New secure healthcare system using cloud of things

被引:22
作者
Al Alkeem, Ebrahim [1 ]
Shehada, Dina [1 ]
Yeun, Chan Yeob [1 ]
Zemerly, M. Jamal [1 ]
Hu, Jiankun [2 ]
机构
[1] Khalifa Unvers Sci & Technol, Elect & Comp Engn, POB 127788, Abu Dhabi, U Arab Emirates
[2] UNSW Canberra, Australian Def Force Acad, Sch Engn & Informat Technol, POB 7916, Canberra, ACT 2610, Australia
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2017年 / 20卷 / 03期
关键词
Security; Privacy; Internet of Things; Wireless sensor network; Wireless body area networks; Role based access control; Cloud of things; ADVERSARY MODEL; PRIVACY; INTERNET; PROTECTION; NETWORKS;
D O I
10.1007/s10586-017-0872-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern healthcare services are serving patients needs by using new technologies such as wearable devices or cloud of things. The new technology provides more facilities and enhancements to the existing healthcare services as it allows more flexibility in terms of monitoring patients records and remotely connecting with the patients via cloud of things. However, there are many security issues such as privacy and security of healthcare data which need to be considered once we introduce wearable devices to the healthcare service. Although some of the security issues were addressed by some researchers in the literature, they mainly addressed cloud of things security or healthcare security separately and their work still suffers from limited security protection and vulnerabilities to some security attacks. The proposed new healthcare system combines security of both healthcare and cloud of things technologies. It also addresses most of the security challenges that might face the healthcare services such as the man in the middle (MITM), eavesdropping, replay, repudiation, and modification attacks. Scyther verification tool was also used to verify the robustness and correctness of the proposed system.
引用
收藏
页码:2211 / 2229
页数:19
相关论文
共 65 条
[41]   Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds [J].
Guo, Cheng ;
Zhuang, Ruhan ;
Jie, Yingmo ;
Ren, Yizhi ;
Wu, Ting ;
Choo, Kim-Kwang Raymond .
JOURNAL OF MEDICAL SYSTEMS, 2016, 40 (11)
[42]   Secure and efficient public key management in next generation mobile networks [J].
Han, Kyusuk ;
Mun, Hyeran ;
Shon, Taeshik ;
Yeun, Chan Yeob ;
Park, James J. .
PERSONAL AND UBIQUITOUS COMPUTING, 2012, 16 (06) :677-685
[43]  
Harding K, 2000, Br J Nurs, V9, ppassim
[44]   A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network [J].
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Wang, Lina ;
Choo, Kim-Kwang Raymond ;
Vinel, Alexey .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (04) :633-645
[45]   An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography [J].
He, Debiao ;
Zeadally, Sherali .
IEEE INTERNET OF THINGS JOURNAL, 2015, 2 (01) :72-83
[46]  
Hiremath S, 2014, 2014 EAI 4TH INTERNATIONAL CONFERENCE ON WIRELESS MOBILE COMMUNICATION AND HEALTHCARE (MOBIHEALTH), P304, DOI [10.1109/MOBIHEALTH.2014.7015971, 10.4108/icst.mobihealth.2014.257440]
[47]   A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations [J].
Hu, Jiankun ;
Chen, Hsiao-Hwa ;
Hou, Ting-Wei .
COMPUTER STANDARDS & INTERFACES, 2010, 32 (5-6) :274-280
[48]   Elucidating user behavior of mobile learning - A perspective of the extended technology acceptance model [J].
Huang, Jen-Hung ;
Lin, Yu-Ru ;
Chuang, Shu-Ting .
ELECTRONIC LIBRARY, 2007, 25 (05) :585-598
[49]   Privacy preservation and information security protection for patients' portable electronic health records [J].
Huang, Lu-Chou ;
Chu, Huei-Chung ;
Lien, Chung-Yueh ;
Hsiao, Chia-Hung ;
Kao, Tsair .
COMPUTERS IN BIOLOGY AND MEDICINE, 2009, 39 (09) :743-750
[50]   Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers [J].
Liu, Ximeng ;
Choo, Kim-Kwang Raymond ;
Deng, Robert H. ;
Lu, Rongxing ;
Weng, Jian .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2018, 15 (01) :27-39