New secure healthcare system using cloud of things

被引:21
作者
Al Alkeem, Ebrahim [1 ]
Shehada, Dina [1 ]
Yeun, Chan Yeob [1 ]
Zemerly, M. Jamal [1 ]
Hu, Jiankun [2 ]
机构
[1] Khalifa Unvers Sci & Technol, Elect & Comp Engn, POB 127788, Abu Dhabi, U Arab Emirates
[2] UNSW Canberra, Australian Def Force Acad, Sch Engn & Informat Technol, POB 7916, Canberra, ACT 2610, Australia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2017年 / 20卷 / 03期
关键词
Security; Privacy; Internet of Things; Wireless sensor network; Wireless body area networks; Role based access control; Cloud of things; ADVERSARY MODEL; PRIVACY; INTERNET; PROTECTION; NETWORKS;
D O I
10.1007/s10586-017-0872-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern healthcare services are serving patients needs by using new technologies such as wearable devices or cloud of things. The new technology provides more facilities and enhancements to the existing healthcare services as it allows more flexibility in terms of monitoring patients records and remotely connecting with the patients via cloud of things. However, there are many security issues such as privacy and security of healthcare data which need to be considered once we introduce wearable devices to the healthcare service. Although some of the security issues were addressed by some researchers in the literature, they mainly addressed cloud of things security or healthcare security separately and their work still suffers from limited security protection and vulnerabilities to some security attacks. The proposed new healthcare system combines security of both healthcare and cloud of things technologies. It also addresses most of the security challenges that might face the healthcare services such as the man in the middle (MITM), eavesdropping, replay, repudiation, and modification attacks. Scyther verification tool was also used to verify the robustness and correctness of the proposed system.
引用
收藏
页码:2211 / 2229
页数:19
相关论文
共 65 条
  • [1] A Review on the State-of-the-Art Privacy-Preserving Approaches in the e-Health Clouds
    Abbas, Assad
    Khan, Samee U.
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (04) : 1431 - 1441
  • [2] Lightweight secure storage model with fault-tolerance in cloud environment
    Ahmed, Muhra
    Vu, Quang Hieu
    Asal, Rasool
    Al Muhairi, Hassan
    Yeun, Chan Yeob
    [J]. ELECTRONIC COMMERCE RESEARCH, 2014, 14 (03) : 271 - 291
  • [3] Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications
    Al Ameen, Moshaddique
    Liu, Jingwei
    Kwak, Kyungsup
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2012, 36 (01) : 93 - 101
  • [4] Al-Qutayri M., 2010, INT J INTERNET TECHN, V2, P380, DOI DOI 10.1504/IJITST.2010.03741
  • [5] AlAlkeem E., 2015 10 INT C INT TE, P70
  • [6] Alkeem E. A., 2014, LECT NOTES ELECT ENG, P363
  • [7] Almulla SA, 2011, COMM COM INF SC, V184, P75
  • [8] [Anonymous], 2015, INT C SEC PRIV COMM
  • [9] Appari Ajit, 2010, International Journal of Internet and Enterprise Management, V6, P279, DOI 10.1504/IJIEM.2010.035624
  • [10] Azfar A., 2015, ARXIV150502905