Skip to main content
Top
Published in: Journal of Medical Systems 4/2013

01-08-2013 | Original Paper

An Authentication Scheme for Secure Access to Healthcare Services

Authors: Muhammad Khurram Khan, Saru Kumari

Published in: Journal of Medical Systems | Issue 4/2013

Login to get access

Abstract

Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.’s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.’s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.’s scheme stick with Zhu’s scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user’s stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.’s scheme lacks forward secrecy and Zhu’s scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.’s scheme and Zhu’s scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.
Literature
1.
go back to reference Elberg, P. B., Electronic patient records and innovation in health care services. Int. J. Med. Inform. 64(2–3):201–205, 2001.CrossRef Elberg, P. B., Electronic patient records and innovation in health care services. Int. J. Med. Inform. 64(2–3):201–205, 2001.CrossRef
2.
go back to reference Leiner, F., Gaus, W., Haux, R., and Knaup-Gregori, P., Medical data management-a practical guide. Springer, New York, 2003. Leiner, F., Gaus, W., Haux, R., and Knaup-Gregori, P., Medical data management-a practical guide. Springer, New York, 2003.
3.
go back to reference Lovis, C., Baud, R. H., and Scherrer, R. H., Internet integrated in the daily medical practice within an electronic patient record. Comput. Biol. Med. 28(5):567–579, 1998.CrossRef Lovis, C., Baud, R. H., and Scherrer, R. H., Internet integrated in the daily medical practice within an electronic patient record. Comput. Biol. Med. 28(5):567–579, 1998.CrossRef
4.
go back to reference Van’t Riet, A., Berg, M., Hiddema, F., and Sol, K., Meeting patients’ needs with patient information systems: Potential benefits of qualitative research methods. Int. J. Med. Inform. 64(1):1–14, 2001.CrossRef Van’t Riet, A., Berg, M., Hiddema, F., and Sol, K., Meeting patients’ needs with patient information systems: Potential benefits of qualitative research methods. Int. J. Med. Inform. 64(1):1–14, 2001.CrossRef
5.
go back to reference Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef Lambrinoudakis, C., and Gritzalis, S., Managing medical and insurance information through a smart-card-based information system. J. Med. Syst. 24(4):213–234, 2000.CrossRef
7.
go back to reference Dunlop, L., Electronic health records: Interoperability challenges and patient’s right for privacy. Shidler J. Comput. Technol. 3:16, 2007. Dunlop, L., Electronic health records: Interoperability challenges and patient’s right for privacy. Shidler J. Comput. Technol. 3:16, 2007.
11.
go back to reference Witteman, M., Advances in smart card security. Inf. Secur. Bull. 7:11–22, 2002. Witteman, M., Advances in smart card security. Inf. Secur. Bull. 7:11–22, 2002.
12.
go back to reference Kocher P, Jaffe J, Jun B. (1999) Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., 388–397, 1999. Kocher P, Jaffe J, Jun B. (1999) Differential power analysis. Proceedings of Advances in Cryptology, Santa Barbara, CA, U.S.A., 388–397, 1999.
13.
go back to reference Messerges, T. S., Dabbish, E. A., and Sloan, E. A., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef Messerges, T. S., Dabbish, E. A., and Sloan, E. A., Examining smart-card security under the threat of power analysis attacks. IEEE Trans. Comput. 51(5):541–552, 2002.MathSciNetCrossRef
14.
go back to reference Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012. doi:10.1007/s10916-012-9862-y.CrossRef Chen, H. M., Lo, J. W., and Yeh, C. K., An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. J. Med. Syst. 36(6):3907–3915, 2012. doi:10.​1007/​s10916-012-9862-y.CrossRef
15.
go back to reference Khan, M. K., Kim, S. K., and Alghathbar, K., Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2010.CrossRef Khan, M. K., Kim, S. K., and Alghathbar, K., Cryptanalysis and security enhancement of a ‘more efficient & secure dynamic ID-based remote user authentication scheme. Comput. Commun. 34(3):305–309, 2010.CrossRef
16.
go back to reference Kumari, S., Gupta, M. K., and Kumar, M., Cryptanalysis and security enhancement of Chen et al’.s remote user authentication scheme using smart card. Cent. Eur. J. Comput. Sci. 2(1):60–75, 2012.CrossRef Kumari, S., Gupta, M. K., and Kumar, M., Cryptanalysis and security enhancement of Chen et al’.s remote user authentication scheme using smart card. Cent. Eur. J. Comput. Sci. 2(1):60–75, 2012.CrossRef
18.
go back to reference Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef Xu, J., Zhu, W. T., and Feng, D. G., An improved smart card based password authentication scheme with provable security. Comput. Stand. Interfaces 31(4):723–728, 2009.CrossRef
Metadata
Title
An Authentication Scheme for Secure Access to Healthcare Services
Authors
Muhammad Khurram Khan
Saru Kumari
Publication date
01-08-2013
Publisher
Springer US
Published in
Journal of Medical Systems / Issue 4/2013
Print ISSN: 0148-5598
Electronic ISSN: 1573-689X
DOI
https://doi.org/10.1007/s10916-013-9954-3

Other articles of this Issue 4/2013

Journal of Medical Systems 4/2013 Go to the issue