlled health records system, and patient monitoring have been proposed. Correct and quality care is the goal of connected heath care, and user authentication can ensure the legality of patients. After reviewing authentication schemes for connected health care applications, we find that many of them cannot protect patient privacy such that others can trace users/patients by the transmitted data. And the verification tokens used by these authentication schemes to authenticate users or servers are only password, smart card and RFID tag. Actually, these verification tokens are not unique and easy to copy. On the other hand, biometric characteristics, such as iris, face, voiceprint, fingerprint and so on, are unique, easy to be verified, and hard to be copied. In this paper, a biometrics-based user authentication scheme will be proposed to ensure uniqueness and anonymity at the same time. With the proposed scheme, only the legal user/patient himself/herself can access the remote server, and no one can trace him/her according to transmitted data.
Literature
1.
go back to reference Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef Wu, Z. Y., Lee, Y. C., Lai, F., Lee, H. C., and Chung, Y., A secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1529–1535, 2012.CrossRef
3.
go back to reference Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef Debiao, H., Jianhua, C., and Rui, Z., A more secure authentication scheme for telecare medicine information systems. J. Med. Syst. 36(3):1989–1995, 2012.CrossRef
4.
go back to reference Pu, Q., Wang, J., and Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.CrossRef Pu, Q., Wang, J., and Zhao, R., Strong authentication scheme for telecare medicine information systems. J. Med. Syst. 36(4):2609–2619, 2012.CrossRef
5.
go back to reference Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011.CrossRef Chien, H. Y., Yang, C. C., Wu, T. C., and Lee, C. F., Two RFID-based solutions to enhance inpatient medication safety. J. Med. Syst. 35(3):369–375, 2011.CrossRef
6.
go back to reference Huang, C., Lee, H., and Lee, D. H., A privacy-strengthened scheme for E-healthcare monitoring system. J. Med. Syst. 36(5):2959–2971, 2012.CrossRef Huang, C., Lee, H., and Lee, D. H., A privacy-strengthened scheme for E-healthcare monitoring system. J. Med. Syst. 36(5):2959–2971, 2012.CrossRef
7.
go back to reference Chen, C. L., and Wu, C. Y., Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36(5):2849–2864, 2012.CrossRef Chen, C. L., and Wu, C. Y., Using RFID yoking proof protocol to enhance inpatient medication safety. J. Med. Syst. 36(5):2849–2864, 2012.CrossRef
9.
go back to reference Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef Hwang, M. S., and Li, L. H., A new remote user authentication scheme using smart cards. IEEE Trans. Consum. Electron. 46(1):28–30, 2000.CrossRef
10.
go back to reference Fan, C. I., Chang, Y. C., and Zhang, Z. K., Robust remote authentication scheme with smart cards. Comput. Secur. 24(8):619–628, 2005.CrossRef Fan, C. I., Chang, Y. C., and Zhang, Z. K., Robust remote authentication scheme with smart cards. Comput. Secur. 24(8):619–628, 2005.CrossRef
11.
go back to reference Chang, Y. F., Chang, C. C., and Kuo, J. Y., A secure one-time password authentication scheme using smart cards without limiting login times. ACM SIGOPS Oper Syst Rev 38(3):80–90, 2004.CrossRef Chang, Y. F., Chang, C. C., and Kuo, J. Y., A secure one-time password authentication scheme using smart cards without limiting login times. ACM SIGOPS Oper Syst Rev 38(3):80–90, 2004.CrossRef
12.
go back to reference Burnett, A., Byrne, F., Dowling, T., and Duffy, A., A biometric identity based signature scheme. Int. J. Netw. Secur. 5(3):317–326, 2006. Burnett, A., Byrne, F., Dowling, T., and Duffy, A., A biometric identity based signature scheme. Int. J. Netw. Secur. 5(3):317–326, 2006.
13.
go back to reference Lee, J. S., Chang, Y. F., and Chang, C. C., A novel authentication protocol for multi-server architecture without smart cards. Int. J. Innov. Comput. I. 4(6):1357–1364, 2008.MathSciNet Lee, J. S., Chang, Y. F., and Chang, C. C., A novel authentication protocol for multi-server architecture without smart cards. Int. J. Innov. Comput. I. 4(6):1357–1364, 2008.MathSciNet
14.
go back to reference Jain, A. Nandakumar, K., K., and Nagar, A., Biometric temple security. EURASIP J Adv Sig Pr 2008(113), 2008. Jain, A. Nandakumar, K., K., and Nagar, A., Biometric temple security. EURASIP J Adv Sig Pr 2008(113), 2008.
