Page 78 - IJEEE-2022-Vol18-ISSUE-1
P. 78

74 |                                                                                                                            Hamed & Yassin
                                                                             obtaining ????????. If false, he terminates this phase. Otherwise,
      ????  The one-time random number generated by                          ?????? restores random number by decrypting ?????? where ??'?? =
                                   user.                                     ?????? ???????? (??????).
                                                                             5. ??????'???? and ?????????? , if it is valid then ?????? sends
      || Concatenation operation.                                            challenge as verification code (????) to the E-mail of ????.
                                                                             6. At this moment, ???? restores verification code (????’') via his
A. Setup Phase                                                               E-mail and encrypts ????’' using ???'??? = ?????? ???????? (????'). Then,
                                                                             he sends ???'??? to ??????.
The setup phase considers the first step of the presented work.              7. ?????? computes ????’' = ?????? ???????? (???'???) and compares
The ?????? is a trust third party created all the security                   between ????’' and ???? ; if true then he gives permission to ????
parameters and depends on one-way hash function h(. ) ,                      for entering the system and applying the main operations
symmetric encryption ??????() /decryption ( ??????() ). Then,                included healthcare services at the Healthcare phase.
?????? creates (???????? ? Z) to encrypt/ decrypt data between               Otherwise, He terminate the current phase.
???? and ??????; where the symmetric key encryption is Counter
mode (CTR mode). This type of encryption employs the                                      Fig.1: Login and Authentication phase
block cipher algorithm, which offers significant efficiency
gains over traditional encryption options without                                  Fig.2: Flow chart of Healthcare phase for patient
jeopardizing security. Its fitted security, in particular, has               D.Healthcare Phase
been proven. Second, the majority of the objections leveled
against CTR mode are unfounded.                                                   There are main medical services presented to each
                                                                             patient ????, we can list these service in the below steps:
B. Registration Phase                                                        1. Health promotion: ???? keeps the attachment with the health
                                                                             foundation.
User (????) registers his main information in ?????? by
    performing the following steps:

1. ???? Chooses his identity (????????) and password (????????) by

using the main website of health care institute. Also,
???? records information about his doctor and relatives
(Electronic HealthCare Record ( ???????? )). ???????? includes
phone numbers of doctors and relatives, Name of patient,

Pathological case, E-mail, and others.
      2. ???? computes the following anonymous parameters
      based on the following equations:

3. ???? submits (??????????, ??????????, ????????) to ??????.
4. ?????? verifies its database to check if ???? is previously
registered. If so,?????? terminates this phase. Otherwise, the
?????? ds a new patient’s information ( ??????????, ?????????? , ????????)

in the main secure database.

C.Login and Authentication Phase

     The patient (????) wishes to login system for checking his
????????, receiving report from his doctor or sending quires to
his doctor. Therefore, it is necessary to ensure from the
authority of ???? to allow him accessing to the system. The
important steps that use in current phase as follows:
1. ???? enters his username ( ???????? ) and password ( ???????? ),
generates integer random number ???? ? Z , and computes an
anonymity of identity and anonymity one time password
?????????? = h(????????||????????) and ?????????? =
h(h(????????||????????) ||????), respectively.
2. ???? encrypts ???? using symmetric key encryption (CTR
mode), ?????? = ?????? ???????? (????).
3. ???? sends his login request <??????????, ??????????, ??????> to ??????.
4. In the cloud health server (??????), he checks patient's; if he
was found in the database of ?????? or no based on ?????????? for
   73   74   75   76   77   78   79   80   81   82   83