Open Access
ARTICLE
A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN
1 Department of Computer Science and Engineering, Chandigarh University, Mohali, 140413, India
2 Chandigarh Engineering College Jhanjeri, Mohali, 140307, India
3 School of Computer Science and Engineering, SCE, Taylor’s University, Subang Jaya, 47500, Malaysia
4 Center for Smart Society 5.0 [CSS5.0], FIT, Taylor’s University, Subang Jaya, 47500, Malaysia
5 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
6 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
* Corresponding Author: Sahil Verma. Email:
Computers, Materials & Continua 2023, 74(2), 3711-3726. https://doi.org/10.32604/cmc.2023.027992
Received 30 January 2022; Accepted 15 April 2022; Issue published 31 October 2022
Abstract
Cloud-based SDN (Software Defined Network) integration offers new kinds of agility, flexibility, automation, and speed in the network. Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement. The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services. It has improved the real-time monitoring of patients by medical practitioners. Patients’ data get stored at the central server on the cloud from where it is available to medical practitioners in no time. The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’ privacy. In recent days, several schemes have been proposed to ensure the safety of patients’ data. But most of the techniques still lack the practical implementation and safety of data. In this paper, a secure multi-factor authentication protocol using a hash function has been proposed. BAN (Body Area Network) logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information. Security Protocol Animator (SPAN)–Automated Validation of Internet Security Protocols and Applications (AVISPA) tool has been used for simulation. The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification. Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity, computation cost which accounts to only 423 ms in proposed, and security parameters such as identification and spoofing prove its efficiency.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.