Weitere Artikel dieser Ausgabe durch Wischen aufrufen
Wireless sensor networks (WSNs) have been widely used in many applications recently. As an important application of the WSNs, the wireless medical sensor networks (WMSNs) could improve health-care quality and have become significant in the modern medical system. WMSNs devices typically have limited computing, storage and communication capabilities. To enhance the capabilities of WSNs, cloud-assisted WMSNs have been introduced, and they can provide more efficient processing of cloud users’ medical data records stored in the cloud. The integrity of medical data records is very important since these data will be used to provide a medical diagnosis and other medical treatments. In this paper, we propose an efficient integrity verification scheme for medical data records in cloud-assisted WMSNs. Based on elliptic curve digital signature algorithm, we construct linearly homomorphic authenticator, so that the third party auditor (TPA) can verify the the integrity of medical data records without bringing in new security threats. TPA does not need to retrieve the entire medical data records, thus can dramatically reduce the communication and computation overhead. Moreover, we further extend our scheme to support batch integrity verification for multiple cloud users simultaneously. In particular, to achieve efficient medical data dynamic operations, using index hash tables, our scheme can execute dynamic operations efficiently. Performance comparison shows that our scheme is more light-weight, and can be used much more practically in cloud-assisted WMSNs.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Kumar, P., Lee, Y. D., & Lee, H. J., (2010). Secure health monitoring using medical wireless conference on networked. In Proceedings of the 6th international conference on networked computing and advanced information management (NCM’10), Seoul, Korea (pp. 491–494).
Kumar, P., Lee, S., & Lee, H. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12, 1625–1647. CrossRef
Huang, Y. M., Hsieh, M. Y., Chao, H. C., Hung, S. H., & Park, J. H. (2009). Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal of Selected Areas in Communication, 27, 400–411. CrossRef
He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995. CrossRef
He, D., Kumar, N., Jianhua, C., Lee, C. C., Chilamkurti, N., & Yeo, S. S. (2015). Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21, 49–60. CrossRef
Sun, J., Fang, Y., & Zhu, X. (2010). Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wireless Communication, 17(1), 51–8. CrossRef
Wang, H., Wu, Q., Qin, B., & Josep, D. F. (2014). FRR: Fair remote retrieval of putsourced private medical records in electronic health nwtworks. Journal of Biomedical Informatiocs, 50, 226–233. CrossRef
Cloud Security Alliance. (2010). Top threats to cloud computing. http://www.cloudsecurityalliance.org.
Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed systems, 22(5), 847–859. CrossRef
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceeding of the 14th ACM conference computer and communication security (CCS’07) (pp. 598–609).
Shah, M. A., Swaminathan, R. & Baker, M. (2008). Privacy-preserving auditing and extraction of digital contents. Cryptology ePrint Archive, Report 2008/186.
Wang, Q., Wang, C., Li, J., Ren, K. & Lou, W. (Sep.2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceeding of ESORICS’09, Saint Malo, France.
Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Proceedings of Asiacrypt 2008 (vol. 5350, pp. 90-107). Springer, Berlin.
Juels, A., Burton, J. & Kaliski, S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of CCS’07, Alexandia, VA (pp. 584–597).
Zhu, Y., Wang, H., Hu. Z., Ahn, G. J., Hu, H., & Yau, S. (2011). Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceeding of the 2011 ACM symposium on applied computing, ser. SAC’11. New York, NY, USA (pp. 1550–1557).
Yuan, J. & Yu, S. (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the 2013 international workshop on security in cloud computing, Hangzhou, China (pp. 19–26).
He, D., Zeadally, S. & Wu, L. (2015). Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, pp. 1–10. doi: 10.1109/JSYST.2015.2428620.
Wang, B., Li, B., & Li, H. (2015). Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on Services Computing, 8(1), 92C106. CrossRef
Zhang, Y., Xu, C., Yu, S., Li, H., & Zhang, X. (2015). Sclpv: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Transactions on Computational Social Systems, 2(4), 159C170. CrossRef
Yu, J., Ren, K., Wang, C., & Varadharajan, V. (2015). Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information Forensics and Security, 10(6), 1167–1179. CrossRef
Ferrara, A. L., Green, M, Hohenberger, S, & Pedersen, M. (2009). Practical short signature batch verification. In Proceedings Cryptographers’ Track at the RSA Conference 2009 on Topics in Cryptology (CT-RSA) (pp. 309–324).
Ateniese, G., Pietro, R. D., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th interanational conference security and privacy in Communication Networks (SecureComm’08) (pp. 1–10).
Wang, C., Wang, Q., Ren, K., & Lou, W. (2012). Towards secure and dependable storage services in cloud computing. IEEE Transactions on Service Computing, 5(2), 220–232. CrossRef
Erway, C., Kupcu, A., Papamanthou, C., & Tamassia, R. (2009). Dynamic provable data possession. In Proceedings of the ACM Conference Computer and Communication Security (CCS’09) (pp. 213–222).
- Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks
- Springer US