A privacy-preserving cryptosystem for IoT E-healthcare

被引:108
作者
Hamza, Rafik [1 ,2 ]
Yan, Zheng [3 ,4 ]
Muhammad, Khan [5 ]
Bellavista, Paolo [6 ]
Titouna, Faiza [7 ]
机构
[1] Sonatrach, Direct Cent Rech & Dev DC R&D, Ave 1 Novembre, Boumerdes 35000, Algeria
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[4] Aalto Univ, Dept Commun & Networking, Espoo, Finland
[5] Sejong Univ, Dept Software, Seoul 143747, South Korea
[6] Univ Bologna, Dept Comp Sci & Engn, Bologna, Italy
[7] Univ Batna, Dept Comp Sci, Batna 2, Algeria
基金
芬兰科学院;
关键词
Privacy protection; Cryptosystem; Privacy and security; E-healthcare; Encryption; SEQUENCE GENERATOR; IMAGE; ALGORITHM;
D O I
10.1016/j.ins.2019.01.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy preservation has become a prerequisite for modern applications in the cloud, social media, Internet of things (IoT), and E- healthcare systems. In general, health and medical data contain images and medical information about the patients and such personal data should be kept confidential in order to maintain the patients' privacy. Due to limitations in digital data properties, traditional encryption schemes over textual and structural one-dimension data cannot be applied directly to e-health data. In addition, when personal data are sent over the open channels, patients may lose privacy of data contents. Hence, a secure lightweight keyframe extraction method is highly required to ensure timely, correct, and privacy-preserving e-health services. Besides this, it is inherently difficult to achieve a satisfied level of security in a cost-effective way while considering the constraints of real-time e-health applications. In this paper, we propose a privacy preserving chaos-based encryption cryptosystem for patients' privacy protection. The proposed cryptosystem can protect patient's images from a compromised broker. In particular, we propose a fast probabilistic cryptosystem to secure medical keyframes that are extracted from wireless capsule endoscopy procedure using a prioritization method. The encrypted images produced by our cryptosystem exhibits randomness behavior, which guarantee computational efficiency as well as a highest level of security for the keyframes against various attacks. Furthermore, it processes the medical data without leaking any information, thus preserving patient's privacy by allowing only authorized users for decryption. The experimental results and security analysis from different perspectives verify the excellent performance of our encryption cryptosystem compared to other recent encryption schemes. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:493 / 510
页数:18
相关论文
共 49 条
[1]  
Al-Juaid NA., 2018, J INFORM SECURITY CY, V1, P5, DOI [10.26735/16587790.2018.006, DOI 10.26735/16587790.2018.006]
[2]  
Al-Otaibi Nouf A., 2014, Lecture Notes on Information Theory, V2, P151, DOI 10.12720/lnit.2.2.151-157
[3]  
[Anonymous], 2017, J RES ENG APPL SCI
[4]  
[Anonymous], 2014, INT C ADV ENG TECHN
[5]   High-precision floating-point arithmetic in scientific computation [J].
Bailey, DH .
COMPUTING IN SCIENCE & ENGINEERING, 2005, 7 (03) :54-61
[6]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[7]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[8]   Privacy-Preserving Data Processing with Flexible Access Control [J].
Ding, Wenxiu ;
Yan, Zheng ;
Deng, Robert H. .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2020, 17 (02) :363-376
[9]   Encrypted data processing with Homomorphic Re-Encryption [J].
Ding, Wenxiu ;
Yan, Zheng ;
Deng, Robert H. .
INFORMATION SCIENCES, 2017, 409 :35-55
[10]   Novel Approach for fast Compressed Hybrid color image Cryptosystem [J].
Gupta, Kamlesh ;
Silakari, Sanjay .
ADVANCES IN ENGINEERING SOFTWARE, 2012, 49 :29-42