Abstract
The rapid development of electronic healthcare (e-Health) has brought great convenience to people’s life. In order to guarantee the security of users, a large number of identity authentication protocols have been put forward. Recently, Jiang et al. proposed a privacy preserving three-factor authentication protocol for e-Health clouds. However, we find that their protocol cannot resist the replay attack, the denial of service attack and the known session-specific temporary information attack. Then we propose a secure three-factor-based authentication with key agreement protocol. The analyses show our protocol overcomes the weaknesses of Jiang et al.’s protocol. Moreover, our protocol can resist replay attack, man-in-the-middle attack and provide the user anonymity, the user untraceability, the perfect forward secrecy, etc. In addition, we prove the security of the protocol by the well-known Burrows-Abadi-Needham (BAN) logic. By comparing with the related protocols, we find that our protocol has better security and performance. Therefore, we believe our protocol is more suitable for e-Health clouds.
Similar content being viewed by others
References
Pawar P, Jones VM, Van Beijnum B et al (2012) A framework for the comparison of mobile patient monitoring systems. J Biomed Inf 45(3):544–556
Abbas A, Khan SU (2014) A Review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J Biomed Health Inform 18(4):1431–1441
Xia Z, Wang X, Sun X et al (2016) A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parallel Distrib Syst 27(2):340–352
Fu Z, Sun X, Liu Q et al (2015) Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. Ice Trans Commun 98(1):190–200
Li H, Yang Y, Luan TH et al (2016) Enabling fine-grained multi-keyword search supporting classified sub-dictionaries over encrypted cloud data. IEEE Trans Dependable Secure Comput 13(3):312–325
Jiang Q, Ma J, Li G et al (2013) An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks. Wirel Pers Commun 68(4):1477–1491
Zhao D, Peng H, Li L et al (2013) A secure and effective anonymous authentication scheme for roaming service in global mobility networks. Wirel Pers Commun 78(1):247–269
Lamport L (1981) Password authentication with insecure communication. Commun ACM 24(11):770–772
Fan CI, Chan YC, Zhang ZK (2005) Robust remote authentication scheme with smart cards. Comp Secur 24(8):619–628
Juang WS, Chen ST, Liaw HT (2008) Robust and efficient password-authenticated key agreement using smart cards. IEEE Trans Ind Electron 55(6):2551–2556
Sun DZ, Huai JP, Sun JZ et al (2009) Improvements of Juang’s password-authenticated key agreement scheme using smart cards. IEEE Trans Ind Electron 56(6):2284–2291
Jiang Q, Ma J, Li G et al (2013) An improved password-based remote user authentication protocol without smart cards. Inf Technol Control 42(2):113–123
Chen TY, Lee CC, Hwang MS et al (2013) Towards secure and efficient user authentication scheme using smart card for multi-server environments. J Supercomput 66(2):1008–1032
Arshad H, Nikooghadam M (2015) Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol. J Supercomput 71(8):3163–3180
Wang D, He D, Wang P et al (2014) Anonymous two-factor authentication in distributed systems: certain goals are beyond attainment. IEEE Trans Dependable Secure Comput 12(4):428–442
Wang D, Wang N, Wang P et al (2015) Preserving privacy for free: efficient and provably secure two-factor authentication scheme with user anonymity. Inf Sci 321:162–178
Chang CC, Lin IC (2004) Remarks on fingerprint-based remote user authentication scheme using smart cards. ACM SIGOPS Operat Syst Rev 38(4):91–96
Lin CH, Yiyi Lai (2004) A flexible biometrics remote user authentication scheme. Comp Stand Interfaces 27(1):19–23
Ku WC, Chang ST, Chiang MH (2005) Further cryptanalysis of fingerprint-based remote user authentication scheme using smartcards. Electron Lett 41(5):240–241
Khan MK, Zhang J, Wang X (2008) Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Chaos Solitons Fractals 35(3):519–524
Fan CI, Yihui Lin (2009) Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics. IEEE Trans Inf Forensics Secur 4(4):933–945
Li CT, Hwang MS (2010) An efficient biometrics-based remote user authentication scheme using smart cards. J Netw Compur Appl 33(1):1–5
Yipin Liao, S S Wang (2009) A secure dynamic ID based remote user authentication scheme for multi-server environment. Comp Stand Interfaces 31(1):24–29
