Page 78 - IJEEE-2022-Vol18-ISSUE-1
P. 78
74 | Hamed & Yassin
obtaining ????????. If false, he terminates this phase. Otherwise,
???? The one-time random number generated by ?????? restores random number by decrypting ?????? where ??'?? =
user. ?????? ???????? (??????).
5. ??????'???? and ?????????? , if it is valid then ?????? sends
|| Concatenation operation. challenge as verification code (????) to the E-mail of ????.
6. At this moment, ???? restores verification code (????’') via his
A. Setup Phase E-mail and encrypts ????’' using ???'??? = ?????? ???????? (????'). Then,
he sends ???'??? to ??????.
The setup phase considers the first step of the presented work. 7. ?????? computes ????’' = ?????? ???????? (???'???) and compares
The ?????? is a trust third party created all the security between ????’' and ???? ; if true then he gives permission to ????
parameters and depends on one-way hash function h(. ) , for entering the system and applying the main operations
symmetric encryption ??????() /decryption ( ??????() ). Then, included healthcare services at the Healthcare phase.
?????? creates (???????? ? Z) to encrypt/ decrypt data between Otherwise, He terminate the current phase.
???? and ??????; where the symmetric key encryption is Counter
mode (CTR mode). This type of encryption employs the Fig.1: Login and Authentication phase
block cipher algorithm, which offers significant efficiency
gains over traditional encryption options without Fig.2: Flow chart of Healthcare phase for patient
jeopardizing security. Its fitted security, in particular, has D.Healthcare Phase
been proven. Second, the majority of the objections leveled
against CTR mode are unfounded. There are main medical services presented to each
patient ????, we can list these service in the below steps:
B. Registration Phase 1. Health promotion: ???? keeps the attachment with the health
foundation.
User (????) registers his main information in ?????? by
performing the following steps:
1. ???? Chooses his identity (????????) and password (????????) by
using the main website of health care institute. Also,
???? records information about his doctor and relatives
(Electronic HealthCare Record ( ???????? )). ???????? includes
phone numbers of doctors and relatives, Name of patient,
Pathological case, E-mail, and others.
2. ???? computes the following anonymous parameters
based on the following equations:
3. ???? submits (??????????, ??????????, ????????) to ??????.
4. ?????? verifies its database to check if ???? is previously
registered. If so,?????? terminates this phase. Otherwise, the
?????? ds a new patient’s information ( ??????????, ?????????? , ????????)
in the main secure database.
C.Login and Authentication Phase
The patient (????) wishes to login system for checking his
????????, receiving report from his doctor or sending quires to
his doctor. Therefore, it is necessary to ensure from the
authority of ???? to allow him accessing to the system. The
important steps that use in current phase as follows:
1. ???? enters his username ( ???????? ) and password ( ???????? ),
generates integer random number ???? ? Z , and computes an
anonymity of identity and anonymity one time password
?????????? = h(????????||????????) and ?????????? =
h(h(????????||????????) ||????), respectively.
2. ???? encrypts ???? using symmetric key encryption (CTR
mode), ?????? = ?????? ???????? (????).
3. ???? sends his login request <??????????, ??????????, ??????> to ??????.
4. In the cloud health server (??????), he checks patient's; if he
was found in the database of ?????? or no based on ?????????? for