Privacy protection for telecare medicine information systems using a chaoticmap-based three-factor authenticated key agreement scheme

Abstract

======

Telecare Medicine Information Systems (TMIS) provides flexible and convenient e-health care. However the medical records transmitted in TMIS are exposed to unsecured public networks, so TMIS are more vulnerable to various types of security threats and attacks. To provide privacy protection for TMIS, a secure and efficient authenticated key agreement scheme is urgently needed to protect the sensitive medical data.Proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses of Yan et al.’s scheme and provide dynamic identity protection and user anonymity. In this paper, however, we demonstrate.Scheme suffers from replay attacks, man-in-the-middle attacks and fails to provide perfect forward secrecy. To overcome the weaknesses.Scheme, we then propose a three-factor authenticated key agreement scheme to enable the patient enjoy the remote healthcare services via TMIS with privacy protection. The chaotic map-based cryptography is employed in the proposed scheme to achieve a delicate balance of security and performance. Security analysis demonstrates that the proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

Front End (MVC RAZOR)

Back End (SQL Server)

Software Tools

(Visual Studio 2012, SQL 2008).

Doctor:

  1. Doctor login to the System.
  2. Doctor Search to the Patient detail.

3. View patient queries.

4. Response of the patient queries.

Management:

  1. Management Register the patient details.
  2. Management Upload the patient details.

3. Management View the patient details.

4. Management View the Patient Sensitive details using Structure.

5. Management Analysis the patient details using JQuery Datatable.

Server:

  1. Server Accept the Physician Register Detail.
  2. Server Analysis the Patient Details.
  3. Server Provide the report for the patient details through chart view.

Patient:

1. Patient login.

2. View Personal details.

3. View My Medical history.

4. Enter your queries.

  1. Database

-> Online Social (As My Database)

->I am using entity framework

Controller

  1. Admin controller
  2. Home controller
  3. Data controller

Angular Controller

1. Part6 Controller

2. Part7 Controller

There are 3 Mvc Controller and 2 Angular Controller have been created based on the Action method.

SYSTEM ANALYSIS

EXISTING SYSTEM

The three factors-based authentication schemes overcome the weaknesses existing in two-factor schemes. As the three factors provide many attractive properties, several three-factor authentication and key agreement schemes have been proposed for TMIS.

PROPOSED SYSTEM

Proposed a biometrics-based authenticated key agreement scheme for TMIS by using hash function and nonce, they claimed that their scheme could eliminate the security weaknesses. Scheme and provide dynamic identity protection and user anonymity.

Proposed scheme resists various attacks and provides several attractive security properties. Performance evaluation shows that the proposed scheme increases efficiency in comparison with other related schemes.

Proposed to provide authorization, authentication and key management. The software solution for sharing and querying of clinical documents was presented to provide security for data providers and protect the patients’ privacy.

ALGORITHM

Cryptographic Algorithm:

Decryption is the reverse, in other words, moving from the unintelligible cipher text back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption. The detailed operation of a cipher is controlled both by the algorithm and in each instance by a "key".

Symmetric key encryption algorithm:

A secret key algorithm (sometimes called a symmetric algorithm) is a cryptographic algorithm that uses the same key to encrypt and decrypt data.

Matching algorithm:

In the mathematical discipline of graph theory, a matching or independent edge set in a graph is a set of edges without common vertices. It may also be an entire graph consisting of edges without common vertices.

Polynomial time algorithm:

A known algorithm that is guaranteed to terminate within a number of steps which is a polynomial function of the size of the problem. See also computational complexity, exponential time, nondeterministic polynomial-time (NP), NP-complete.

SYSTEM SPECIFICATION

HARDWARE REQUIREMENTS:

System: Pentium IV 2.4 GHz.

Hard Disk : 40 GB.

Floppy Drive : 1.44 Mb.

Monitor : 14’ Colour Monitor.

Mouse : Optical Mouse.

Ram : 512 Mb.

SOFTWARE REQUIREMENTS:

Operating system : Windows 7 Ultimate.

Coding Language: MVC 4 Razor

Front-End: Visual Studio 2012 Professional.

Data Base: SQL Server 2008.

CONCLUSION

In this paper, we have demonstrated that authentication scheme suffers from various attacks and fails to provide several security properties. And then, we have proposed a three-factor authenticated key agreement scheme by using chaotic map-based cryptography to address these problems. The proposed scheme realizes the protection of medical data transmitted in the open channel and provides privacy protection during the remote diagnosing process, which enables the patient to enjoy the secure and convenient healthcare through the TMIS. Security analysis has proved that the proposed scheme can resist various attacks, and performance analysis has shown that the proposed scheme achieves better performance in comparison with other related schemes. Thus, the proposed scheme is more suitable for practical applications in TMIS environments.