Skip to main content
Top
Published in: World Wide Web 1/2018

06-04-2017

An infrastructure framework for privacy protection of community medical internet of things

Transmission protection, storage protection and access control

Authors: Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang

Published in: World Wide Web | Issue 1/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As a kind of medical service around people, community health care is closely related to peoples lives, and thus it has also been placed higher requirements. In the face of growing community medical needs, the construction and development of community medical Internet of things is imminent. Subsequently, massive multi-type of medical data which contain all kinds of user identity data, various types of vital signs data and other sensitive information are generated. Such a large scale of data in the transmission, storage and access process is facing the risk of data leakage. To effectively protect the privacy information of patients, an infrastructure framework for privacy protection of community medical Internet of things is proposed. It includes transmission protection based on multi-path asymmetric encryption fragment transmission mechanism, storage protection using distributed symmetric encryption cloud storage scheme and access control with identity authentication and dynamic access authorization. Through theoretical analysis and simulation experiments, it is proved that the community medical data can be effectively protected.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)CrossRefMATH Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)CrossRefMATH
2.
go back to reference Beato, F., Meul, S., Preneel, B.: Practical identity-based private sharing for online social networks. Comput. Commun. 73, 243–250 (2016)CrossRef Beato, F., Meul, S., Preneel, B.: Practical identity-based private sharing for online social networks. Comput. Commun. 73, 243–250 (2016)CrossRef
3.
go back to reference Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption IEEE Symposium on Security and Privacy (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption IEEE Symposium on Security and Privacy (2007)
4.
go back to reference Chen, M., Qian, Y., Mao, S., et al.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)CrossRef Chen, M., Qian, Y., Mao, S., et al.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)CrossRef
5.
go back to reference Ding, Z., Li, J., Bo, F.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009) Ding, Z., Li, J., Bo, F.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)
6.
go back to reference Du, W., Deng, J., Han, Y.S., et al.: A pairwise key pre-distribution scheme for wireless sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 42–51 (2003) Du, W., Deng, J., Han, Y.S., et al.: A pairwise key pre-distribution scheme for wireless sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 42–51 (2003)
7.
go back to reference Forsstrom, S., Kanter, T., Osterberg, P.: Ubiquitous secure interactions with intelligent artifacts on the internet-of-things IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), pp 1520–1524 (2012) Forsstrom, S., Kanter, T., Osterberg, P.: Ubiquitous secure interactions with intelligent artifacts on the internet-of-things IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), pp 1520–1524 (2012)
8.
go back to reference Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 516–525 (2010) Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 516–525 (2010)
9.
go back to reference Hong, Z.Z.: Research on electronic health records of community residents Fudan University (2008) Hong, Z.Z.: Research on electronic health records of community residents Fudan University (2008)
10.
go back to reference Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011) Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011)
11.
go back to reference Huang, R.W., Gui, X.L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chinese J. Comput. 34(12), 2391–2402 (2011)CrossRef Huang, R.W., Gui, X.L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chinese J. Comput. 34(12), 2391–2402 (2011)CrossRef
12.
go back to reference Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunics password authentication schemes. IEICE Trans. Commun. 85(4), 823–825 (2002) Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunics password authentication schemes. IEICE Trans. Commun. 85(4), 823–825 (2002)
13.
go back to reference Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef
14.
go back to reference Kamara, S., Lauter, K.: Cryptographic cloud storage Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp 136–149 (2010) Kamara, S., Lauter, K.: Cryptographic cloud storage Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp 136–149 (2010)
15.
go back to reference Kothmayr, T., Schmitt, C., Hu, W., et al.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication IEEE 37th Conference on Local Computer Networks Workshops, pp 956–963 (2012) Kothmayr, T., Schmitt, C., Hu, W., et al.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication IEEE 37th Conference on Local Computer Networks Workshops, pp 956–963 (2012)
17.
go back to reference Ma, W.J.: Research and application on security authentication technologies in internet of things Shandong University (2011) Ma, W.J.: Research and application on security authentication technologies in internet of things Shandong University (2011)
18.
go back to reference Maeda, T., Sato, K., Muraoka, Y., et al.: RFID System and RFID tag. U.S. Patent 8274367 (2012) Maeda, T., Sato, K., Muraoka, Y., et al.: RFID System and RFID tag. U.S. Patent 8274367 (2012)
19.
