Skip to main content
Top
Published in: Cluster Computing 3/2017

05-05-2017

New secure healthcare system using cloud of things

Authors: Ebrahim Al Alkeem, Dina Shehada, Chan Yeob Yeun, M. Jamal Zemerly, Jiankun Hu

Published in: Cluster Computing | Issue 3/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Modern healthcare services are serving patients needs by using new technologies such as wearable devices or cloud of things. The new technology provides more facilities and enhancements to the existing healthcare services as it allows more flexibility in terms of monitoring patients records and remotely connecting with the patients via cloud of things. However, there are many security issues such as privacy and security of healthcare data which need to be considered once we introduce wearable devices to the healthcare service. Although some of the security issues were addressed by some researchers in the literature, they mainly addressed cloud of things security or healthcare security separately and their work still suffers from limited security protection and vulnerabilities to some security attacks. The proposed new healthcare system combines security of both healthcare and cloud of things technologies. It also addresses most of the security challenges that might face the healthcare services such as the man in the middle (MITM), eavesdropping, replay, repudiation, and modification attacks. Scyther verification tool was also used to verify the robustness and correctness of the proposed system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Ahmed, M., Vu, Q.H., Asal, R., Al Muhairi, H., Yeun, C.Y.: Lightweight secure storage model with fault-tolerance in cloud environment. Electron. Commerce Res. 14(3), 271–291 (2014)CrossRef Ahmed, M., Vu, Q.H., Asal, R., Al Muhairi, H., Yeun, C.Y.: Lightweight secure storage model with fault-tolerance in cloud environment. Electron. Commerce Res. 14(3), 271–291 (2014)CrossRef
4.
go back to reference Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012). doi:10.1007/s10916-010-9449-4 Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012). doi:10.​1007/​s10916-010-9449-4
5.
go back to reference Al-Qutayri, M., Yeun, C.Y., Belghuzooz, K.: Framework for secure wireless health monitoring and remote access system. Int. J. Internet Technol. Secur. Trans. 2(3-4), 380–398 (2010). doi:10.1504/IJITST.2010.03741 Al-Qutayri, M., Yeun, C.Y., Belghuzooz, K.: Framework for secure wireless health monitoring and remote access system. Int. J. Internet Technol. Secur. Trans. 2(3-4), 380–398 (2010). doi:10.​1504/​IJITST.​2010.​03741
6.
go back to reference Alkeem, E.A., Yeun, C.Y., Baek, J.: Secure nfc authentication protocol based on lte network. In: Ubiquitous Information Technologies and Applications, pp. 363–371. Springer (2014) Alkeem, E.A., Yeun, C.Y., Baek, J.: Secure nfc authentication protocol based on lte network. In: Ubiquitous Information Technologies and Applications, pp. 363–371. Springer (2014)
7.
go back to reference Almulla, S.A., Yeun, C.Y.: New secure storage architecture for cloud computing. In: Park, J.J., Yang, L.T., Lee, C. (eds.) Future Information Technology. Communications in Computer and Information Science, vol. 184. Springer, Berlin, Heidelberg (2011) Almulla, S.A., Yeun, C.Y.: New secure storage architecture for cloud computing. In: Park, J.J., Yang, L.T., Lee, C. (eds.) Future Information Technology. Communications in Computer and Information Science, vol. 184. Springer, Berlin, Heidelberg (2011)
8.
10.
go back to reference Azfar, A., Choo, K.K.R., Liu, L.: An android social app forensics adversary model. In: System Sciences (HICSS), 2016 49th Hawaii International Conference on, pp. 5597–5606. IEEE (2016) Azfar, A., Choo, K.K.R., Liu, L.: An android social app forensics adversary model. In: System Sciences (HICSS), 2016 49th Hawaii International Conference on, pp. 5597–5606. IEEE (2016)
11.
go back to reference Bahga, A., Madisetti, V.K.: A cloud-based approach for interoperable electronic health records (EHRs). Biomed Heal Informatics, IEEE J. 17(5), 894–906 (2013)CrossRef Bahga, A., Madisetti, V.K.: A cloud-based approach for interoperable electronic health records (EHRs). Biomed Heal Informatics, IEEE J. 17(5), 894–906 (2013)CrossRef
13.
go back to reference Bui, N., Zorzi, M.: Health care applications: a solution based on the internet of things, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1–5. Barcelona, Spain (2011) Bui, N., Zorzi, M.: Health care applications: a solution based on the internet of things, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1–5. Barcelona, Spain (2011)
17.
go back to reference Choi, Y.B., Capitan, K.E., Krause, J.S., Streeper, M.M.: Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J. Med. Syst. 30(1), 57–64 (2006). doi:10.1007/s10916-006-7405-0 Choi, Y.B., Capitan, K.E., Krause, J.S., Streeper, M.M.: Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J. Med. Syst. 30(1), 57–64 (2006). doi:10.​1007/​s10916-006-7405-0
