{"title":"基于计数器的云端患者数据安全验证","authors":"A. Vikram, G. Gopinath","doi":"10.1166/JCTN.2020.9447","DOIUrl":null,"url":null,"abstract":"Hospital patient record that is stored in public cloud demands high level of security and access control. To guarantee the proper user access, an authentication scheme is required that can follow up data access. In this paper, counter based authentication verification is introduced.\n This method utilizes token generation and counter strategy. Elliptic curve based digital signature is employed in token generation. Along with the generated token, the data is encrypted and a counter value is appended to it. Whenever an authorized user views or modifies the stored data, the\n counter value is updated. Thus, this method significantly identifies an unauthorized data access.","PeriodicalId":15416,"journal":{"name":"Journal of Computational and Theoretical Nanoscience","volume":"17 1","pages":"5516-5519"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Counter Based Authentication Verification to Secure Patient Data in Cloud\",\"authors\":\"A. Vikram, G. Gopinath\",\"doi\":\"10.1166/JCTN.2020.9447\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Hospital patient record that is stored in public cloud demands high level of security and access control. To guarantee the proper user access, an authentication scheme is required that can follow up data access. In this paper, counter based authentication verification is introduced.\\n This method utilizes token generation and counter strategy. Elliptic curve based digital signature is employed in token generation. Along with the generated token, the data is encrypted and a counter value is appended to it. Whenever an authorized user views or modifies the stored data, the\\n counter value is updated. Thus, this method significantly identifies an unauthorized data access.\",\"PeriodicalId\":15416,\"journal\":{\"name\":\"Journal of Computational and Theoretical Nanoscience\",\"volume\":\"17 1\",\"pages\":\"5516-5519\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Computational and Theoretical Nanoscience\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1166/JCTN.2020.9447\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Chemistry\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computational and Theoretical Nanoscience","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1166/JCTN.2020.9447","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Chemistry","Score":null,"Total":0}
Counter Based Authentication Verification to Secure Patient Data in Cloud
Hospital patient record that is stored in public cloud demands high level of security and access control. To guarantee the proper user access, an authentication scheme is required that can follow up data access. In this paper, counter based authentication verification is introduced.
This method utilizes token generation and counter strategy. Elliptic curve based digital signature is employed in token generation. Along with the generated token, the data is encrypted and a counter value is appended to it. Whenever an authorized user views or modifies the stored data, the
counter value is updated. Thus, this method significantly identifies an unauthorized data access.