Skip to main content

Privacy Preserving and Resilient Cloudified IoT Architecture to Support eHealth Systems

  • Conference paper
  • First Online:
Book cover Interoperability, Safety and Security in IoT (InterIoT 2017, SaSeIoT 2017)

Abstract

Significant improvement in eHealth services in both quality and financial points of view are possible if public cloud infrastructures could be utilized in storing and processing personal health information (PHI) from IoT devices monitoring and collecting data from persons. The challenge is that personal health records are highly sensitive and health related organization are not willing to trust the cybersecurity of public clouds. Another challenge is that strict regulation is in place regarding the physical location of PHI. This paper addresses these issues by proposing tokenization architecture and crypto-implementation for personal identity number (PIN). This will allow the storage and processing of the personal health information (PII) in the public cloud as the data cannot be identified to a specific person. The proposal follows the general data protection regulation (GDPR) by offering secure and highly resilient architecture for the separation of health data and person identity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Industrial Internet Consortium. http://www.iiconsortium.org/

  2. Microsoft. https://www.microsoft.com/en-us/internet-of-things/healthcare

  3. Botta, A., de Donato, W., Persico, V., Pescapé, A.: On the integration of cloud computing and Internet of Things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 23–30. IEEE Press, New York (2014)

    Google Scholar 

  4. General Data Protection Regulation (EU) 2016/679. http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679

  5. Ida, I.B., Jemai, A., Loukil, A.: A survey on security of IoT in the context of eHealth and clouds. In: 11th International Design & Test Symposium (IDT), pp. 25–30. IEEE Press, New York (2016)

    Google Scholar 

  6. Supriya, S., Padaki, S.: Data security and privacy challenges in adopting solutions for IOT. In: 2016 IEEE International Conference on Internet of Things (iThings), pp. 410–415. IEEE Press, New York (2016)

    Google Scholar 

  7. Sawand, A., Djahel, S., Zhang, Z., Naït-Abdesselam, F.: Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems. In: IEEE/CIC ICCC 2014 Symposium on Privacy and Security in Communications, pp. 187–192. IEEE Press, New York (2014)

    Google Scholar 

  8. Henkilötietolaki 523/1999. http://www.finlex.fi/fi/laki/ajantasa/1999/19990523

  9. Valtioneuvoston asetus väestötietojärjestelmästä 25.2.2010/128. http://www.finlex.fi/fi/laki/ajantasa/2010/20100128

  10. PCI Data Security Standard Information Supplement: PCI DSS Tokenization Guidelines. https://www.pcisecuritystandards.org/documents/Tokenization_Guidelines_Info_Supplement.pdf

  11. ISO/IEC PRF 20922. https://www.iso.org/standard/69466.html

  12. Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing. https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/csaguide.v3.0.pdf

  13. ENISA: Recommended cryptographic measures – securing personal data. https://www.enisa.europa.eu/publications/recommended-cryptographic-measures-securing-personal-data

  14. NIST: Special Publication 800-175B: Guideline for Using Cryptographic Standards in Federal Government: Cryptographic Mechanisms. https://www.nist.gov/publications/guideline-using-cryptographic-standards-federal-government-cryptographic-mechanisms

  15. Tao, B., Wu, H.: Improving the biclique cryptanalysis of AES. In: Foo, E., Stebila, D. (eds.) ACISP 2015. LNCS, vol. 9144, pp. 39–56. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19962-7_3

    Chapter  Google Scholar 

  16. Khovratovich, D., Rechberger, C., Savelieva, A.: Bicliques for preimages: attacks on Skein-512 and the SHA-2 family. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 244–263. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34047-5_15

    Chapter  Google Scholar 

Download references

Acknowledgement

This work was supported in part by the Finnish Funding Agency for Innovation (TEKES) under the project “Industrial Internet Reference Architecture for Medical Platforms” (RAMP). The project is partly funded by industry partners Wallac Ltd/PerkinElmer Inc, Etteplan Oyj, Atostek Ltd, and Nextfour Group Ltd.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jarkko Paavola .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Paavola, J., Ekqvist, J. (2018). Privacy Preserving and Resilient Cloudified IoT Architecture to Support eHealth Systems. In: Fortino, G., et al. Interoperability, Safety and Security in IoT. InterIoT SaSeIoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242. Springer, Cham. https://doi.org/10.1007/978-3-319-93797-7_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-93797-7_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-93796-0

  • Online ISBN: 978-3-319-93797-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics