Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems

被引:13
作者
Chen, Chi-Yuan [1 ]
Wu, Hsin-Min [2 ]
Wang, Lei [3 ]
Yu, Chia-Mu [4 ]
机构
[1] Natl Ilan Univ, Dept Comp Sci & Informat Engn, Yilan, Taiwan
[2] Yuan Ze Univ, Dept Comp Sci & Engn, Taoyuan, Taiwan
[3] Chinese Acad Sci, Dept Biomed Engn, Shenzhen Inst Adv Technol, Beijing, Peoples R China
[4] Natl Chung Hsing Univ, Dept Comp Sci & Engn, Taichung, Taiwan
关键词
Integrity preservation; Healthcare; Sensors; Cloud computing; Homomorphic encryption; PRIVACY;
D O I
10.1016/j.comnet.2017.05.032
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we address the problem of integrity protection for data streaming in cloud-assisted health-care sensor systems. First, we propose a novel data structure, called the arithmetic Merkle tree (AMT), as a candidate method for ensuring the flexibility of the tree structure. However, AMT is flawed by one-wayness and therefore cannot be applied directly. We consider integrating homomorphic encryption with the AMT, and propose two solutions, called the PAMT (partially homomorphic encryption-based AMT) and the FAMT (fully homomorphic encryption-based AMT). Our proposed PAMT outperforms the existing solution because of the implementation of widely used software that optimizes partially homomorphic encryption. However, although the design of our proposed FAMT includes fully homomorphic encryption, in the case of data archival applications, transferal of the computation burden to the cloud server renders it very lightweight. The theoretical analysis and simulation results also confirm the efficiency of our PAMT and FAMT solutions. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:472 / 480
页数:9
相关论文
共 17 条
  • [1] Benabbas S., 2011, ANN C ADV CRYPT CRYP
  • [2] Privacy- and Integrity-Preserving Range Queries in Sensor Networks
    Chen, Fei
    Liu, Alex X.
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (06) : 1774 - 1787
  • [3] Gentry C., 2009, ACM STOC
  • [4] Jost Christine, 2015, Cryptol. ePrint Arch.
  • [5] Efficient verifiable data streaming
    Kim, Kee Sung
    Jeong, Ik Rae
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4013 - 4018
  • [6] Wireless Sensor Networks for Healthcare
    Ko, JeongGil
    Lu, Chenyang
    Srivastava, Mani B.
    Stankovic, John A.
    Terzis, Andreas
    Welsh, Matt
    [J]. PROCEEDINGS OF THE IEEE, 2010, 98 (11) : 1947 - 1960
  • [7] Krupp J., 2016, INT C THEOR PRACT PU
  • [8] MYKLETUN E, 2004, NETW DISTR SYST SEC
  • [9] Paillier P., 1999, PUBLIC KEY CRYPTOSYS
  • [10] Pang H., 2005, ACM INT C MAN DAT SI