Skip to main content

Data Storage Protection of Community Medical Internet of Things

  • Conference paper
  • First Online:
  • 916 Accesses

Abstract

With the improvement of people’s living standard, people have put forward higher requirements on medical services. The effective combination of the traditional community medical systems and the modern Internet of things technologies can help to build a community medical Internet of things, which involves a large number of important information for health care and patient staff, and these information face the risk of privacy disclosure and information damage. From the point of view of data storage, we proposes a data storage protection method for preserving privacy data in the community medical Internet of things. Through analyzing the data integrity and security of the practical scheme, it is proved that the medical data can be protected effectively in the process of storage.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ye, H., Yang, J., Zhu, J., Zhang, Z., Huang, Y., Chen, F.: A secure privacy data transmission method for medical internet of things. In: Wan, J., Humar, I., Zhang, D. (eds.) Industrial IoT 2016. LNICSSITE, vol. 173, pp. 144–154. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44350-8_15

    Chapter  Google Scholar 

  2. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  3. Medaglia, C.M., Serbanati, A.: An overview of privacy and security issues in the internet of things. In: Giusto, D., Iera, A., Morabito, G., Atzori, L. (eds.) The Internet of Things. Springer, New York, NY (2010). https://doi.org/10.1007/978-1-4419-1674-7_38

    Google Scholar 

  4. Mni, L., Zhang, Q., Tan, H.Y., et al.: Smart healthcare: from IoT to cloud computing. Sci. Sinica 43(4), 515–528 (2013)

    Google Scholar 

  5. Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)

    Article  MATH  Google Scholar 

  6. Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data. In: Proceedings of the 33rd International Conference on Very Large Data Base, pp. 123–134 (2007)

    Google Scholar 

  7. Kamara, S., Lauter, K.: Cryptographic cloud storage. In: Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.) FC 2010. LNCS, vol. 6054, pp. 136–149. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14992-4_13

    Chapter  Google Scholar 

  8. Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011)

    Google Scholar 

  9. HuangX, R.W., Gui, L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chin. J. Comput. 34(12), 2391–2402 (2011)

    Article  Google Scholar 

  10. Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data. In: Proceedings of the 2009 ACM Workshop on Cloud computing security, pp. 55–66 November 2009

    Google Scholar 

  11. Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Devel. 48(7), 1155–1167 (2011)

    Google Scholar 

  12. Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. J. Tsinghua Univ. (Sci. Tech.) 51(10), 1357–1362 (2011)

    Google Scholar 

Download references

Acknowledgments

The authors would like to thank our colleagues and students in Engineering Technology Research Center of Network and Information Security at Anhui Normal University. We thank National Natural Science Foundation of China under Grant Nos. 61572036 and 61402014, University Natural Science Research Project of Anhui Province under Grant No. KJ2014A084, Wuhu City Science and Technology Project under Grant No. 2014cxy04 for support of this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fulong Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Z., Chen, F., Ye, H., Zhu, J., Zhang, C., Liu, C. (2018). Data Storage Protection of Community Medical Internet of Things. In: Wan, J., et al. Cloud Computing, Security, Privacy in New Computing Environments. CloudComp SPNCE 2016 2016. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 197. Springer, Cham. https://doi.org/10.1007/978-3-319-69605-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69605-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69604-1

  • Online ISBN: 978-3-319-69605-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics