iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.32604/csse.2022.022329
CSSE | Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

Open Access iconOpen Access

ARTICLE

crossmark

Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health

A. S. Anakath1,*, S. Ambika2, S. Rajakumar3, R. Kannadasan4, K. S. Sendhil Kumar5

1 School of Computing, E.G.S. Pillay Engineering College, Nagapattinam, 611002, India
2Department of Computer Science and Engineering, University College of Engineering Ariyalur, Ariyalur, 621705, India
3 Department of Mathematics, University College of Engineering Ariyalur, Ariyalur, 621705, India
4 Department of Software Systems, School of Computer Science and Engineering (SCOPE), Vellore Institute of Technology University, Vellore, 632014, India
5 Department of IoT, School of Computer Science and Engineering (SCOPE), Vellore Institute of Technology University, Vellore, 632014, India

* Corresponding Author: A. S. Anakath. Email: email

Computer Systems Science and Engineering 2022, 43(2), 833-847. https://doi.org/10.32604/csse.2022.022329

Abstract

Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by the data owner. Thus, ensuring the security and confidentiality of the data while processing in the centralized network is very difficult. The secured key transmission between the sender and the receiver in the network is a huge challenge in managing most of the sensitive data transmission among the cloud network. Intruders are very active over the network like real authenticated user to hack the personal sensitive data, such as bank balance, health data, personal data, and confidential documents over the cloud network. In this research, a secured key agreement between the sender and the receiver using Kerberos authentication protocol with fingerprint is proposed to ensure security in M-Healthcare. Conditions of patients are monitored using wireless sensor devices and are then transferred to the server. Kerberos protocol helps in avoiding unnecessary communication of authenticated data over the cloud network. Biometric security process is a procedure with the best security in most of the authentication field. Trust node is responsible in carrying data packets from the sender to the receiver in the cloud network. The Kerberos protocol is used in trust node to ensure security. Secured communication between the local health center and the healthcare server is ensured by using a fingerprint feature called minutiae form, which refers to the fingerprint image of both sender and receiver. The computational and communicational cost of the proposed system is lesser when compared with other existing authentication methods.

Keywords


Cite This Article

APA Style
Anakath, A.S., Ambika, S., Rajakumar, S., Kannadasan, R., Kumar, K.S.S. (2022). Fingerprint agreement using enhanced kerberos authentication protocol on m-health. Computer Systems Science and Engineering, 43(2), 833-847. https://doi.org/10.32604/csse.2022.022329
Vancouver Style
Anakath AS, Ambika S, Rajakumar S, Kannadasan R, Kumar KSS. Fingerprint agreement using enhanced kerberos authentication protocol on m-health. Comput Syst Sci Eng. 2022;43(2):833-847 https://doi.org/10.32604/csse.2022.022329
IEEE Style
A.S. Anakath, S. Ambika, S. Rajakumar, R. Kannadasan, and K.S.S. Kumar, “Fingerprint Agreement Using Enhanced Kerberos Authentication Protocol on M-Health,” Comput. Syst. Sci. Eng., vol. 43, no. 2, pp. 833-847, 2022. https://doi.org/10.32604/csse.2022.022329



cc Copyright © 2022 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1435

    View

  • 908

    Download

  • 0

    Like

Share Link