An Medical Data A User Authentication Of A Cloud Data

Authors

  • Mohammed Omer Shaik B.E.Students; Department of CSE (Artificial Intelligence And Data Science) ISL Engineering College Hyderabad India Author
  • Saif Ahmed B.E.Students; Department of CSE (Artificial Intelligence And Data Science) ISL Engineering College Hyderabad India Author
  • Mohammed Abdul Kaleem Ansari B.E.Students; Department of CSE (Artificial Intelligence And Data Science) ISL Engineering College Hyderabad India Author
  • Mr. Diwakar Tiwary Assistant Professor; Department of CSE (Artificial Intelligence And Data Science) ISL Engineering College Hyderabad India Author

DOI:

https://doi.org/10.63665/kkh1g448

Keywords:

Cloud Computing, Healthcare Security, User Authentication, Electronic Health Records (EHR), Multi-Factor Authentication, Post-Quantum Cryptography, Cloud-Based Medical Systems, ProVerif, Data Privacy, Secure Access Control.

Abstract

With the rapid adoption of cloud computing in healthcare, securing medical data stored and accessed through cloud platforms has become a critical priority. Unauthorized access to sensitive health records can lead to severe privacy violations and misuse of patient information. Therefore, robust user authentication mechanisms are essential to ensure that only legitimate users can access or modify medical data in cloud environments. This paper presents a secure and efficient user authentication scheme tailored for cloud-based medical systems, focusing on protecting data integrity and ensuring user privacy. The proposed scheme employs a multifactor authentication model that integrates otp verification, cryptographic credentials, and device-based factors to authenticate users accessing electronic health records (EHRs). To counter emerging threats, especially from quantum-capable adversaries, the protocol incorporates post-quantum cryptographic techniques, ensuring long-term security resilience. The protocol is formally verified using the ProVerif tool and evaluated against standard security criteria, demonstrating resistance to attacks such as replay, man-in-the-middle, insider threats, and stolen-verifier attacks. Furthermore, performance analysis confirms the protocol's low computational and communication overhead, making it suitable for real-time medical applications. The results highlight the protocol's ability to maintain a secure and scalable framework for confidential medical data access in cloud environments, balancing security, usability, and efficiency

Downloads

Download data is not yet available.

References

[1] M. A. Khan and K. Salah, “IoT security: Review, blockchain solutions, and open challenges,” Future Generation Computer Systems, vol. 82, pp. 395–411, May 2018.

[2] D. He, N. Kumar, J. H. Lee, and R. S. Sherratt, “Enhanced three-factor security protocol for consumer USB mass storage devices,” IEEE Transactions on Consumer Electronics, vol. 60, no. 1, pp. 30–37, Feb. 2014.

[3] A. K. Das, M. Wazid, N. Kumar, M. K. Khan, K. K. R. Choo, and Y. Park, “Design of secure and lightweight authentication protocol for wearable devices environment,” IEEE Journal of Biomedical and Health Informatics, vol. 22, no. 4, pp. 1310–1322, Jul. 2018.

[4] L. Lamport, “Password authentication with insecure communication,” Communications of the ACM, vol. 24, no. 11, pp. 770–772, Nov. 1981.

[5] B. Blanchet, “Automatic verification of cryptographic protocols: A tutorial,” Foundations and Trends in Privacy and Security, vol. 1, no. 1–2, pp. 1–135, 2016.

[6] P. W. Shor, “Algorithms for quantum computation: Discrete logarithms and factoring,” in Proc. 35th Annual Symposium on Foundations of Computer Science (FOCS), Santa Fe, NM, USA, 1994, pp. 124–134.

[7] D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography. Berlin, Germany: Springer, 2009.

[8] National Institute of Standards and Technology (NIST), “Post-Quantum Cryptography Standardization,” Gaithersburg, MD, USA, 2024.

[9] A. A. Abd El-Latif, B. Abd-El-Atti, M. Amin, and A. I. Eldesouky, “Quantum inspired blockchain-based cybersecurity framework for healthcare systems,” IEEE Access, vol. 8, pp. 42468–42475, 2020.

[10] H. Yang, Y. Zhang, and J. Zhou, “Secure authentication protocols for cloud-assisted healthcare systems: A survey,” Journal of Network and Computer Applications, vol. 173, Jan. 2021.

[11] A. K. Das, M. Wazid, and N. Kumar, “Secure and efficient anonymous authentication scheme for cloud-assisted healthcare applications,” Computer Networks, vol. 140, pp. 235–248, Jul. 2018.

[12] A. Jain, K. Nandakumar, and A. Nagar, “Biometric template security,” EURASIP Journal on Advances in Signal Processing, vol. 2008, pp. 1–17, 2008.

Downloads

Published

2026-04-28

How to Cite

An Medical Data A User Authentication Of A Cloud Data. (2026). International Journal of Multidisciplinary Engineering In Current Research, 11(4s), 346-350. https://doi.org/10.63665/kkh1g448