Abstract
Protecting user data in public server is one of the major concerns in cloud computing scenarios. In recent trends, data owner prefers storing data in a third party server in a controlled manner, sometimes in an encrypted form. In this paper, we discuss a recent scheme [1] appeared in INFOCOM 2015 that claims verifiable privacy-preserving service in healthcare systems. We show that the scheme [1] suffers from security weaknesses, in particular, it does not provide privacy-preserving services, which is the main claim of the scheme. We provide an improved solution by slightly modifying the scheme, which retains the security and privacy claim intact without increasing any overhead.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Guo, L., Fang, Y., Li, M., Li, P.: Verifiable privacy-preserving monitoring for cloud-assisted mHealth systems. In: Proceedings of the IEEE Conference on Computer Communications (INFOCOM 2015), pp. 1026–1034 (2015)
Shawish, A., Salama, M.: Cloud computing: paradigms and technologies. In: Bessis, N., et al. (eds.) Inter-cooperative Collective Intelligence: Techniques and Applications. Studies in Computational Intelligence, vol. 495, pp. 39–67. Springer, Heidelberg (2014)
Guo, L., Zhang, C., Yue, H., Fang, Y.: PSaD: a privacy-preserving social-assisted content dissemination scheme in DTNs. IEEE Trans. Mob. Comput. 13(12), 2903–2918 (2014)
Lin, H., Shao, J., Zhang, C., Fang, Y.: CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inf. Forensics Secur. 8(6), 985–997 (2013)
Basu, A., Sengupta, I., Sing, J.K.: Secured cloud storage scheme using ECC based key management in user hierarchy. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2011. LNCS, vol. 7093, pp. 175–189. Springer, Heidelberg (2011). doi:10.1007/978-3-642-25560-1_12
Wang, W., Li, Z., Owens, R., Bhargava, B.: Secure and efficient access to outsourced Data. In: Proceedings of the ACM Workshop on Cloud Computing Security (CCSW 2009), pp. 55–66 (2009)
Mohan, P., Sultan, S.: MediNet: a mobile healthcare management system for the Caribbean region. In: Proceedings of International Conference of Mobile and Ubiquitous Systems: Networking & Services, pp. 1–2 (2009)
Liu, C.H., Wen, J., Yu, Q., Yang, B., Wang, W.: Health Kiosk: a family-based connected healthcare system for long-term monitoring. In: Proceedings of IEEE Conference on Computer Communications Workshops, pp. 241–246 (2011)
Klasnja, P., Pratt, W.: Healthcare in the pocket: mapping the space of mobile-phone health interventions. J. Biomed. Inform. 45(1), 184–198 (2012)
Chiarini, G., Ray, P., Akter, S., Masella, C., Ganz, A.: mHealth technologies for chronic diseases and elders: a systematic review. IEEE J. Sel. Areas Commun. 31(9), 6–18 (2013)
Acknowledgment
This work was supported in part by Indo French Centre for the Promotion of Advanced Research(IFCPAR) and Center Franco-Indien Pour LA Promotion DE LA Recherche Avancee(CEFIPRA) through the project DST/CNRS 2015-03 under DST-INRIA-CNRS Targeted Programme.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
Gajera, H., Naik, S., Das, M.L. (2016). On the Security of “Verifiable Privacy-Preserving Monitoring for Cloud-Assisted mHealth Systems”. In: Ray, I., Gaur, M., Conti, M., Sanghi, D., Kamakoti, V. (eds) Information Systems Security. ICISS 2016. Lecture Notes in Computer Science(), vol 10063. Springer, Cham. https://doi.org/10.1007/978-3-319-49806-5_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-49806-5_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49805-8
Online ISBN: 978-3-319-49806-5
eBook Packages: Computer ScienceComputer Science (R0)