Abstract
With the improvement of people’s living standard, people have put forward higher requirements on medical services. The effective combination of the traditional community medical systems and the modern Internet of things technologies can help to build a community medical Internet of things, which involves a large number of important information for health care and patient staff, and these information face the risk of privacy disclosure and information damage. From the point of view of data storage, we proposes a data storage protection method for preserving privacy data in the community medical Internet of things. Through analyzing the data integrity and security of the practical scheme, it is proved that the medical data can be protected effectively in the process of storage.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Ye, H., Yang, J., Zhu, J., Zhang, Z., Huang, Y., Chen, F.: A secure privacy data transmission method for medical internet of things. In: Wan, J., Humar, I., Zhang, D. (eds.) Industrial IoT 2016. LNICSSITE, vol. 173, pp. 144–154. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44350-8_15
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Giusto, D., Iera, A., Morabito, G., Atzori, L. (eds.) The Internet of Things. Springer, New York, NY (2010). https://doi.org/10.1007/978-1-4419-1674-7_38
Mni, L., Zhang, Q., Tan, H.Y., et al.: Smart healthcare: from IoT to cloud computing. Sci. Sinica 43(4), 515–528 (2013)
Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)
Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Base, pp. 123–134 (2007)
Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14992-4_13
Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011)
HuangX, R.W., Gui, L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chin. J. Comput. 34(12), 2391–2402 (2011)
Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM Workshop on Cloud computing security, pp. 55–66 November 2009
Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Devel. 48(7), 1155–1167 (2011)
Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. J. Tsinghua Univ. (Sci. Tech.) 51(10), 1357–1362 (2011)
Acknowledgments
The authors would like to thank our colleagues and students in Engineering Technology Research Center of Network and Information Security at Anhui Normal University. We thank National Natural Science Foundation of China under Grant Nos. 61572036 and 61402014, University Natural Science Research Project of Anhui Province under Grant No. KJ2014A084, Wuhu City Science and Technology Project under Grant No. 2014cxy04 for support of this research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Zhang, Z., Chen, F., Ye, H., Zhu, J., Zhang, C., Liu, C. (2018). Data Storage Protection of Community Medical Internet of Things. In: Wan, J., et al. Cloud Computing, Security, Privacy in New Computing Environments. CloudComp SPNCE 2016 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 197. Springer, Cham. https://doi.org/10.1007/978-3-319-69605-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-69605-8_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-69604-1
Online ISBN: 978-3-319-69605-8
eBook Packages: Computer ScienceComputer Science (R0)