Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 537-543.doi: 10.11896/jsjkx.220200139

• Information Security • Previous Articles     Next Articles

Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain

CHEN Yan-bing1, ZHONG Chao-ran1, ZHOU Chao-ran1, XUE Ling-yan1, HUANG Hai-ping1,2   

  1. 1 School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210023,China
    2 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks,Nanjing 210023,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:CHEN Yan-bing,born in 2000,undergraduate.Her main research interests include blockchain and information security.
    HUANG Hai-ping,born in 1981,Ph.D,professor,Ph.D supervisor,is a member of China Computer Federation.His main research interests include information security and data privacy in IoT.
  • Supported by:
    National Natural Science Foundation of China(62072252),Postgraduate Research & Practice Innovation Program of Jiangsu Province(KYCX210790) and Innovation and Entrepreneurship Training Program for College students of Jiangsu Province(SZDG2021020).

Abstract: Secure cross-domain authentication is the key to ensure the interconnection of medical data.Most of the existing cross-domain authentication models rely on trusted third parties,and there are heavy key management overhead and private key escrow problems.By introducing blockchain and certificateless authentication technology,a safe and efficient cross-domain authentication scheme based on medical consortium chain is proposed.Using hash function,digital signature and other cryptography technology to achieve safe and reliable authentication of foreign users,and using improved practical Byzantine mechanism to ensure that medical institutions in the alliance can quickly agree on the verification results without central nodes.The analysis shows that in terms of security,the scheme has security properties such as resistance to distributed attacks;in terms of efficiency,compared with the existing cross-domain authentication scheme,the scheme has advantages in computational overhead and communication overhead.

Key words: Byzantine fault tolerance algorithm, Certificateless certification, Consortium chain, Cross-domain authentication

CLC Number: 

  • TP309
[1] FENG J Y,WANG T,YU T T.A Secure Medical Data Sharing Scheme Based on Multi-clouds and Multi-chains Collaboration[J].Netinfo Security,2022,22(1):9-18.
[2] YUAN C,ZHANG W F.EIMAKP:Heterogeneous cross do-main authenticated key agreement protocols in the EIM system[J].Arabian Journal for Science and Engineering,2017,42(8):3275-3287.
[3] ZHANG W,WANG X,KHAN M K.A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems[J].Security and Communication Networks.2015,8(6):937-951.
[4] DONG G,CHEN Y,FAN J,et al.Anonymous cross-domain authentication scheme for medical PKI system[C]//Anonymous cross-domain authentication scheme for medical PKI system.Proceedings of the ACM Turing Celebration Conference- China on- ACM TURC '19.1-7.
[5] SHEN M,LIU H,ZHU L,et al.Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT[J].IEEE Journal on Selected Areas in Communications,2020,PP(99):1-1.
[6] YUAN C,ZHANG W,WANG X.EIMAKP:HeterogeneousCross-Domain Authenticated Key Agreement Protocols in the EIM System[J].Arabian Journal for Science and Engineering,2017,42(8):3275-3287.
[7] LIEBEHERR J,DONG G.An overlay approach to data security in ad-hoc networks[J].Ad Hoc Networks,2007,5(7):1055-1072.
[8] SUN Y,YU Y,LI X,et al.Batch Verifiable Computation with Public Verifiability for Outsourcing Polynomials and Matrix Computations[C]//Australasian Conference on Information Security and Privacy.2016:293-309.
[9] ZHOU Z C,LI L S,LI Z H.Efficient cross-domain authentication scheme based on blockchain technology[J].Journal of Computer Applications,2018,38(2):316-320.
[10] WANG W,HU N,LIU X.BlockCAM:A Blockchain-BasedCross-Domain Authentication Model[C]//2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).IEEE,China,Guangzhou:2018:896-901.
[11] MA X T,MA W P,LIU X X.A Cross Domain Authentication Scheme Based on Blockchain Technology[J].Acta Electronica Sinica,2018,46(11):2571-2579.
[12] JIA X,HU N,SU S,et al.IRBA:An Identity-Based Cross-Domain Authentication Scheme for the Internet of Things[J].Electronics,2020,9(4):634.
[13] LI G,WANG Y,ZHANG B,et al.Smart Contract-BasedCross-Domain Authentication and Key Agreement System for Heterogeneous Wireless Networks[J].Mobile Information Systems,2020(29):1-16.
[14] BENJAMIN K,ANTHONY P,DZISOOP M.Heterogeneousidentity-based to certificateless online/offline signcryption[J].IJISET-International Journal of Innovative Science,Engineering &Technology,2015,2(12):472-484.
[15] LI Y,CHEN W,CAI Z,et al.CAKA:a novel certificateless-based cross-domain authenticated key agreement protocol for wireless mesh networks[J].Wireless Networks,2016,22(8):2523-2535.
[16] AMIN S U,HOSSAIN M S,MUHAMMAD G,et al.Cognitive Smart Healthcare for Pathology Detection and Monitoring[J].IEEE Access,2019,7:10745-1753.
[17] HOSSAIN M S,MUHAMMAD G.Emotion-Aware Connected Healthcare Big Data Towards 5G[J].Internet of Things Journal,IEEE,2018,5(4):2399-2406.
[18] LIU X,MA W.CDAKA:A Provably-Secure HeterogeneousCross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS[J].Journal of Medical Systems,2018,42(8):135.
[19] ALI A,RAHIM H A,ALI J,et al.A Novel Secure Blockchain Framework for Accessing Electronic Health Records Using Multiple Certificate Authority[J].Applied Sciences,2021,11(21):9999.
[20] DIFFIE W.New Direction in Cryptography[J].IEEE trans.In-form.Theory,1976,22:644-654.
[21] DOUCEUR J R.The sybil attack[C]//International Workshop on Peer-to-Peer Systems.Springer,Berlin,Heidelberg,2002:251-260.
[22] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[J/OL].https://mronline.org/wp-content/uploads/2018/06/bitcoin.pdf.
[1] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[2] JIANG Ze-tao, XU Juan-juan. Efficient Heterogeneous Cross-domain Authentication Scheme Based on Proxy Blind Signature in Cloud Environment [J]. Computer Science, 2020, 47(11): 60-67.
[3] ZHOU Wan-kai, LONG Min. Secure Transmission Scheme for Environmental Monitoring Data Based on Blockchain [J]. Computer Science, 2020, 47(1): 315-320.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!