Secure Health Data Sharing for Medical Cyber-Physical Systems for the Healthcare 4.0

被引:122
作者
Qiu, Han [1 ]
Qiu, Meikang [2 ]
Liu, Meiqin [3 ]
Memmi, Gerard [1 ]
机构
[1] Telecom Paris, Dept Comp Sci & Networks, F-91120 Palaiseau, France
[2] Columbia Univ, Dept Elect Engn, New York, NY 10027 USA
[3] Zhejiang Univ, Coll Elect Engn, Hangzhou 310007, Peoples R China
基金
中国国家自然科学基金;
关键词
Cloud computing; Data privacy; Servers; Safety; Medical services; Encryption; Medical devices; Data security; medical CPS; health; 4; 0; selective encryption; data privacy;
D O I
10.1109/JBHI.2020.2973467
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The recent spades of cyber attacks have compromised end-users' data security and privacy in Medical Cyber-Physical Systems (MCPS) in the era of Health 4.0. Traditional standard encryption algorithms for data protection are designed based on a viewpoint of system architecture rather than a viewpoint of end-users. As such encryption algorithms are transferring the protection on the data to the protection on the keys, data safety, and privacy will be compromised once the key is exposed. In this paper, we propose a secure data storage and sharing method consisted of a selective encryption algorithm combined with fragmentation and dispersion to protect the data safety and privacy even when both transmission media (e.g. cloud servers) and keys are compromised. This method is based on a user-centric design that protects the data on a trusted device such as the end-users' smartphone and lets the end-user control the access for data sharing. We also evaluate the performance of the algorithm on a smartphone platform to prove efficiency.
引用
收藏
页码:2499 / 2505
页数:7
相关论文
共 25 条
[1]  
[Anonymous], 2013, The design of Rijndael: AES-the advanced encryption standard
[2]  
[Anonymous], 2018, P OFF NAT COORD HLTH
[3]  
[Anonymous], 2017, HLTH 4 0 VIRTUALIZAT
[4]   Women Versus Men with Chronic Atrial Fibrillation: Insights from the Standard Versus Atrial Fibrillation spEcific managemenT studY (SAFETY) [J].
Ball, Jocasta ;
Carrington, Melinda J. ;
Wood, Kathryn A. ;
Stewart, Simon .
PLOS ONE, 2013, 8 (05)
[5]  
Croft N. J., 2005, P SO AFR TEL NETW AP, P26
[6]   The Tangled Web of Password Reuse [J].
Das, Anupam ;
Bonneau, Joseph ;
Caesar, Matthew ;
Borisov, Nikita ;
Wang, XiaoFeng .
21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
[7]   Medical cyber-physical systems: A survey [J].
Dey, Nilanjan ;
Ashour, Amira S. ;
Shi, Fuqian ;
Fong, Simon James ;
Tavares, Joao Manuel R. S. .
JOURNAL OF MEDICAL SYSTEMS, 2018, 42 (04)
[8]   Privacy-Preserving Energy Trading Using Consortium Blockchain in Smart Grid [J].
Gai, Keke ;
Wu, Yulu ;
Zhu, Liehuang ;
Qiu, Meikang ;
Shen, Meng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (06) :3548-3558
[9]  
Gueron S., 2011, Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations (ITNG), P354, DOI 10.1109/ITNG.2011.69
[10]   A glimpse of 21st century care [J].
Hambleton, Steve .
AUSTRALIAN JOURNAL OF GENERAL PRACTICE, 2018, 47 (10) :670-673