go back to reference Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. Journal of Tsinghua University (Sci & Tech) 51(10), 1357–1362 (2011) Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. Journal of Tsinghua University (Sci & Tech) 51(10), 1357–1362 (2011)
20.
go back to reference Ning, H.S., Xu, Q.Y.: Research on global internet of things developments and its lonstruction in China. Acta Electronica Sinica 38(11), 2590–2599 (2010) Ning, H.S., Xu, Q.Y.: Research on global internet of things developments and its lonstruction in China. Acta Electronica Sinica 38(11), 2590–2599 (2010)
21.
go back to reference Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Comput. Commun. 29(5), 660C667 (2006)CrossRef Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Comput. Commun. 29(5), 660C667 (2006)CrossRef
22.
go back to reference Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure atrributebased systems Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 99–112 (2006) Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure atrributebased systems Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 99–112 (2006)
23.
go back to reference Song, Z., Zhang, Y., Wu, C.: A reliable transmission scheme for security and protection system based on internet of things IET International Conference on Communication Technology & Application, pp 806–810 (2011) Song, Z., Zhang, Y., Wu, C.: A reliable transmission scheme for security and protection system based on internet of things IET International Conference on Communication Technology & Application, pp 806–810 (2011)
24.
go back to reference Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010). A Publication of the IEEE Engineering in Medicine & Biology SocietyCrossRef Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010). A Publication of the IEEE Engineering in Medicine & Biology SocietyCrossRef
25.
go back to reference Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd International Conference on Very Large Data Base, pp 123–134 (2007) Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd International Conference on Very Large Data Base, pp 123–134 (2007)
26.
go back to reference Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)CrossRef Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)CrossRef
27.
go back to reference Wang, B., Zhang, H., Wang, Z, et al.: A secure mutual password authentication scheme with user anonymity. Geomatics & Information Science of Wuhan University 33 (10), 1073–1075 (2008) Wang, B., Zhang, H., Wang, Z, et al.: A secure mutual password authentication scheme with user anonymity. Geomatics & Information Science of Wuhan University 33 (10), 1073–1075 (2008)
28.
go back to reference Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp 55–66 (2009) Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp 55–66 (2009)
29.
go back to reference Wu, C.K.: An overview on the security techniques and challenges of the internet of things. Journal of Cryptologic Research 2(1), 40–53 (2015) Wu, C.K.: An overview on the security techniques and challenges of the internet of things. Journal of Cryptologic Research 2(1), 40–53 (2015)
30.
go back to reference Wu, Z.Q., Zhou, Y.W., Ma, J.F.: A secure transmission model for internet of things. Chinese J. Comput. 34(8), 1351–1364 (2011)CrossRef Wu, Z.Q., Zhou, Y.W., Ma, J.F.: A secure transmission model for internet of things. Chinese J. Comput. 34(8), 1351–1364 (2011)CrossRef
31.
go back to reference Xie, W.J.: A secure communication scheme based on multipath transportation for the internet of things South China University of Technology (2013) Xie, W.J.: A secure communication scheme based on multipath transportation for the internet of things South China University of Technology (2013)
32.
go back to reference Yong-Hong, Y.U., Bai, W.Y.: Enforcing data privacy and user privacy over outsourced database service. Application Research of Computers 6(3), 404–412 (2011) Yong-Hong, Y.U., Bai, W.Y.: Enforcing data privacy and user privacy over outsourced database service. Application Research of Computers 6(3), 404–412 (2011)
33.
go back to reference Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. - IEEE INFOCOM 29(16), 1–9 (2010) Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. - IEEE INFOCOM 29(16), 1–9 (2010)
34.
go back to reference Yuen, T.H., Chow, S.S.M, Zhang, Y., et al.: Identity-based encryption resilient to continual auxiliary leakage Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp 117–134 (2012) Yuen, T.H., Chow, S.S.M, Zhang, Y., et al.: Identity-based encryption resilient to continual auxiliary leakage Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp 117–134 (2012)
35.
go back to reference Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Dev. 48(7), 1155–1167 (2011) Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Dev. 48(7), 1155–1167 (2011)
36.
go back to reference Zhang, J., Li, H., Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. doi:10.1109/TDSC.2015.2483503 (2015) Zhang, J., Li, H., Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. doi:10.​1109/​TDSC.​2015.​2483503 (2015)
37.
38.
go back to reference Zhang, Y., Shen, Y., Wang, H., Yong, J., Jiang, X.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)CrossRef Zhang, Y., Shen, Y., Wang, H., Yong, J., Jiang, X.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)CrossRef
Metadata
Title
An infrastructure framework for privacy protection of community medical internet of things
Transmission protection, storage protection and access control
Authors
Fulong Chen
Yonglong Luo
Ji Zhang
Junru Zhu
Ziyang Zhang
Chuanxin Zhao
Taochun Wang
Publication date
06-04-2017
Publisher
Springer US
Published in
World Wide Web / Issue 1/2018
Print ISSN: 1386-145X
Electronic ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0455-z

Other articles of this Issue 1/2018

World Wide Web 1/2018 Go to the issue

Premium Partner