An OAuth2-based protocol with strong user privacy preservation for smart city mobile e-Health apps

作者: Victor Sucasas , Georgios Mantas , Ayman Radwan , Jonathan Rodriguez

DOI: 10.1109/ICC.2016.7511598

关键词: Computer scienceAuthorizationInformation sensitivitySmart cityMobile searchInternet privacyAuthenticationComputer securityDelegationInformation privacyMobile deviceMobile computingServerMobile telephony

摘要: In the context of Smart City concept, mobile e-Health applications can play a pivotal role towards improvement citizens' quality life, since they enable citizens to access personalized services, without limitations on time and location. However, accessing services through applications, running their devices, raises many privacy issues in terms identity These should be addressed so that citizens, concerned about leakage, will embrace reap benefits. Hence, this paper we propose an OAuth2-based protocol with strong user preservation addresses these issues. Our proposed follows OAuth2 flow integrates pseudonym-based signature scheme delegation into authentication phase protocol. The enables servers providing while preserving from malicious and/or eavesdroppers. Moreover, does not require store sensitive information devices.1

参考文章(17)
Victor Sucasas, Firooz B. Saghezchi, Ayman Radwan, Hugo Marques, Jonathan Rodriguez, Seiamak Vahid, Rahim Tafazolli, Efficient privacy preserving security protocol for VANETs with sparse infrastructure deployment 2015 IEEE International Conference on Communications (ICC). pp. 7047- 7052 ,(2015) , 10.1109/ICC.2015.7249450
Xinyi Huang, Yi Mu, Willy Susilo, Fangguo Zhang, Xiaofeng Chen, A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World Embedded and Ubiquitous Computing – EUC 2005 Workshops. pp. 480- 489 ,(2005) , 10.1007/11596042_50
Georgios Mantas, Nikos Komninos, Jonathan Rodriguez, Evariste Logota, Hugo Marques, Security for 5G Communications John Wiley & Sons, Ltd.. pp. 207- 220 ,(2015) , 10.1002/9781118867464.CH9
M. Fengou, G. Mantas, D. Lymberopoulos, N. Komninos, S. Fengos, N. Lazarou, A New Framework Architecture for Next Generation e-Health Services IEEE Journal of Biomedical and Health Informatics. ,vol. 17, pp. 9- 18 ,(2013) , 10.1109/TITB.2012.2224876
Rongxing Lu, Xiaodong Lin, Zhiguo Shi, Xuemin Sherman Shen, A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems IEEE Intelligent Systems. ,vol. 28, pp. 62- 65 ,(2013) , 10.1109/MIS.2013.56
Eric Y. Chen, Yutong Pei, Shuo Chen, Yuan Tian, Robert Kotcher, Patrick Tague, OAuth Demystified for Mobile Application Developers computer and communications security. pp. 892- 903 ,(2014) , 10.1145/2660267.2660323
Mohamed Shehab, Fadi Mohsen, Towards Enhancing the Security of OAuth Implementations in Smart Phones ieee international conference on mobile services. pp. 39- 46 ,(2014) , 10.1109/MOBSERV.2014.15
S. H. Yeganeh, A. Tootoonchian, Y. Ganjali, On scalability of software-defined networking IEEE Communications Magazine. ,vol. 51, pp. 136- 141 ,(2013) , 10.1109/MCOM.2013.6461198
Agusti Solanas, M. rady, Mauro Conti, Ioannis S Vlachos, Victoria Ramos, Francisco Falcone, Octavian Postolache, Pablo A Pérez-Martínez, Despina N Di Pietro, M rady, Antoni Martinez-Balleste, Smart health: A context-aware health paradigm within smart cities IEEE Communications Magazine. ,vol. 52, pp. 74- 81 ,(2014) , 10.1109/MCOM.2014.6871673
Dan Boneh, Matthew Franklin, Identity-Based Encryption from the Weil Pairing SIAM Journal on Computing. ,vol. 32, pp. 586- 615 ,(2003) , 10.1137/S0097539701398521