An Medical Data A User Authentication Of A Cloud Data
DOI:
https://doi.org/10.63665/kkh1g448Keywords:
Cloud Computing, Healthcare Security, User Authentication, Electronic Health Records (EHR), Multi-Factor Authentication, Post-Quantum Cryptography, Cloud-Based Medical Systems, ProVerif, Data Privacy, Secure Access Control.Abstract
With the rapid adoption of cloud computing in healthcare, securing medical data stored and accessed through cloud platforms has become a critical priority. Unauthorized access to sensitive health records can lead to severe privacy violations and misuse of patient information. Therefore, robust user authentication mechanisms are essential to ensure that only legitimate users can access or modify medical data in cloud environments. This paper presents a secure and efficient user authentication scheme tailored for cloud-based medical systems, focusing on protecting data integrity and ensuring user privacy. The proposed scheme employs a multifactor authentication model that integrates otp verification, cryptographic credentials, and device-based factors to authenticate users accessing electronic health records (EHRs). To counter emerging threats, especially from quantum-capable adversaries, the protocol incorporates post-quantum cryptographic techniques, ensuring long-term security resilience. The protocol is formally verified using the ProVerif tool and evaluated against standard security criteria, demonstrating resistance to attacks such as replay, man-in-the-middle, insider threats, and stolen-verifier attacks. Furthermore, performance analysis confirms the protocol's low computational and communication overhead, making it suitable for real-time medical applications. The results highlight the protocol's ability to maintain a secure and scalable framework for confidential medical data access in cloud environments, balancing security, usability, and efficiency
Downloads
References
[1] M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, May 2018.
[2] D. He, N. Kumar, J. H. Lee, and R. S. Sherratt, “Enhanced three-factor security protocol for consumer USB mass storage devices,” IEEE Transactions on Consumer Electronics, vol. 60, no. 1, pp. 30–37, Feb. 2014.
[3] A. K. Das, M. Wazid, N. Kumar, M. K. Khan, K. K. R. Choo, and Y. Park, “Design of secure and lightweight authentication protocol for wearable devices environment,” IEEE Journal of Biomedical and Health Informatics, vol. 22, no. 4, pp. 1310–1322, Jul. 2018.
[4] L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, Nov. 1981.
[5] B. Blanchet, “Automatic verification of cryptographic protocols: A tutorial,” Foundations and Trends in Privacy and Security, vol. 1, no. 1–2, pp. 1–135, 2016.
[6] P. W. Shor, “Algorithms for quantum computation: Discrete logarithms and factoring,” in Proc. 35th Annual Symposium on Foundations of Computer Science (FOCS), Santa Fe, NM, USA, 1994, pp. 124–134.
[7] D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography. Berlin, Germany: Springer, 2009.
[8] National Institute of Standards and Technology (NIST), “Post-Quantum Cryptography Standardization,” Gaithersburg, MD, USA, 2024.
[9] A. A. Abd El-Latif, B. Abd-El-Atti, M. Amin, and A. I. Eldesouky, “Quantum inspired blockchain-based cybersecurity framework for healthcare systems,” IEEE Access, vol. 8, pp. 42468–42475, 2020.
[10] H. Yang, Y. Zhang, and J. Zhou, “Secure authentication protocols for cloud-assisted healthcare systems: A survey,” Journal of Network and Computer Applications, vol. 173, Jan. 2021.
[11] A. K. Das, M. Wazid, and N. Kumar, “Secure and efficient anonymous authentication scheme for cloud-assisted healthcare applications,” Computer Networks, vol. 140, pp. 235–248, Jul. 2018.
[12] A. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP Journal on Advances in Signal Processing, vol. 2008, pp. 1–17, 2008.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Authors

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
