{"title":"Counter Based Authentication Verification to Secure Patient Data in Cloud","authors":"A. Vikram, G. Gopinath","doi":"10.1166/JCTN.2020.9447","DOIUrl":null,"url":null,"abstract":"Hospital patient record that is stored in public cloud demands high level of security and access control. To guarantee the proper user access, an authentication scheme is required that can follow up data access. In this paper, counter based authentication verification is introduced.\n This method utilizes token generation and counter strategy. Elliptic curve based digital signature is employed in token generation. Along with the generated token, the data is encrypted and a counter value is appended to it. Whenever an authorized user views or modifies the stored data, the\n counter value is updated. Thus, this method significantly identifies an unauthorized data access.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5516-5519"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computational and Theoretical Nanoscience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1166/JCTN.2020.9447","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Chemistry","Score":null,"Total":0}
引用次数: 0
Abstract
Hospital patient record that is stored in public cloud demands high level of security and access control. To guarantee the proper user access, an authentication scheme is required that can follow up data access. In this paper, counter based authentication verification is introduced.
This method utilizes token generation and counter strategy. Elliptic curve based digital signature is employed in token generation. Along with the generated token, the data is encrypted and a counter value is appended to it. Whenever an authorized user views or modifies the stored data, the
counter value is updated. Thus, this method significantly identifies an unauthorized data access.