Skip to main content

Table 3 Comparison of the security attributes of the proposed scheme with those of other schemes

From: A secure electronic medical record authorization system for smart device application in cloud computing environments

Security attack

Chiou et al. [13]

Mohit et al. [14]

Kumar et al. [15]

Li et al. [16]

The proposed scheme

Patient anonymity

No

No

Yes

No

Yes

Patient unlinkability

No

No

Yes

No

Yes

Doctor unlinkability

No

No

No

No

Yes

Mutual authentication

Yes

Yes

Yes

Yes

Yes

Data integrity

Yes

Yes

Yes

Yes

Yes

Data non-repudiation

Yes

Yes

Yes

Yes

Yes

Confidentiality

Yes

Yes

Yes

Yes

Yes

Availability

Yes

Yes

Yes

Yes

Yes

Replay attack

Yes

Yes

Yes

Yes

Yes

Man-in-the-middle attack

Yes

Yes

Yes

Yes

Yes

Impersonation attack

No

No

Yes

No

Yes