Page 79 - IJEEE-2022-Vol18-ISSUE-1
P. 79

Hamed & Yassin                                                                                                                                  | 75

  2. Disease prevention: ???? resists the disease based on devices               V. FORMAL SECURITY ANALYSIS WITH SCYTHER TOOL
  of doctors (??1, ??2, ??3 … , ???? ) and avoids all foods caused
  from the severity of chronic diseases.                                             Currently, we are focusing on establishing that the
  3. Laboratory and diagnostic care: ???? can receive the results               suggested method can withstand severe assaults such as
  of his test directly in his account (????????). In the other side,            phishing, man-in-the-middle (MITM), replay attacks, and
  early examination through the symptoms associated with                        eavesdropping attacks. Furthermore, our work incorporates a
  chronic diseases by sending his symptoms to the health                        number of security features. We do the following analysis of
  foundation.                                                                   the suggested scheme. It considers as a cryptography tool
  4. Remote emergency and inpatient services: ???? can get full                 used for formal security analysis and proof to ensure from
  services to the case emergency to take first aid and treatment                security, resisting well-known malicious attacks, correctness
  and prepare logistics before arriving at the hospital.                        of the messages via communication channel applied with the
  5. The mechanism of sending a query from ???? to ?????? and                   perfect cryptography functions such as hash function,
  vice versa. This query represents "Inquiries about symptoms                   EMAIL, encryption, and decryption. Finally, this tool gains
  of a specific disease or other". However, ???? writes his secure              the proposed scheme a guarantee to implement in the safe
  query ???? = ?????????????? (??????????_????????) and sends ???? to ??????.   condition and can resist the familiar attacks until the attacker
  6. In the side of ?????? , he retrieves the ??????????_???????? by            is accessible. Currently, the proposed scheme has been
  decrypting ???? based on ???????????'??????? = ?????????????? (????) . Then,  written in SPDL language and the viewed the results in the
  ?????? sends the ???????????'??????? to the concerned department in the       state of (?????????????????? ??????????) and (???????????????????????? ??????????).
  health foundation. After that, the specialist doctor answers
  the patient query by doctor report (????2???? ) and then ??????               1. Verification of Claim : Scyther's input language allows
  encrypts this report (???? = ?????????????? (????2????)) and resubmits        security features to be specified in terms of claimed events.
  ???? to ????.                                                                 For example, one may argue in a role definition that a
  7. Upon receiving ????, ???? can read the replying of his queries             particular value is confidential (confidentiality) and that
  by ????2???? = ?????????????? (????).                                         certain traits should apply to communication partners
                                                                                (authentication). Scyther can be used to verify or disprove
                  Fig.3: Healthcare phase for patient                           these traits.
5. Key Management Phase                                                         2. Automatic of Claim: If the protocol specification lacks
                                                                                security assertions, Scyther can generate them automatically.
    Here, the main parties have an agreement to generate once                   Verification claims assert that the protocol's putative
    key for each login request based on ( ????????, ???? ). In the              communication partners must have followed it as intended at
    moment of successful login of patient, the main parties                     the conclusion of each role. All parameters and locally
    (????, ??????) performs the following points to apply this phase.           produced values are likewise subject to confidentiality claims
    1. Patient (????) side computes ???????? = ????????? ????.                  (nonce). Scyther evaluates the expanded protocol
    2. Cloud Healthcare Server (??????) side computes ???????? =                description, in the same manner, he did previously. This
                                                                                allows users to quickly study a protocol's characteristics.
          ????????? ????'.                                                      Based on the scyther tool, our work resists harmful attacks
                                                                                such as MITM, Insider, Replay, Spoofing, and
                                                                                Impersonation. The login and authentication phases are
                                                                                depicted in Figure 4 [37].

                                                                                     We notice that the proposed scheme has protect against
                                                                                malicious attacks as above mention. So, SPDL supports
                                                                                many major crypto functions like sending or receiving
                                                                                messages among components, and the roles of each
                                                                                component. When we strip the proposed system from
                                                                                security factions like crypto hash, encryption, we will notice
                                                                                the apparent weakness of the system, as Figures 5 and 6.

                                                                                     Figure 5 represents the result of an safe system that does
                                                                                not contain perfect cryptography functions. Therefore, this
                                                                                system becomes insecure and vulnerable to face the
                                                                                malicious attacks (see Figure 6).
   74   75   76   77   78   79   80   81   82   83   84