18.
go back to reference Choo, K.K.R.: New payment methods: a review of 2010–2012 fatf mutual evaluation reports. Comput. Secur. 36, 12–26 (2013)CrossRef Choo, K.K.R.: New payment methods: a review of 2010–2012 fatf mutual evaluation reports. Comput. Secur. 36, 12–26 (2013)CrossRef
19.
go back to reference Choo, K.K.R.: Cryptocurrency and virtual currency: corruption and money laundering/terrorism financing risks? Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data, p. 283 (2015) Choo, K.K.R.: Cryptocurrency and virtual currency: corruption and money laundering/terrorism financing risks? Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data, p. 283 (2015)
20.
go back to reference Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)MathSciNetCrossRefMATH Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)MathSciNetCrossRefMATH
23.
go back to reference Do, Q., Martini, B., Choo, K.K.R.: Exfiltrating data from android devices. Comput. Secur. 48, 74–91 (2015)CrossRef Do, Q., Martini, B., Choo, K.K.R.: Exfiltrating data from android devices. Comput. Secur. 48, 74–91 (2015)CrossRef
24.
go back to reference Do, Q., Martini, B., Choo, K.K.R.: A forensically sound adversary model for mobile devices. PloS ONE 10(9), e0138–e0449 (2015) Do, Q., Martini, B., Choo, K.K.R.: A forensically sound adversary model for mobile devices. PloS ONE 10(9), e0138–e0449 (2015)
25.
go back to reference Do, Q., Martini, B., Choo, K.K.R.: Is the data on your wearable device secure? An android wear smartwatch case study. Softw. Pract. Exp. 47(3), 391–403 (2017) Do, Q., Martini, B., Choo, K.K.R.: Is the data on your wearable device secure? An android wear smartwatch case study. Softw. Pract. Exp. 47(3), 391–403 (2017)
26.
go back to reference D’Orazio, C., Choo, K.K.R.: A generic process to identify vulnerabilities and design weaknesses in ios healthcare apps. In: System Sciences (HICSS), 2015 48th Hawaii International Conference on, pp. 5175–5184. IEEE (2015) D’Orazio, C., Choo, K.K.R.: A generic process to identify vulnerabilities and design weaknesses in ios healthcare apps. In: System Sciences (HICSS), 2015 48th Hawaii International Conference on, pp. 5175–5184. IEEE (2015)
27.
go back to reference D’Orazio, C., Choo, K.K.R.: An adversary model to evaluate drm protection of video contents on ios devices. Comput. Secur. 56, 94–110 (2016)CrossRef D’Orazio, C., Choo, K.K.R.: An adversary model to evaluate drm protection of video contents on ios devices. Comput. Secur. 56, 94–110 (2016)CrossRef
29.
go back to reference D’Orazio, C.J., Lu, R., Choo, K.K.R., Vasilakos, A.V.: A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps. Appl. Math. Comput. 293, 523–544 (2017)MathSciNet D’Orazio, C.J., Lu, R., Choo, K.K.R., Vasilakos, A.V.: A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps. Appl. Math. Comput. 293, 523–544 (2017)MathSciNet
31.
go back to reference Duquette, A., Michaud, F., Mercier, H.: Exploring the use of a mobile robot as an imitation agent with children with low-functioning autism. Auton. Robots 24(2), 147–157 (2008). doi:10.1007/s10514-007-9056-5 Duquette, A., Michaud, F., Mercier, H.: Exploring the use of a mobile robot as an imitation agent with children with low-functioning autism. Auton. Robots 24(2), 147–157 (2008). doi:10.​1007/​s10514-007-9056-5
33.
go back to reference Ge, M., Choo, K.K.R.: A novel hybrid key revocation scheme for wireless sensor networks. In: International Conference on Network and System Security, pp. 462–475. Springer, Berlin (2014) Ge, M., Choo, K.K.R.: A novel hybrid key revocation scheme for wireless sensor networks. In: International Conference on Network and System Security, pp. 462–475. Springer, Berlin (2014)
34.
go back to reference Ge, M., Choo, K.K.R., Wu, H., Yu, Y.: Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63, 24–38 (2016)CrossRef Ge, M., Choo, K.K.R., Wu, H., Yu, Y.: Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63, 24–38 (2016)CrossRef
39.
go back to reference Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.K.R.: Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)CrossRef Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.K.R.: Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)CrossRef
40.
go back to reference Han, K., Mun, H., Shon, T., Yeun, C.Y., Park, J.J.J.H.: Secure and efficient public key management in next generation mobile networks. Pers. Ubiquitous Comput. 16(6), 677–685 (2012)CrossRef Han, K., Mun, H., Shon, T., Yeun, C.Y., Park, J.J.J.H.: Secure and efficient public key management in next generation mobile networks. Pers. Ubiquitous Comput. 16(6), 677–685 (2012)CrossRef
42.