Tsai JL (2008) Efficient multi-server authentication scheme based on one-way hash function without verification table. Comp Secur 27(3–4):115–121
Dodis Y, Reyzin L, Smith A, et al. (2004) Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In: Theory and Application of Cryptographic Techniques, pp 523-540
Huang X, Xiang Y, Chonka A et al (2010) A generic framework for three-factor authentication: preserving security and privacy in distributed systems. IEEE Trans Parall Distrib Syst 22(8):1390–1397
Li X, Niu J, Wang Z et al (2014) Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur Commun Netw 7(10):1488–1497
Li X, Niu J, Khan MK et al (2016) Robust three-factor remote user authentication scheme with key agreement for multimedia systems. Secur Commun Netw 9(13):1916–1927
Mishra D, Kumari S, Khan MK et al (2017) An anonymous biometric-based remote user-authenticated key agreement scheme for multimedia systems. Int J Commun Syst 30(1):e2946
He D, Wang D (2014) Robust biometrics-based authentication scheme for multiserver environment. IEEE Syst J 9(3):816–823
Odelu V, Das AK, Goswami A (2015) A secure biometrics-based multi-server authentication protocol using smart cards. IEEE Trans Inf Forensics Securi 10(9):1953–1966
Chen CL, Lee CC, Hsu CY (2012) Mobile device integration of a fingerprint biometric remote authentication scheme. Int J Commun Syst 25(5):585–597
Truong T, Tran M T, Duong A, et al. (2012) Robust Mobile Device Integration of a Fingerprint Biometric Remote Authentication Scheme. In: Advanced Information Networking and Applications, pp 678-685
Khan MK, Kumari S, Gupta MK (2014) More efficient key-hash based fingerprint remote authentication scheme using mobile device. Computing 96(9):793–816
Yeh HL, Chen TH, Hu KJ et al (2013) Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data. IET Inf Secur 7(3):247–252
Wu F, Xu L, Kumari S et al (2015) A novel and provably secure biometrics-based three-factor remote authentication scheme for mobile client–server networks. Comput Electr Eng 45:274–285
Jiang Q, Khan MK, Lu X et al (2016) A privacy preserving three-factor authentication protocol for e-Health clouds. J Supercomput 72(10):3826–3849
Burrows M, Martin Abadi, Needham RM (1989) A logic of authentication. Acm Trans Comp Syst 23(5):1–13
Dolev D, Yao A (1983) On the security of public key protocols. IEEE Trans Inf Theory 29(2):198–208
Wang Y (2012) Password protected smart card and memory stick authentication against off-line dictionary attacks//IFIP International Information Security Conference. Springer, Berlin, pp 489–500
Messerges TS, Dabbish EA, Sloan RH (2002) Examining smart-card security under the threat of power analysis attacks. IEEE Trans Comp 51(5):541–552
Kocher P, Jaffe J, Jun B (1999) Differential power analysis. In: Annual International Cryptology Conference. Springer, Berlin, Heidelberg, pp 388–397
He D, Kumar N, Lee JH et al (2014) Enhanced three-factor security protocol for consumer USB mass storage devices. IEEE Trans Consum Electron 60(1):30–37
He D, Wang D, Wu S (2013) Cryptanalysis and improvement of a password-based remote user authentication scheme without smart cards. Inf Technol Control 42(2):105–112
Katz J, Menezes AJ, Van Oorschot PC et al (1996) Handbook of Applied Cryptography. CRC Press, Boca Raton
He D, Wu S, Chen J (2012) Note on ’Design of improved password authentication and update scheme based on elliptic curve cryptography’. Math Comp Modell 3(55):1661–1664
Ostad-Sharif A, Abbasinezhad-Mood D, Nikooghadam M (2019) Efficient utilization of elliptic curve cryptography in design of a three-factor authentication protocol for satellite communications. Comp Commun 147:85–97
Xu S, Liu X, Ma M et al (2020) An improved mutual authentication protocol based on perfect forward secrecy for satellite communications. Int J Sat Commun Netw 38(1):62–73
Qi M, Chen J (2018) New robust biometrics-based mutual authentication scheme with key agreement using elliptic curve cryptography. Multimed Tools Appl 77(18):23335–23351
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Chen, Y., Chen, J. A secure three-factor-based authentication with key agreement protocol for e-Health clouds. J Supercomput 77, 3359–3380 (2021). https://doi.org/10.1007/s11227-020-03395-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11227-020-03395-8