Secure Remote User Authentication Scheme on Health Care, IoT and Cloud Applications: A Multilayer Systematic Survey
Acta Polytechnica Hungarica
Secure remote user authentication is an authentication technique in which the remote server authorizes the identity of the user through an insecure communication network. Since then diverse remote user authentication schemes have been proposed, but each category has its advantages and disadvantages. Besides its strength and weakness, remote user authentication systems have a great impact on real-time applications such as E-health applications, telemedicine applications, Internet of Things
... Cloud, and Multi-server applications. The implementation of the Tele Medicine Information System (TMIS) over public networks continues to disclose confidential information to unauthorized entities. Similarly, remote user authentication techniques have become essential in accelerating IoT as well. Security is a major concern in IoT because it allows secure access to remote services. Cloud computing services and a Multi-server environment share data among different end-users through the internet which also needs security as its paramount concern. Although intensive efforts were made in designing remote user authentication scheme for health care, IoT, Multi-server and cloud applications, the majority of these applications suffers either from security attacks or lagging of critical features. This paper presents an analytical and comprehensive survey of various remote user authentication techniques and categorizes them based on different applications. Furthermore, the state of art recent remote user authentication techniques have been compared, their advantages, key features, computational cost, storage cost, and communication cost are highlighted.