Skip to main content
Erschienen in: World Wide Web 1/2018

06.04.2017

An infrastructure framework for privacy protection of community medical internet of things

Transmission protection, storage protection and access control

verfasst von: Fulong Chen, Yonglong Luo, Ji Zhang, Junru Zhu, Ziyang Zhang, Chuanxin Zhao, Taochun Wang

Erschienen in: World Wide Web | Ausgabe 1/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As a kind of medical service around people, community health care is closely related to peoples lives, and thus it has also been placed higher requirements. In the face of growing community medical needs, the construction and development of community medical Internet of things is imminent. Subsequently, massive multi-type of medical data which contain all kinds of user identity data, various types of vital signs data and other sensitive information are generated. Such a large scale of data in the transmission, storage and access process is facing the risk of data leakage. To effectively protect the privacy information of patients, an infrastructure framework for privacy protection of community medical Internet of things is proposed. It includes transmission protection based on multi-path asymmetric encryption fragment transmission mechanism, storage protection using distributed symmetric encryption cloud storage scheme and access control with identity authentication and dynamic access authorization. Through theoretical analysis and simulation experiments, it is proved that the community medical data can be effectively protected.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)CrossRefMATH Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)CrossRefMATH
2.
Zurück zum Zitat Beato, F., Meul, S., Preneel, B.: Practical identity-based private sharing for online social networks. Comput. Commun. 73, 243–250 (2016)CrossRef Beato, F., Meul, S., Preneel, B.: Practical identity-based private sharing for online social networks. Comput. Commun. 73, 243–250 (2016)CrossRef
3.
Zurück zum Zitat Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption IEEE Symposium on Security and Privacy (2007) Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption IEEE Symposium on Security and Privacy (2007)
4.
Zurück zum Zitat Chen, M., Qian, Y., Mao, S., et al.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)CrossRef Chen, M., Qian, Y., Mao, S., et al.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)CrossRef
5.
Zurück zum Zitat Ding, Z., Li, J., Bo, F.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009) Ding, Z., Li, J., Bo, F.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)
6.
Zurück zum Zitat Du, W., Deng, J., Han, Y.S., et al.: A pairwise key pre-distribution scheme for wireless sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 42–51 (2003) Du, W., Deng, J., Han, Y.S., et al.: A pairwise key pre-distribution scheme for wireless sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 42–51 (2003)
7.
Zurück zum Zitat Forsstrom, S., Kanter, T., Osterberg, P.: Ubiquitous secure interactions with intelligent artifacts on the internet-of-things IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), pp 1520–1524 (2012) Forsstrom, S., Kanter, T., Osterberg, P.: Ubiquitous secure interactions with intelligent artifacts on the internet-of-things IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), pp 1520–1524 (2012)
8.
Zurück zum Zitat Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 516–525 (2010) Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 516–525 (2010)
9.
Zurück zum Zitat Hong, Z.Z.: Research on electronic health records of community residents Fudan University (2008) Hong, Z.Z.: Research on electronic health records of community residents Fudan University (2008)
10.
Zurück zum Zitat Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011) Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011)
11.
Zurück zum Zitat Huang, R.W., Gui, X.L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chinese J. Comput. 34(12), 2391–2402 (2011)CrossRef Huang, R.W., Gui, X.L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chinese J. Comput. 34(12), 2391–2402 (2011)CrossRef
12.
Zurück zum Zitat Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunics password authentication schemes. IEICE Trans. Commun. 85(4), 823–825 (2002) Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunics password authentication schemes. IEICE Trans. Commun. 85(4), 823–825 (2002)
13.
Zurück zum Zitat Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef
14.
Zurück zum Zitat Kamara, S., Lauter, K.: Cryptographic cloud storage Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp 136–149 (2010) Kamara, S., Lauter, K.: Cryptographic cloud storage Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp 136–149 (2010)
15.
Zurück zum Zitat Kothmayr, T., Schmitt, C., Hu, W., et al.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication IEEE 37th Conference on Local Computer Networks Workshops, pp 956–963 (2012) Kothmayr, T., Schmitt, C., Hu, W., et al.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication IEEE 37th Conference on Local Computer Networks Workshops, pp 956–963 (2012)
16.
17.
Zurück zum Zitat Ma, W.J.: Research and application on security authentication technologies in internet of things Shandong University (2011) Ma, W.J.: Research and application on security authentication technologies in internet of things Shandong University (2011)
18.
Zurück zum Zitat Maeda, T., Sato, K., Muraoka, Y., et al.: RFID System and RFID tag. U.S. Patent 8274367 (2012) Maeda, T., Sato, K., Muraoka, Y., et al.: RFID System and RFID tag. U.S. Patent 8274367 (2012)
19.
