A Secure Privacy-Preserving Data Aggregation Scheme Based on Bilinear ElGamal Cryptosystem for Remote Health Monitoring Systems

被引:84
作者
Ara, Anees, Jr. [1 ]
Al-Rodhaan, Mznah [1 ]
Tian, Yuan [1 ]
Al-Dhelaan, Abdullah [1 ]
机构
[1] King Saud Univ, Coll Comp & Informat Sci, Dept Comp Sci, Riyadh 11453, Saudi Arabia
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Wireless body area network; remote health monitoring system; secure data aggregation; bilinear pairing; bilinear ElGamal cryptosystem; homomorphic encryption; aggregate signature; batch verification; WIRELESS SENSOR NETWORKS; SIGNATURE SCHEME;
D O I
10.1109/ACCESS.2017.2716439
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Due to advancements in the development of wireless medical sensing devices and wireless communication technologies, the wireless body area network (WBAN) has become an eminent part of e-healthcare systems. WBAN uses medical sensors to continuously monitor and collect the physiological parameters of a patient's health and send them to a remote medical server through a portable digital assistance (PDA)/mobile. Due to limitations in communication, such as power, storage, and the computational capabilities of sensors, data aggregation techniques are used to reduce the communication overhead in real-time data transmission in WBAN. However, since the WBAN transmits sensitive health data, data security and data privacy are a major concern. In this paper, we propose a secure privacy-preserving data aggregation (SPPDA) scheme based on bilinear pairing for remote health monitoring systems to improve data aggregation effciency and data privacy. Our proposed SPPDA scheme utilizes the homomorphic property of the bilinear ElGamal cryptosystem to perform privacy-preserving secure computation and combines it with the aggregate signature scheme, enabling data authenticity/integrity in the WBAN. The proposed SPPDA scheme is proved to be semantically secure under the decisional bilinear Diffie-Hellman assumption. Security analysis demonstrates that our proposed scheme preserves data confidentiality, data authenticity, and data privacy; it also resists passive eavesdropping and replay attacks. A performance evaluation based on simulation results and a comparison of computational cost with related schemes show that data aggregation and batch verification at the PDA significantly reduce communication and transmission overhead and support efficient computation at the remote server.
引用
收藏
页码:12601 / 12617
页数:17
相关论文
共 40 条
[1]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[2]  
[Anonymous], 1978, FDN SEC COMPUT
[3]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[4]   Secure Data Transmission Protocol for Medical Wireless Sensor Networks [J].
Ben Othman, Soufiene ;
Bahattab, Abdullah Ali ;
Trad, Abdelbasset ;
Youssef, Habib .
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, :649-656
[5]   Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks [J].
Ben Othman, Soufiene ;
Trad, Abdelbasset ;
Youssef, Habib ;
Alzaid, Hani .
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, :188-195
[6]  
Beuchat JL, 2010, LECT NOTES COMPUT SC, V6487, P21, DOI 10.1007/978-3-642-17455-1_2
[7]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[8]  
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[9]   MuDA: Multifunctional data aggregation in privacy-preserving smart grid communications [J].
Chen, Le ;
Lu, Rongxing ;
Cao, Zhenfu ;
AlHarbi, Khalid ;
Lin, Xiaodong .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2015, 8 (05) :777-792
[10]  
Drira W., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P78, DOI 10.1109/TrustCom.2012.31