Privacy Protected IoT-Blockchain using ZKP for Healthcare application

被引:0
作者
Yugha, R. [1 ]
Chithra, S. [1 ]
Bhalaji, N. [1 ]
Karthika, S. [1 ]
机构
[1] Anna Univ, Sri Sivasubramaniya Nadar Coll Engn, Dept Informat Technol, Chennai, Tamil Nadu, India
来源
CONTROL ENGINEERING AND APPLIED INFORMATICS | 2022年 / 24卷 / 04期
关键词
Internet of Things; Zero-Knowledge Protocol; Authentication; Blockchain; Cryptography; SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, the concept of the Internet of Things (IoT) is making a 'Thing' in real-world life to be smart by designing the devices to be pervasive, mobile and wearable. The IoT applications may be supported by big data or cloud computing for data analysis. The data analytics has to be performed remotely on the data received from the IoT device. The user has to send highly sensitive personal data to centralized devices for analysis which may lead to serious risks for privacy and security. This can be addressed by IoT systems maintained as peer-to-peer (P2P) systems incorporated with Blockchain technology. Mutual authentication has to be performed to improve the security and trust of IoT applications on a peer to peer basis. This paper addresses two challenges: (i) Mutual authentication is a decentralized P2P IoT environment addressing the tradeoff between privacy and security using Zero-Knowledge Protocol (ZKP) Protocol. ii) The data storage to be secure and for handing it in transparent P2P mode, the Blockchain technology is used for IoT healthcare system. This ZKP protocol has been proved to satisfy the properties of Zero-Knowledge proof systems. The algorithm has been proved to be optimized with respect to space which is one of the limitations of sensor nodes in IoT devices.
引用
收藏
页码:76 / 87
页数:12
相关论文
共 14 条
[1]  
Almuhammadi S, 2004, CEC 2004: IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY, PROCEEDINGS, P299
[2]   The IoT security gap: a look down into the valley between threat models and their implementation [J].
Aufner, Peter .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 19 (01) :3-14
[3]   The improbability that an elliptic curve has subexponential discrete log problem under the Menezes-Okamoto-Vanstone algorithm [J].
Balasubramanian, R ;
Koblitz, N .
JOURNAL OF CRYPTOLOGY, 1998, 11 (02) :141-145
[4]   Security Proofs for Identity-Based Identification and Signature Schemes [J].
Bellare, Mihir ;
Namprempre, Chanathip ;
Neven, Gregory .
JOURNAL OF CRYPTOLOGY, 2009, 22 (01) :1-61
[5]  
Chaum D., 1986, LECT NOTES COMPUT SC, P200
[6]  
Feige U., 1988, Journal of Cryptology, V1, P77, DOI 10.1007/BF02351717
[7]   HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS [J].
FIAT, A ;
SHAMIR, A .
LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 :186-194
[8]  
Hummen R., 2013, Proc. 2nd ACM Work. Hot Top. Wirel. Netw. Secur. Priv. - HotWiSec, V13, P37, DOI [DOI 10.1145/2463183.2463193, 10.1145/2463183]
[9]  
Hummen R, 2014, IEEE INT CONF SENS, P284, DOI 10.1109/SAHCN.2014.6990364
[10]   An efficient two-factor authentication scheme with key agreement for IoT based E-health care application using smart card [J].
Karthigaiveni, M. ;
Indrani, B. .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019,