Blockchain-based cryptographic approach for privacy enabled data integrity model for IoT healthcare

被引:4
作者
Chandol, Mohan Kumar [1 ,3 ]
Rao, M. Kameswara [2 ]
机构
[1] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram, Andhra Pradesh, India
[2] Koneru Lakshmaiah Educ Fdn, Dept ECM, Vaddeswaram, Andhra Pradesh, India
[3] Koneru Lakshmaiah Educ Fdn, Dept CSE, Vaddeswaram 522302, Andhra Pradesh, India
关键词
Blockchain; Privacy; IoT healthcare; Cryptography; Data integrity; INTERNET; SECURITY;
D O I
10.1080/0952813X.2023.2183268
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The development of Internet of Things (IoT) technologies allowed the rapid generation of massive amounts of data by people. Although moving data to a server is a useful solution for storage, the owner of the data loses control, which results in security lapses. An efficient method for cloud-based data models is data integrity. In order to protect data privacy in IoT healthcare, this paper develops a data integrity technique. The Data Owner, IoT server, Key Generator Center, and Auditor are the four entities that make up this model. Here, the ability to verify the accuracy of the outsourced data is present in the auditor, data owner, and IoT server. The setup, storage, and verification phase are the three stages that make up the data integrity model. Here, the proposed Taylor-based Border Collie Cat optimisation is used to generate integrity keys in the best possible way. Here, the Taylor series and Border Collie Cat optimisation (BCCO) are combined to derive the proposed Taylor-based BCCO. Python is used to carry out the proposed strategy's implementation. The proposed method offered enhanced performance with highest normalised variance of 0.710, highest conditional privacy of 2.880, and smallest computation time of 0.179 sec using heart disease dataset.
引用
收藏
页码:53 / 74
页数:22
相关论文
共 37 条
[1]  
Alazeb Abdulwahab, 2019, Security, Privacy, and Anonymity in Computation, Communication, and Storage. 12th International Conference, SpaCCS 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11611), P63, DOI 10.1007/978-3-030-24907-6_6
[2]  
Almulhim M, 2018, INT CONF ADV COMMUN, P481, DOI 10.23919/ICACT.2018.8323802
[3]  
Alzubi A., 2021, J Posit Psychol Wellbeing, V5, P369
[4]   Low Power Data Integrity in IoT Systems [J].
Aman, Muhammad Naveed ;
Sikdar, Biplab ;
Chua, Kee Chaing ;
Ali, Anwar .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :3102-3113
[5]  
Ashton K., 2009, RFID journal, V22, P97
[6]  
Bajaj N. A. S., 2020, ASIA PAC EDUC REV, V6, P7
[7]  
Bhatnagar N, 2007, STORAGE SS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON STORAGE SECURITY AND SURVIVABILITY, P19
[8]  
Boussada R, 2016, P 2016 IEEEACS 13 IN, P1
[9]   Privacy-preserving aware data transmission for IoT-based e-health [J].
Boussada, Rihab ;
Hamdane, Balkis ;
Elhdhili, Mohamed Elhoucine ;
Saidane, Leila Azouz .
COMPUTER NETWORKS, 2019, 162
[10]  
Boussada R, 2018, INT WIREL COMMUN, P817, DOI 10.1109/IWCMC.2018.8450374