Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

被引:8
作者
Basha, A. Jameer [1 ]
Rajkumar, N. [2 ]
AlZain, Mohammed A. [3 ]
Masud, Mehedi [4 ]
Abouhawwash, Mohamed [5 ,6 ]
机构
[1] Hindusthan Inst Technol, Dept Comp Sci & Engn, Coimbatore 641032, Tamil Nadu, India
[2] Presidency Univ, Sch Engn, Dept Comp Sci & Engn, Bangalore 560064, Karnataka, India
[3] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, Taif 21944, Saudi Arabia
[4] Taif Univ, Coll Comp & Informat Technol, Dept Comp Sci, Taif 21944, Saudi Arabia
[5] Mansoura Univ, Fac Sci, Dept Math, Mansoura 35516, Egypt
[6] Michigan State Univ, Dept Computat Math Sci & Engn CMSE, E Lansing, MI 48824 USA
关键词
Fog computing; self-sovereign identity; PHR; privacy; security; IoMT; MULTIOBJECTIVE OPTIMIZATION; BLOCKCHAIN; SIGNATURES; AGGREGATE; ALGORITHM; SYSTEM;
D O I
10.32604/iasc.2022.024714
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease's wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient's Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based technology is used in order to handle the health data of the patient for digital identity management. Self-Sovereign Identity empowers the patient to handle and control their own data. This paper proposes Fog Computing based Self-Sovereign Identity with Rivest, Shamir, Adleman (RSA) for IoMT (FCSSI+RSA-IoMT). For that, it keeps the Patient Health Record (PHR) securely and effectively using RSA to make the identification and authentication procedures at ease. Besides, PHR is used to store the sensitive information regarding identity and privacy of the patient. Additionally, it records the diagnosis history of patient by the doctors and radiology images. Therefore, the result evaluation proves that, for 100 users, the proposed technique takes only 631 secs and also the throughput performance is better when compared to the existing techniques.
引用
收藏
页码:1693 / 1706
页数:14
相关论文
共 67 条
[1]   Multi-Objective Task Scheduling Approach for Fog Computing [J].
Abdel-Basset, Mohamed ;
Moustafa, Nour ;
Mohamed, Reda ;
Elkomy, Osama M. ;
Abouhawwash, Mohamed .
IEEE ACCESS, 2021, 9 (09) :126988-127009
[2]   EA-MSCA: An effective energy-aware multi-objective modified sine-cosine algorithm for real-time task scheduling in multiprocessor systems: Methods and analysis [J].
Abdel-Basset, Mohamed ;
Mohamed, Reda ;
Abouhawwash, Mohamed ;
Chakrabortty, Ripon K. ;
Ryan, Michael J. .
EXPERT SYSTEMS WITH APPLICATIONS, 2021, 173
[3]   A Simple and Effective Approach for Tackling the Permutation Flow Shop Scheduling Problem [J].
Abdel-Basset, Mohamed ;
Mohamed, Reda ;
Abouhawwash, Mohamed ;
Chakrabortty, Ripon K. ;
Ryan, Michael J. .
MATHEMATICS, 2021, 9 (03) :1-23
[4]   Multi-Objective Evolutionary Algorithm for PET Image Reconstruction: Concept [J].
Abouhawwash, Mohamed ;
Alessio, Adam M. .
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2021, 40 (08) :2142-2151
[6]  
Abouhawwash M, 2020, J NUCL MED, V61
[7]   Karush-Kuhn-Tucker Proximity Measure for Multi-Objective Optimization Based on Numerical Gradients [J].
Abouhawwash, Mohamed ;
Deb, Kalyanmoy .
GECCO'16: PROCEEDINGS OF THE 2016 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE, 2016, :525-532
[8]   The benefits and threats of blockchain technology in healthcare: A scoping review [J].
Abu-elezz, Israa ;
Hassan, Asma ;
Nazeemudeen, Anjanarani ;
Househ, Mowafa ;
Abd-alrazaq, Alaa .
INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 2020, 142
[9]  
Al Omar Abdullah, 2017, Security, Privacy and Anonymity in Computation, Communication and Storage, SpaCCS 2017: International Workshops. Proceedings: LNCS 10658, P534, DOI 10.1007/978-3-319-72395-2_49
[10]   IoMT-SAF: Internet of Medical Things Security Assessment Framework [J].
Alsubaei, Faisal ;
Abuhussein, Abdullah ;
Shandilya, Vivek ;
Shiva, Sajjan .
INTERNET OF THINGS, 2019, 8