A privacy-preserving cryptosystem for IoT E-healthcare

被引:108
作者
Hamza, Rafik [1 ,2 ]
Yan, Zheng [3 ,4 ]
Muhammad, Khan [5 ]
Bellavista, Paolo [6 ]
Titouna, Faiza [7 ]
机构
[1] Sonatrach, Direct Cent Rech & Dev DC R&D, Ave 1 Novembre, Boumerdes 35000, Algeria
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Peoples R China
[3] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[4] Aalto Univ, Dept Commun & Networking, Espoo, Finland
[5] Sejong Univ, Dept Software, Seoul 143747, South Korea
[6] Univ Bologna, Dept Comp Sci & Engn, Bologna, Italy
[7] Univ Batna, Dept Comp Sci, Batna 2, Algeria
基金
芬兰科学院;
关键词
Privacy protection; Cryptosystem; Privacy and security; E-healthcare; Encryption; SEQUENCE GENERATOR; IMAGE; ALGORITHM;
D O I
10.1016/j.ins.2019.01.070
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy preservation has become a prerequisite for modern applications in the cloud, social media, Internet of things (IoT), and E- healthcare systems. In general, health and medical data contain images and medical information about the patients and such personal data should be kept confidential in order to maintain the patients' privacy. Due to limitations in digital data properties, traditional encryption schemes over textual and structural one-dimension data cannot be applied directly to e-health data. In addition, when personal data are sent over the open channels, patients may lose privacy of data contents. Hence, a secure lightweight keyframe extraction method is highly required to ensure timely, correct, and privacy-preserving e-health services. Besides this, it is inherently difficult to achieve a satisfied level of security in a cost-effective way while considering the constraints of real-time e-health applications. In this paper, we propose a privacy preserving chaos-based encryption cryptosystem for patients' privacy protection. The proposed cryptosystem can protect patient's images from a compromised broker. In particular, we propose a fast probabilistic cryptosystem to secure medical keyframes that are extracted from wireless capsule endoscopy procedure using a prioritization method. The encrypted images produced by our cryptosystem exhibits randomness behavior, which guarantee computational efficiency as well as a highest level of security for the keyframes against various attacks. Furthermore, it processes the medical data without leaking any information, thus preserving patient's privacy by allowing only authorized users for decryption. The experimental results and security analysis from different perspectives verify the excellent performance of our encryption cryptosystem compared to other recent encryption schemes. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:493 / 510
页数:18
相关论文
共 49 条
[11]   Counting-based secret sharing technique for multimedia applications [J].
Gutub, Adnan ;
Al-Juaid, Nouf ;
Khan, Esam .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (05) :5591-5619
[12]   Hybrid Crypto Hardware Utilizing Symmetric-Key & Public-Key Cryptosystems [J].
Gutub, Adnan Abdul-Aziz ;
Khan, Farhan Abdul-Aziz .
2012 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2012, :116-121
[13]   Hash Based Encryption for Keyframes of Diagnostic Hvsteroscopy [J].
Hamza, Rafik ;
Muhammad, Khan ;
Arunkumar, N. ;
Ramirez-Gonzalez, Gustavo .
IEEE ACCESS, 2018, 6 :60160-60170
[14]   Secure video summarization framework for personalized wireless capsule endoscopy [J].
Hamza, Rafik ;
Muhammad, Khan ;
Lv, Zhihan ;
Titouna, Faiza .
PERVASIVE AND MOBILE COMPUTING, 2017, 41 :436-450
[16]   A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map [J].
Hamza, Rafik ;
Titouna, Faiza .
INFORMATION SECURITY JOURNAL, 2016, 25 (4-6) :162-179
[17]   Pseudorandom sequence generator based on the Chen chaotic system [J].
Hu, HanPing ;
Liu, LingFeng ;
Ding, NaiDa .
COMPUTER PHYSICS COMMUNICATIONS, 2013, 184 (03) :765-768
[18]   Image encryption using 2D Logistic-adjusted-Sine map [J].
Hua, Zhongyun ;
Zhou, Yicong .
INFORMATION SCIENCES, 2016, 339 :237-253
[19]   Multi chaotic systems based pixel shuffle for image encryption [J].
Huang, C. K. ;
Nien, H. H. .
OPTICS COMMUNICATIONS, 2009, 282 (11) :2123-2127
[20]   On the dynamical degradation of digital piecewise linear chaotic maps [J].
Li, SJ ;
Chen, GR ;
Mou, XQ .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2005, 15 (10) :3119-3151