NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture

@article{Liu2019NPMAAN,
  title={NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture},
  author={Xiaoxue Liu and Wenping Ma and Hao Cao},
  journal={Journal of Medical Systems},
  year={2019},
  volume={43}
}
Mobile Edge-Cloud Network is a new network structure after fog-cloud computing, where service and data computing are scattered in the most logical, nearby and efficient place. It provides better services than fog-cloud computing with better performance in reasonably low cost way and allows users to eliminate numerous limitations inherent in fog-cloud computing, although it inherits those security-privacy issues from fog-cloud computing. A novel privacy-preserving mutual authentication in TMIS… Expand
6 Citations
A provably secure ECC-based access and handover authentication protocol for space information networks
  • Junyan Guo, Ye Du, Yahang Zhang, Meihong Li
  • Computer Science
  • 2021
TLDR
A novel ECC-based authentication scheme, which not only confirms the validity of the satellite node when user and ground station authenticate each other, but also designs the handover schemes based on two possible signal handover scenarios, demonstrating that the protocol is more suitable for user access and handover in space information networks while ensuring higher security requirements. Expand
An enhanced scheme for mutual authentication for healthcare services
TLDR
This article introduces an improved protocol for authentication, which reduces all the security flaws of Qiu et al. Expand
SHAPARAK: Scalable healthcare authentication protocol with attack-resilience and anonymous key-agreement
TLDR
A Scalable Healthcare Authentication Protocol with Attack-Resilience and Anonymous Key-agreement, SHAPARAK, is proposed to overcome security flaws of existing schemes and is shown that the proposed protocol is cost-efficient in terms of computation and communication overheads, compared to the existing schemes. Expand
Blockchain-Based Access Control Scheme for Secure Shared Personal Health Records over Decentralised Storage
TLDR
This study bridges the gap between PHRs and blockchain technology by offloading the vast medical data into the InterPlanetary File System (IPFS) storage and establishing an enforced cryptographic authorisation and access control scheme for outsourced encrypted medical data. Expand
A Comprehensive Survey on Security and Privacy for Electronic Health Data
  • Se-Ra Oh, Young-Duk Seo, Euijong Lee, Young-Gab Kim
  • Medicine
  • International journal of environmental research and public health
  • 2021
TLDR
To investigate the security and privacy of e- health systems, major components of the modern e-health systems are identified and research taxonomy, security concerns, requirements, solutions, research trends, and open challenges for the components with strengths and weaknesses of the analyzed studies are obtained. Expand
Risk Minimization Against Transmission Failures of Federated Learning in Mobile Edge Networks
TLDR
A randomized algorithm is designed to choose suitable participants by using a series of delicately calculated probabilities, and it is proved that the result is concentrated on its optimum with high probability, showing that through delicate participant selection, the maximal error rate of model updates is decreased. Expand

References

SHOWING 1-10 OF 43 REFERENCES
Anonymous and secure aggregation scheme in fog-based public cloud computing
TLDR
The first concrete ASAS scheme, which protects the identities of terminal devices by using pseudonyms but it also guarantees data secrecy via a homomorphic encryption technique, is designed and shown to be provably secure. Expand
ETAP: Energy-Efficient and Traceable Authentication Protocol in Mobile Medical Cloud Architecture
TLDR
The ETAP is proven to be safe against passive and active attacks under the elliptic curve discrete logarithm problem assumption in random oracle model and makes the ETAP very suitable for computation-limited mobile devices compared with other related existing protocols. Expand
A Provably Secure and Efficient Identity-Based Anonymous Authentication Scheme for Mobile Edge Computing
TLDR
The proposed protocol achieves mutual authentication in only a single message exchange round, as well as assures both user anonymity and un-traceability, and outperforms prior approaches in terms of communicational and computational costs. Expand
Privacy Preserving Data Aggregation Scheme for Mobile Edge Computing Assisted IoT Applications
TLDR
The proposed privacy preserving data aggregation scheme not only guarantees data privacy of the TDs but also provides source authentication and integrity, and is very suitable for MEC assisted IoT applications. Expand
An Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks
TLDR
A new authenticated key agreement protocol without bilinear pairing is designed that achieves mutual authentication, generates a securely agreed session key for secret communication, and supports privacy protection in fog-based VANETs. Expand
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things
TLDR
A certificateless public key authenticated encryption with keyword search scheme is proposed, which is provably secure against inside keyword guessing attack (IKGA) and demonstrates that it is more secure and effective compared with other certificatelesspublic key encryption with keywords search schemes. Expand
Privacy-preserving deduplication of encrypted data with dynamic ownership management in fog computing
TLDR
This paper proposes the first privacy-preserving deduplication protocol capable of efficient ownership management in fog computing, and achieves fine-grained access control by introducing user-level key management and update mechanisms. Expand
Survey on fog computing: architecture, key technologies, applications and open issues
TLDR
Fog computing extends the cloud services to the edge of network, and makes computation, communication and storage closer to edge devices and end-users, which aims to enhance low-latency, mobility, network bandwidth, security and privacy. Expand
The Fog computing paradigm: Scenarios and security issues
  • I. Stojmenovic, S. Wen
  • Computer Science
  • 2014 Federated Conference on Computer Science and Information Systems
  • 2014
TLDR
The motivation and advantages of Fog computing are elaborated, and its applications in a series of real scenarios, such as Smart Grid, smart traffic lights in vehicular networks and software defined networks are analysed. Expand
Blockchain for Secure EHRs Sharing of Mobile Cloud Based E-Health Systems
TLDR
A novel EHRs sharing framework that combines blockchain and the decentralized interplanetary file system (IPFS) on a mobile cloud platform is proposed that provides an effective solution for reliable data exchanges on mobile clouds while preserving sensitive health information against potential threats. Expand
...
1
2
3
4
5
...