HIDE-Healthcare IoT Data Trust ManagEment: Attribute centric intelligent privacy approach

被引:5
|
作者
Ullah, Fasee [1 ,2 ]
Pun, Chi-Man [1 ]
Kaiwartya, Omprakash [3 ]
Sadiq, Ali Safaa [3 ]
Lloret, Jaime [4 ]
Ali, Mohammed [5 ]
机构
[1] Univ Macau, Ave Univ, Taipa, Macao, Peoples R China
[2] Sarhad Univ Sci & IT, Dept Comp Sci & IT, Peshawar, Pakistan
[3] Nottingham Trent Univ, Dept Comp Sci, Clifton Lane, Nottingham NG11, England
[4] Univ Politecn Valencia, Inst Invest gest Integrada Zonas Costeras, Camino Vera s-n, Valencia 46022, Spain
[5] King Khalid Univ, Dept Comp Sci, Abha 61421, Saudi Arabia
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2023年 / 148卷
关键词
Internet of Things; Trust; Intelligence; Healthcare; Security; Privacy; ACCESS-CONTROL; ENCRYPTION; EFFICIENT; INTERNET;
D O I
10.1016/j.future.2023.05.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The cloud-based Internet of Things (IoTs) storage enables patients to monitor their health remotely and offers services for physicians of various Medical Institutions (MIs) to diagnose and treat them on time. As a matter of trust, patients are legally expected to hide their real identity and ensure data privacy in the cross-domain of IoT-healthcare, whether it is stored correctly or modified due to external and internal attacks in the cloud. Additionally, physicians treat patients and continuously store duplicated data in cloud storage, which increases the cost of computing. In this context, this paper presents HIDE Healthcare IoT Data privacy trust management framework, focusing on attributes. Patients' attributes are used to encrypt and decrypt sensory data between patients and different entities by incorporating the idea of trustworthy and secure shared keys. HIDE uses an intelligent object's pointer to store the same patient's sensory data in various versions to prevent data duplication, which will help track MIs that treat patients. An intelligent content-based emergency data access control is developed to monitor multiple patient health criticalities in HIDE. The security analysis and experimental evaluation attest to the benefits of the proposed HIDE framework, considering security and privacy metrics.& COPY; 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:326 / 341
页数:16
相关论文
共 50 条
  • [41] D&D: A Distributed and Disposable Approach to Privacy Preserving Data Analytics in User-Centric Healthcare
    Li, Zheng
    Pino, Esteban J.
    2019 IEEE 12TH CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA 2019), 2019, : 176 - 183
  • [42] Holistic big data integrated artificial intelligent modeling to improve privacy and security in data management of smart cities
    Chen, Jie
    Ramanathan, L.
    Alazab, Mamoun
    MICROPROCESSORS AND MICROSYSTEMS, 2021, 81
  • [43] Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoT
    Xiong, Jinbo
    Ren, Jun
    Chen, Lei
    Yao, Zhiqiang
    Lin, Mingwei
    Wu, Dapeng
    Niu, Ben
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 1530 - 1540
  • [44] Oppositional chaos game optimization based clustering with trust based data transmission protocol for intelligent IoT edge systems
    Padmaa, M.
    Jayasankar, T.
    Venkatraman, S.
    Dutta, Ashit Kumar
    Gupta, Deepak
    Shamshirband, Shahab
    Rodrigues, Joel J. P. C.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2022, 164 : 142 - 151
  • [45] Secure medical data management with privacy-preservation and authentication properties in smart healthcare system
    Ji, Yanyan
    Chang, Jinyong
    Ren, Qiaochuan
    Xu, Maozhi
    Xue, Rui
    COMPUTER NETWORKS, 2022, 212
  • [46] Security And Privacy Of Medical Data Challenges For Next-Generation Patient-Centric Healthcare Systems
    Janjic, Vladimir
    Bowles, Juliana
    Belk, Marios
    Pitsillides, Andreas
    ADJUNCT PUBLICATION OF THE 27TH CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION (ACM UMAP '19 ADJUNCT), 2019, : 213 - 214
  • [47] Efficient Cache Consistency Management for Transient IoT Data in Content-Centric Networking
    Feng, Bohao
    Tian, Aleteng
    Yu, Shui
    Li, Jack
    Zhou, Huachun
    Zhang, Hongke
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (15) : 12931 - 12944
  • [48] A privacy-preserving attribute-based framework for IoT identity lifecycle management
    Garcia-Rodriguez, Jesus
    Skarmeta, Antonio
    COMPUTER NETWORKS, 2023, 236
  • [49] Human Data Model: An Approach for IoT Applications Development for Elderly Healthcare
    Makitalo, Niko
    Flores-Martin, Daniel
    Berrocal, Javier
    Murillo, Juan M.
    Mikkonen, Tommi
    GERONTECHNOLOGY III, IWOG 2020, 2021, : 111 - 120
  • [50] Data Security and Privacy using Data Partition and Centric key management in Cloud
    Patel, Krunal
    Kumar, Sendhil K. S.
    Singh, Navneet
    Parikh, Kushang
    Jaisankar, N.
    2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,