15.
go back to reference Lee, J. K., Ryu, S. R., and Yoo, K. Y., Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12):554–555, 2002.CrossRef Lee, J. K., Ryu, S. R., and Yoo, K. Y., Fingerprint-based remote user authentication scheme using smart cards. Electron. Lett. 38(12):554–555, 2002.CrossRef
16.
go back to reference Lin, C. H., and Lai, Y. Y., A flexible biometrics remote user authentication scheme. Comput. Stand. Inter. 27(1):19–23, 2004.CrossRef Lin, C. H., and Lai, Y. Y., A flexible biometrics remote user authentication scheme. Comput. Stand. Inter. 27(1):19–23, 2004.CrossRef
17.
go back to reference Chang, C. C., and Lin, I. C., Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Oper Syst Rev 38(4):91–96, 2004.CrossRef Chang, C. C., and Lin, I. C., Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Oper Syst Rev 38(4):91–96, 2004.CrossRef
18.
go back to reference Kim, H. S., Lee, S. W., and Yoo, K. Y., ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 37(4):32–41, 2003.MathSciNetCrossRef Kim, H. S., Lee, S. W., and Yoo, K. Y., ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 37(4):32–41, 2003.MathSciNetCrossRef
19.
go back to reference Scott, M., Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 38(2):73–75, 2004.CrossRef Scott, M., Cryptanalysis of an ID-based password authentication scheme using smart cards and fingerprints. ACM SIGOPS Oper Syst Rev 38(2):73–75, 2004.CrossRef
20.
go back to reference Li, C. T., and Hwang, M. S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.CrossRef Li, C. T., and Hwang, M. S., An efficient biometrics-based remote user authentication scheme using smart cards. J. Netw. Comput. Appl. 33(1):1–5, 2010.CrossRef
21.
go back to reference Jin, A. T. B., Ling, D. N., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern. Recogn. 37(11):2245–2255, 2004.CrossRef Jin, A. T. B., Ling, D. N., and Goh, A., Biohashing: Two factor authentication featuring fingerprint data and tokenised random number. Pattern. Recogn. 37(11):2245–2255, 2004.CrossRef
22.
go back to reference Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern. Recogn. 40(3):1057–1065, 2007.MATHCrossRef Lumini, A., and Nanni, L., An improved BioHashing for human authentication. Pattern. Recogn. 40(3):1057–1065, 2007.MATHCrossRef
23.
go back to reference Wang, R. C., Juang, W. S., and Lei, C. L., A simple and efficient key exchange scheme against the smart card loss problem. The 2007 IFIP Int. Conf. on Embedded and Ubiquitous Computing 4809:728–744, 2007. Wang, R. C., Juang, W. S., and Lei, C. L., A simple and efficient key exchange scheme against the smart card loss problem. The 2007 IFIP Int. Conf. on Embedded and Ubiquitous Computing 4809:728–744, 2007.
24.
go back to reference Teoh, A. B. J., Goh, A., and Ngo, D. C. L., Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE T Pattern Anal 28:1892–1901, 2006.CrossRef Teoh, A. B. J., Goh, A., and Ngo, D. C. L., Random multispace quantization as an analytic mechanism for BioHashing of biometric and random identity inputs. IEEE T Pattern Anal 28:1892–1901, 2006.CrossRef
25.
go back to reference Nagar, A., Nandakumar, K., and Jain, A. K., Biometric template transformation: a security analysis. Proc. of Media Forensics and Security, San Jose, 2010. Nagar, A., Nandakumar, K., and Jain, A. K., Biometric template transformation: a security analysis. Proc. of Media Forensics and Security, San Jose, 2010.
Metadata
Title
A Uniqueness-and-Anonymity-Preserving Remote User Authentication Scheme for Connected Health Care
Authors
Ya-Fen Chang
Shih-Hui Yu
Ding-Rui Shiao
Publication date
01-04-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 2/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-012-9902-7

Other articles of this Issue 2/2013

Journal of Medical Systems 2/2013 Go to the issue