Table 1 The limitation and authentication techniques of existing work.

From: A cloud server centric multifactor lightweight authentication scheme for eHealth systems

Author and Year

Methodology

Pros

Limitation

Alzahrani et al.31, 2025

ECC and secure hash function-based authentication scheme.

Providing robust authentication and detailed security analysis.

High computation cost.

Deebak et al.11, 2020

Developed the bio-hash-based authentication model to ensure mutual trust in cloud-assisted healthcare environments.

Integrated bio-hashing, bilinear pairing and symmetric encryption.

High latency and communication cost.

Hu et al.32, 2022

They have used an integrated cryptographic framework and large-scale machine-oriented communication for their protocol.

Mutual authentication and session key agreement.

High computation cost and having privacy issues.

Chandrakar et al.10, 2020

Designed a privacy-preserving cloud framework for remote medical monitoring via mobile phones, avoiding in-person hospital visits.

Applied both symmetric and asymmetric cryptographic methods with bilinear mapping and XOR functions.

High computation cost and lacks user anonymity.

Qadir et al.13, 2023

Suggested a novel cloud privacy model for e-healthcare using secure authentication and controlled data access.

Employed a Security Secret Key Provider (SSKP) and modular access control approach.

Fails to grant patients direct access to their own medical data.

Lee et al.33, 2023

Their scheme uses RFID, physical unclonable function and the secure hash function.

Mutual authentication and RFID technology.

Vulnerable to insider attacks.

Chiou et al.12, 2016

Proposed a comprehensive security solution for telemedicine systems, targeting privacy, unlinkability, and data integrity.

Combined bilinear pairing with hashing and XOR operations.

Vulnerable to spoofing and key theft risks.

Benil et al.15, 2020

Investigated blockchain-based HER protection using elliptic curves and a novel signature scheme to preserve data confidentiality.

Used ECC for encryption, CAS for signatures, and blockchain to enhance cloud record safety.

High computation cost.

Jan et al.34, 2021

Presented a lightweight cryptographic protocol for secure communication in medical IoT using wearable sensors.

Employed a hybrid model combining hashing, XOR operations, and asymmetric encryption.

Vulnerable to traceability issues and insider threats due to identity exposure during key exchange.

Kohli et al.35, 2021

They have used DICOM and HL7.FHIR standards for healthcare data interoperability.

Model is effectively managed and easy to access.

Vulnerable to side channel and desynchronization attacks.

Jan et al.36, 2023

Offered a simplified authentication mechanism suitable for low-power medical environments and devices.

Relied on basic cryptographic primitives like hashing and XOR gates.

Adequate for minimal systems, but not ideal for multi-party or complex scenarios.

Alzahrani et al.37, 2024

Their authentication protocol uses SHA-512 and ECC.

Providing mutual authentication and secure key agreement.

Vulnerable to privileged insider attack.

Padmaja et al.9, 2021

The authors addressed security concerns in medical device access within cloud-integrated healthcare, proposing a robust authentication scheme.

Utilised a message digest with hashing and chaotic ordering techniques for device verification.

The scheme misses a concrete and implementable security design for practical deployment.

Nikkhah et al.38, 2021

They have used public key cryptography for establishing authentication.

Lightweight authentication

vulnerable to replay and side channel attacks.

Okikiola et al.14, 2020

Focused on mitigating insider threats in cloud health systems through traceability and log-based detection mechanisms.

Deployed watermark-based logging and symmetric encryption for integrity monitoring.

The approach does not handle tampering or modifications of records.

Tanveer et al.39, 2024

They have used AES and a biometric fuzzy extractor.

Mutual authentication and Scyther simulation.

Vulnerable to key-stolen attack and high computation cost.

Abbasi et al.17, 2024

Built a security model for cloud-based healthcare access where users authenticate via a public server.

Implemented ECC alongside biometric fuzzy extraction to protect data.

Provides strong security, but lacks adaptability for multi-entity authentication frameworks.

Masud et al.8, 2021

They have used the SHA hash function, the XOR operation and symmetric key encryption/decryption.

Security analysis done by the AVISPA tool.

Vulnerable to tracking attacks.