go back to reference He, D., Kumar, N., Wang, H., Wang, L., Choo, K.K.R., Vinel, A.: A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans. Depend. Secure Comput. (2016). doi:10.1109/TDSC.2016.2596286 He, D., Kumar, N., Wang, H., Wang, L., Choo, K.K.R., Vinel, A.: A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans. Depend. Secure Comput. (2016). doi:10.​1109/​TDSC.​2016.​2596286
46.
go back to reference Hu, J., Chen, H.H., Hou, T.W.: A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput. Stand. Interf. 32(5), 274–280 (2010)CrossRef Hu, J., Chen, H.H., Hou, T.W.: A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput. Stand. Interf. 32(5), 274–280 (2010)CrossRef
47.
go back to reference Huang, J.H., Lin, Y.R., Chuang, S.T.: Elucidating user behavior of mobile learning: A perspective of the extended technology acceptance model. Electron. Libr. 25(5), 585–598 (2007). doi:10.1108/02640470710829569 Huang, J.H., Lin, Y.R., Chuang, S.T.: Elucidating user behavior of mobile learning: A perspective of the extended technology acceptance model. Electron. Libr. 25(5), 585–598 (2007). doi:10.​1108/​0264047071082956​9
49.
go back to reference Liu, X., Choo, R., Deng, R., Lu, R., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Depend. Secure Comput. (2016). doi:10.1109/TDSC.2016.2536601 Liu, X., Choo, R., Deng, R., Lu, R., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Depend. Secure Comput. (2016). doi:10.​1109/​TDSC.​2016.​2536601
51.
go back to reference Nepal, S., Ranjan, R., Choo, K.K.R.: Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Comput. 2(2), 78–84 (2015)CrossRef Nepal, S., Ranjan, R., Choo, K.K.R.: Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Comput. 2(2), 78–84 (2015)CrossRef
53.
go back to reference Seo, W.J., Islam, R., Khan, M.K., Choo, K.K.R., et al.: A secure cross-domain sip solution for mobile ad hoc network using dynamic clustering. In: International Conference on Security and Privacy in Communication Systems, pp. 649–664. Springer, Heidelberg (2015) Seo, W.J., Islam, R., Khan, M.K., Choo, K.K.R., et al.: A secure cross-domain sip solution for mobile ad hoc network using dynamic clustering. In: International Conference on Security and Privacy in Communication Systems, pp. 649–664. Springer, Heidelberg (2015)
54.
go back to reference Sepehri, M., Cimato, S., Damiani, E., Yeun, C.Y.: Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, pp. 1357–1362. IEEE (2015) Sepehri, M., Cimato, S., Damiani, E., Yeun, C.Y.: Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, pp. 1357–1362. IEEE (2015)
55.
go back to reference Shemaili, M., Yeun, C., Zemerly, M., Mubarak, K.: Enhancing the security of the shrinking generator based lightweight mutual authentication rfid protocol. Int. J. Adv. Logis. 1(1), 33–50 (2012)CrossRef Shemaili, M., Yeun, C., Zemerly, M., Mubarak, K.: Enhancing the security of the shrinking generator based lightweight mutual authentication rfid protocol. Int. J. Adv. Logis. 1(1), 33–50 (2012)CrossRef
56.
go back to reference Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J.: Lightweight mutual authentication protocol for securing RFID applications. Int. J. Internet Technol. Secur. Trans. 2(3–4), 205–221 (2010)CrossRef Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J.: Lightweight mutual authentication protocol for securing RFID applications. Int. J. Internet Technol. Secur. Trans. 2(3–4), 205–221 (2010)CrossRef
57.
go back to reference Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J., Mubarak, K.: A novel hybrid cellular automata based cipher system for internet of things. In: Future Information Technology, pp. 269–276. Springer, Heidelberg (2014). doi:10.1007/978-3-642-40861-8_40 Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J., Mubarak, K.: A novel hybrid cellular automata based cipher system for internet of things. In: Future Information Technology, pp. 269–276. Springer, Heidelberg (2014). doi:10.​1007/​978-3-642-40861-8_​40
62.
go back to reference Wang, S., Cao, Z., Choo, K.K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3), 307–318 (2009)MathSciNetCrossRefMATH Wang, S., Cao, Z., Choo, K.K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3), 307–318 (2009)MathSciNetCrossRefMATH
63.
go back to reference Yeun, C.Y., Han, K., Vo, D.L., Kim, K.: Secure authenticated group key agreement protocol in the manet environment. Inf. Secur. Tech. Rep. 13(3), 158–164 (2008)CrossRef Yeun, C.Y., Han, K., Vo, D.L., Kim, K.: Secure authenticated group key agreement protocol in the manet environment. Inf. Secur. Tech. Rep. 13(3), 158–164 (2008)CrossRef
Metadata
Title
New secure healthcare system using cloud of things
Authors
Ebrahim Al Alkeem
Dina Shehada
Chan Yeob Yeun
M. Jamal Zemerly
Jiankun Hu
Publication date
05-05-2017
Publisher
Springer US
Published in
Cluster Computing / Issue 3/2017
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-017-0872-x

Other articles of this Issue 3/2017

Cluster Computing 3/2017 Go to the issue

Premium Partner