Zurück zum Zitat Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. Journal of Tsinghua University (Sci & Tech) 51(10), 1357–1362 (2011) Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. Journal of Tsinghua University (Sci & Tech) 51(10), 1357–1362 (2011)
20.
Zurück zum Zitat Ning, H.S., Xu, Q.Y.: Research on global internet of things developments and its lonstruction in China. Acta Electronica Sinica 38(11), 2590–2599 (2010) Ning, H.S., Xu, Q.Y.: Research on global internet of things developments and its lonstruction in China. Acta Electronica Sinica 38(11), 2590–2599 (2010)
21.
Zurück zum Zitat Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Comput. Commun. 29(5), 660C667 (2006)CrossRef Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Comput. Commun. 29(5), 660C667 (2006)CrossRef
22.
Zurück zum Zitat Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure atrributebased systems Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 99–112 (2006) Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure atrributebased systems Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 99–112 (2006)
23.
Zurück zum Zitat Song, Z., Zhang, Y., Wu, C.: A reliable transmission scheme for security and protection system based on internet of things IET International Conference on Communication Technology & Application, pp 806–810 (2011) Song, Z., Zhang, Y., Wu, C.: A reliable transmission scheme for security and protection system based on internet of things IET International Conference on Communication Technology & Application, pp 806–810 (2011)
24.
Zurück zum Zitat Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010). A Publication of the IEEE Engineering in Medicine & Biology SocietyCrossRef Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010). A Publication of the IEEE Engineering in Medicine & Biology SocietyCrossRef
25.
Zurück zum Zitat Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd International Conference on Very Large Data Base, pp 123–134 (2007) Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd International Conference on Very Large Data Base, pp 123–134 (2007)
26.
Zurück zum Zitat Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)CrossRef Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)CrossRef
27.
Zurück zum Zitat Wang, B., Zhang, H., Wang, Z, et al.: A secure mutual password authentication scheme with user anonymity. Geomatics & Information Science of Wuhan University 33 (10), 1073–1075 (2008) Wang, B., Zhang, H., Wang, Z, et al.: A secure mutual password authentication scheme with user anonymity. Geomatics & Information Science of Wuhan University 33 (10), 1073–1075 (2008)
28.
Zurück zum Zitat Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp 55–66 (2009) Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp 55–66 (2009)
29.
Zurück zum Zitat Wu, C.K.: An overview on the security techniques and challenges of the internet of things. Journal of Cryptologic Research 2(1), 40–53 (2015) Wu, C.K.: An overview on the security techniques and challenges of the internet of things. Journal of Cryptologic Research 2(1), 40–53 (2015)
30.
Zurück zum Zitat Wu, Z.Q., Zhou, Y.W., Ma, J.F.: A secure transmission model for internet of things. Chinese J. Comput. 34(8), 1351–1364 (2011)CrossRef Wu, Z.Q., Zhou, Y.W., Ma, J.F.: A secure transmission model for internet of things. Chinese J. Comput. 34(8), 1351–1364 (2011)CrossRef
31.
Zurück zum Zitat Xie, W.J.: A secure communication scheme based on multipath transportation for the internet of things South China University of Technology (2013) Xie, W.J.: A secure communication scheme based on multipath transportation for the internet of things South China University of Technology (2013)
32.
Zurück zum Zitat Yong-Hong, Y.U., Bai, W.Y.: Enforcing data privacy and user privacy over outsourced database service. Application Research of Computers 6(3), 404–412 (2011) Yong-Hong, Y.U., Bai, W.Y.: Enforcing data privacy and user privacy over outsourced database service. Application Research of Computers 6(3), 404–412 (2011)
33.
Zurück zum Zitat Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. - IEEE INFOCOM 29(16), 1–9 (2010) Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. - IEEE INFOCOM 29(16), 1–9 (2010)
34.
Zurück zum Zitat Yuen, T.H., Chow, S.S.M, Zhang, Y., et al.: Identity-based encryption resilient to continual auxiliary leakage Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp 117–134 (2012) Yuen, T.H., Chow, S.S.M, Zhang, Y., et al.: Identity-based encryption resilient to continual auxiliary leakage Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp 117–134 (2012)
35.
Zurück zum Zitat Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Dev. 48(7), 1155–1167 (2011) Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Dev. 48(7), 1155–1167 (2011)
36.
Zurück zum Zitat Zhang, J., Li, H., Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. doi:10.1109/TDSC.2015.2483503 (2015) Zhang, J., Li, H., Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. doi:10.​1109/​TDSC.​2015.​2483503 (2015)
37.
38.
Zurück zum Zitat Zhang, Y., Shen, Y., Wang, H., Yong, J., Jiang, X.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)CrossRef Zhang, Y., Shen, Y., Wang, H., Yong, J., Jiang, X.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)CrossRef
Metadaten
Titel
An infrastructure framework for privacy protection of community medical internet of things
Transmission protection, storage protection and access control
verfasst von
Fulong Chen
Yonglong Luo
Ji Zhang
Junru Zhu
Ziyang Zhang
Chuanxin Zhao
Taochun Wang
Publikationsdatum
06.04.2017
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 1/2018
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0455-z

Weitere Artikel der Ausgabe 1/2018

World Wide Web 1/2018 Zur Ausgabe

Premium Partner