Security algorithms for distributed storage system for E-health application over wireless body area network

被引:0
作者
Mohammed Majeed Alkhabet
Mahamod Ismail
机构
[1] University Kebangsaan Malaysia UKM,Faculty of Engineering and Built Environment
来源
Journal of Ambient Intelligence and Humanized Computing | 2023年 / 14卷
关键词
Distributed storage; Privacy; Security; E-health system; Wireless body area network (WBAN);
D O I
暂无
中图分类号
学科分类号
摘要
Wireless body area networks (WBANs) are an upcoming technology for achieving effective healthcare. The security and privacy of patient-related data are two essential aspects of WBAN system security. Storing data on a single server is simple but may lead to a single point of failure (whether a typical failure or a failure due to security attacks). In this paper, enhanced security and privacy of patient information and E-health systems based on distributed storage systems (DSSs) are developed using public-key cryptography to store patient information. The storage of data and the security requirements (such as confidentiality, reliability, authentication, and dynamic integrity) are simultaneously distributed among individual nodes throughout the network. The patient data are encrypted using the redundant residue number system (RRNS) technique, which depends on a library of moduli in the encrypting process to generate residues. Three algorithms were implemented to decode the RRNS: the Chinese Remainder Theorem (CRT), Base Extension (BEX) with mixed radix conversion, and the new Chinese Remainder Theorem I (CRT I). The results of a system prototype implementation showed that whenever the value of the moduli was a big prime number, the coding efficiency became large, and the time to send a message decreased by 2 s. The performance of the algorithms was expressed in terms of execution time and cyclomatic complexity (CC). The results showed that the CRT I was 1 s faster than the other decoding algorithms and took around 2.5 s to decode the RRNS. The CRT had a low CC of 15, whereas the MRC and CRT I had a CC of 45 and 40, respectively. The main operation phases of the proposed system are described.
引用
收藏
页码:15781 / 15792
页数:11
相关论文
共 56 条
[1]  
Ahmed HA(2019)A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map Neural Comput Appl 1 288-294
[2]  
Zolkipli MF(2015)Enhancing the security and privacy of WBAN-based distributed storage systems J UHD J 1 7-765
[3]  
Ahmad M(2012)Novel algorithm for decoding redundant residue number systems (RRNS) codes Integers 26 752-4166
[4]  
Al-Janabi S(2014)Trusteddb: a trusted hardware-based database with privacy and data confidentiality IEEE Trans Knowl Data Eng 10 4151-20608
[5]  
Dawood AJ(2013)Cryptology Inf Secur Fundam Second Ed 6 20596-251
[6]  
Salman AD(2019)The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems J Ambient Intell Humaniz Comput 92 241-467
[7]  
Amusa K(2018)Secure medical data transmission model for IoT-based healthcare systems IEEE Access 72 455-3774
[8]  
Nwoye E(2019)Collaborative task assignment of interconnected, affective robots towards autonomous healthcare assistant Future Gener Comput Syst 10 3761-47
[9]  
Bajaj S(2018)A secure real-time internet of medical smart things (IOMST) Comput Electr Eng 15 39-1171
[10]  
Sion R(2020)DependData: data collection dependability through three-layer decision-making in BSNs for healthcare monitoring Inf Fusion 7 1160-76