New secure healthcare system using cloud of things

被引:21
作者
Al Alkeem, Ebrahim [1 ]
Shehada, Dina [1 ]
Yeun, Chan Yeob [1 ]
Zemerly, M. Jamal [1 ]
Hu, Jiankun [2 ]
机构
[1] Khalifa Unvers Sci & Technol, Elect & Comp Engn, POB 127788, Abu Dhabi, U Arab Emirates
[2] UNSW Canberra, Australian Def Force Acad, Sch Engn & Informat Technol, POB 7916, Canberra, ACT 2610, Australia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2017年 / 20卷 / 03期
关键词
Security; Privacy; Internet of Things; Wireless sensor network; Wireless body area networks; Role based access control; Cloud of things; ADVERSARY MODEL; PRIVACY; INTERNET; PROTECTION; NETWORKS;
D O I
10.1007/s10586-017-0872-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern healthcare services are serving patients needs by using new technologies such as wearable devices or cloud of things. The new technology provides more facilities and enhancements to the existing healthcare services as it allows more flexibility in terms of monitoring patients records and remotely connecting with the patients via cloud of things. However, there are many security issues such as privacy and security of healthcare data which need to be considered once we introduce wearable devices to the healthcare service. Although some of the security issues were addressed by some researchers in the literature, they mainly addressed cloud of things security or healthcare security separately and their work still suffers from limited security protection and vulnerabilities to some security attacks. The proposed new healthcare system combines security of both healthcare and cloud of things technologies. It also addresses most of the security challenges that might face the healthcare services such as the man in the middle (MITM), eavesdropping, replay, repudiation, and modification attacks. Scyther verification tool was also used to verify the robustness and correctness of the proposed system.
引用
收藏
页码:2211 / 2229
页数:19
相关论文
共 65 条
  • [31] Exfiltrating data from Android devices
    Do, Quang
    Martini, Ben
    Choo, Kim-Kwang Raymond
    [J]. COMPUTERS & SECURITY, 2015, 48 : 74 - 91
  • [32] Doukas C., 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2012), P922, DOI 10.1109/IMIS.2012.26
  • [33] Exploring the use of a mobile robot as an imitation agent with children with low-functioning autism
    Duquette, Audrey
    Michaud, Francois
    Mercier, Henri
    [J]. AUTONOMOUS ROBOTS, 2008, 24 (02) : 147 - 157
  • [34] Elmisery A. M., COMP SOFTW APPL C WO, P140
  • [35] Survey on key revocation mechanisms in wireless sensor networks
    Ge, Mengmeng
    Choo, Kim-Kwang Raymond
    Wu, Huai
    Yu, Yong
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 63 : 24 - 38
  • [36] Ge MM, 2014, LECT NOTES COMPUT SC, V8792, P462, DOI 10.1007/978-3-319-11698-3_35
  • [37] BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network
    Gope, Prosanta
    Hwang, Tzonelih
    [J]. IEEE SENSORS JOURNAL, 2016, 16 (05) : 1368 - 1376
  • [38] Gostin L O, 1995, Health Matrix Clevel, V5, P1
  • [39] Privacy-Preserving Health Data Collection for Preschool Children
    Guan, Shaopeng
    Zhang, Yuan
    Ji, Yue
    [J]. COMPUTATIONAL AND MATHEMATICAL METHODS IN MEDICINE, 2013, 2013
  • [40] Gul O, 2012, 2012 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGIES, APPLICATIONS AND MANAGEMENT (ICCCTAM), P60, DOI 10.1109/ICCCTAM.2012.6488072