2023
DOI: 10.11591/eei.v12i4.4459
|View full text |Cite
|
Sign up to set email alerts
|

Secure two-factor mutual authentication scheme using shared image in medical healthcare environment

Abstract: The cloud healthcare system has become the essential online service during the COVID-19 pandemic. In this type of system, the authorized user may login to a distant server to acquire the service and resources they demand, we need full security procedures that cover criteria such as authentication, privacy, integrity, and availability. The journey of security for any healthcare system starts with the authentication of users based on their privileges. Traditional user authentication mechanisms, such as password … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
1
0
Order By: Relevance
“…The data indicates that while the data transfer-based average rate is over 100 Mb/s, the data transmissionbased peak rate via 5G wireless networks can reach 20 Gb/s [24]- [27]. The supported network can provide a more steady connection and has 1000 times the capacity of current networks [28], [29]. But, this feature is coupled by worries about privacy, performance effectiveness, and security.…”
Section: Introductionmentioning
confidence: 99%
“…The data indicates that while the data transfer-based average rate is over 100 Mb/s, the data transmissionbased peak rate via 5G wireless networks can reach 20 Gb/s [24]- [27]. The supported network can provide a more steady connection and has 1000 times the capacity of current networks [28], [29]. But, this feature is coupled by worries about privacy, performance effectiveness, and security.…”
Section: Introductionmentioning
confidence: 99%
“…Based on cloud computing technology, cloud services centralize and virtualize computing resources, enabling users to access and use these resources over a network without having to own or maintain computing equipment and infrastructure [3]. Cloud services can also allow for flexible provisioning of computing resources and services based on user needs and usage, and a pay-as-you-go model that allows users to only pay for actual usage, reducing user costs and risks [4], [5]. Infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS) are common service models in cloud services that can meet the needs of different users and application scenarios [6], [7].…”
Section: Introductionmentioning
confidence: 99%