Table 1 The limitation and authentication techniques of existing work.
From: A cloud server centric multifactor lightweight authentication scheme for eHealth systems
Author and Year | Methodology | Pros | Limitation |
|---|---|---|---|
Alzahrani et al.31, 2025 | ECC and secure hash function-based authentication scheme. | Providing robust authentication and detailed security analysis. | High computation cost. |
Deebak et al.11, 2020 | Developed the bio-hash-based authentication model to ensure mutual trust in cloud-assisted healthcare environments. | Integrated bio-hashing, bilinear pairing and symmetric encryption. | High latency and communication cost. |
Hu et al.32, 2022 | They have used an integrated cryptographic framework and large-scale machine-oriented communication for their protocol. | Mutual authentication and session key agreement. | High computation cost and having privacy issues. |
Chandrakar et al.10, 2020 | Designed a privacy-preserving cloud framework for remote medical monitoring via mobile phones, avoiding in-person hospital visits. | Applied both symmetric and asymmetric cryptographic methods with bilinear mapping and XOR functions. | High computation cost and lacks user anonymity. |
Qadir et al.13, 2023 | Suggested a novel cloud privacy model for e-healthcare using secure authentication and controlled data access. | Employed a Security Secret Key Provider (SSKP) and modular access control approach. | Fails to grant patients direct access to their own medical data. |
Lee et al.33, 2023 | Their scheme uses RFID, physical unclonable function and the secure hash function. | Mutual authentication and RFID technology. | Vulnerable to insider attacks. |
Chiou et al.12, 2016 | Proposed a comprehensive security solution for telemedicine systems, targeting privacy, unlinkability, and data integrity. | Combined bilinear pairing with hashing and XOR operations. | Vulnerable to spoofing and key theft risks. |
Benil et al.15, 2020 | Investigated blockchain-based HER protection using elliptic curves and a novel signature scheme to preserve data confidentiality. | Used ECC for encryption, CAS for signatures, and blockchain to enhance cloud record safety. | High computation cost. |
Jan et al.34, 2021 | Presented a lightweight cryptographic protocol for secure communication in medical IoT using wearable sensors. | Employed a hybrid model combining hashing, XOR operations, and asymmetric encryption. | Vulnerable to traceability issues and insider threats due to identity exposure during key exchange. |
Kohli et al.35, 2021 | They have used DICOM and HL7.FHIR standards for healthcare data interoperability. | Model is effectively managed and easy to access. | Vulnerable to side channel and desynchronization attacks. |
Jan et al.36, 2023 | Offered a simplified authentication mechanism suitable for low-power medical environments and devices. | Relied on basic cryptographic primitives like hashing and XOR gates. | Adequate for minimal systems, but not ideal for multi-party or complex scenarios. |
Alzahrani et al.37, 2024 | Their authentication protocol uses SHA-512 and ECC. | Providing mutual authentication and secure key agreement. | Vulnerable to privileged insider attack. |
Padmaja et al.9, 2021 | The authors addressed security concerns in medical device access within cloud-integrated healthcare, proposing a robust authentication scheme. | Utilised a message digest with hashing and chaotic ordering techniques for device verification. | The scheme misses a concrete and implementable security design for practical deployment. |
Nikkhah et al.38, 2021 | They have used public key cryptography for establishing authentication. | Lightweight authentication | vulnerable to replay and side channel attacks. |
Okikiola et al.14, 2020 | Focused on mitigating insider threats in cloud health systems through traceability and log-based detection mechanisms. | Deployed watermark-based logging and symmetric encryption for integrity monitoring. | The approach does not handle tampering or modifications of records. |
Tanveer et al.39, 2024 | They have used AES and a biometric fuzzy extractor. | Mutual authentication and Scyther simulation. | Vulnerable to key-stolen attack and high computation cost. |
Abbasi et al.17, 2024 | Built a security model for cloud-based healthcare access where users authenticate via a public server. | Implemented ECC alongside biometric fuzzy extraction to protect data. | Provides strong security, but lacks adaptability for multi-entity authentication frameworks. |
Masud et al.8, 2021 | They have used the SHA hash function, the XOR operation and symmetric key encryption/decryption. | Security analysis done by the AVISPA tool. | Vulnerable to tracking attacks. |