Skip to main content

Advertisement

Log in

Towards an optimized security approach to IoT devices with confidential healthcare data exchange

  • 1194: Secured and Efficient Convergence of Artificial Intelligence and Internet of Things
  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Reliable data exchange and efficient image transfer are currently significant research challenges in health care systems. To incentivize data exchange within the Internet of Things (IoT) framework, we need to ensure data sovereignty by facilitating secure data exchange between trusted parties. The security and reliability of data-sharing infrastructure require a community of trust. Therefore, this paper introduces an encryption frame based on data fragmentation. It also presents a novel, deterministic grey-scale optical encryption scheme based on fundamental mathematics. The objective is to use encryption as the underlying measure to make the data unintelligible while exploiting fragmentation to break down sensitive relationships between attributes. Thus, sensitive data distributed in separate data repositories for decryption and reconstruction using interpolation by knowing polynomial coefficients and personal values from the DBMS Database Management System. Aims also to ensure the secure acquisition of diagnostic images, micrography, and all types of medical imagery based on probabilistic approaches. Visual sharing of confidential medical imageries based on implementing a novel method, where transparencies ≤k − 1 out of n cannot reveal the original image.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Agrawal D, Abbadi AE, Emekci F, Metwally A (2009) Database management as a service: challenges and opportunities, in 2009 IEEE 25th International Conference on Data Engineering, Shanghai

  2. Alshayea T, Mavromoustakis C, Mastorakis G, Batalla JM, Markakis E, Pallis E (2018) On the Efficiency evaluation of a novel scheme based on daubechies wavelet for watermarking in 5G,” in 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona

  3. Alshayeh T, Mavromoustakis C, Batalla JM, Mastorakis G (Dec. 2019) A hybridized measurement methodology for different wavelet transformations targeting medical images in internet of things (IoT) infrastructures. Measurement 148(106813)

  4. Alshayeh T, Mavromoustakis C, Batalla JM, Mastorakis G, Mukherjee M, Chatzimisios P (2019) Efficiency-aware watermarking using different wavelet families for the internet of things, in 2019 IEEE International Conference on Communications (ICC), Shanghai

  5. Anderson S, Revesz P (2007) CDB-PV: a constraint database-based program Verifier, in International Symposium on Abstraction, Reformulation, and Approximation

  6. Andreas A, Mavromoustakis C, Mastorakis G, Mumtaz S, Batalla JM, Pallis E (2020) Modified machine learning Techique for curve fitting on regression models for COVID-19 projections. In: IEEE international workshop on computer aided modeling and Design of Communication Links and Networks (CAMAD)

    Google Scholar 

  7. Barták R (2007) Generating implied boolean constraints via singleton consistency, in International Symposium on Abstraction, Reformulation, and Approximation

  8. Bisio I, Lavagetto F, Márchese M, Sciarrone A (2014) Comparison of situation awareness algorithms for remote health monitoring with smartphones, in 2014 IEEE Global Communications Conference, Austin

  9. Bisio I, Fedeli A, Lavagetto F, Pastorino M, Randazzo A, Sciarrone A, Tavanti E (27 Jun. 2017) A numerical study concerning brain stroke detection by microwave imaging systems. Multimed Tools Appl 77:9341–9363

    Article  Google Scholar 

  10. Bisio I, Garibotto C, Grattarola A, Lavagetto F, Sciarrone A (2018) Exploiting context-aware capabilities over the internet of things for industry 4.0 applications. IEEE Netw 32(3):101–107, May/June

    Article  Google Scholar 

  11. Blumenthal D, Tavenner M (05 Aug. 2010) The “meaningful use” regulation for electronic health records. N Engl J Med 363:501–504

    Article  Google Scholar 

  12. Blundo C, Santis AD, Naor M (30 Nov. 2000) Visual cryptography for grey level images. Inf Process Lett 75(6):255–259

    Article  MathSciNet  Google Scholar 

  13. Chang C-C, Yu T-X (2002) Sharing a secret gray image in multiple images, in First International Symposium on Cyber Worlds, Tokyo, Japan

  14. Chang C-C, Tsai C-S, Chen T-S (2000) A new scheme for sharing secret color images in computer network, in Seventh International Conference on Parallel and Distributed Systems, Iwate, Japan

  15. Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Fragmentation and encryption to enforce privacy in data storage, in 12th European Symposium On Research In Computer Security

  16. Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P (2009) Keep a few: outsourcing data while maintaining confidentiality, in European Symposium on Research in Computer Security

  17. Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P(2009) Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients, in IFIP Annual Conference on Data and Applications Security and Privacy

  18. Ciriani V, Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P (July 2010) Combining fragmentation and encryption to protect privacy in data storage. ACM Trans Inf Syst Secur 13(3):1–33

    Article  Google Scholar 

  19. Emekci F, Methwally A, Agrawal D, Abbadi AE (01 Apr 2014) Dividing secrets to secure data outsourcing. Inf Sci 263:198–210

    Article  MathSciNet  Google Scholar 

  20. “enovacom,” Enovacom Canada Inc., [Online]. Available: https://www.enovacom.com/interoperability/fhir-what-are-the-challenges-to-adoption/.

  21. Gagan A, Mayank B, Prasanna G, Hector GM, Krishnaram K, Rajeev M, Utkarsh S, Dilys T, Ying X (2005) Two can keep a secret: a distributed architecture for secure database services, in The Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California

  22. Le DN, Seth B, Dalal S (12 Sep. 2018) A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: a revolutionary approach. J Cyber Secur Mobility 7(4):379–408

    Article  Google Scholar 

  23. Leng C, Yu H, Wang J, Huang J (Apr. 2013) Securing personal health Records in the Cloud by enforcing sticky policies. TELKOMNIKA 11(4):2200–2208

    Article  Google Scholar 

  24. Mavromoustakis C, Batalla JM, Mastorakis G, Markakis E, Pallis E (Jul. 2018) Socially oriented edge computing for energy awareness in IoT architectures. IEEE Commun Mag 56(7):139–145

    Article  Google Scholar 

  25. Naor M, Shamir A (1994) Visual cryptography. Advances in Cryptology, EUROCRYPT 950:1–12

    MathSciNet  MATH  Google Scholar 

  26. Odisho A, Lui H, Yerramsetty R, Bautista F, Gleason N, Martin E, Young J, Blum M, Neinstein A (2020) Design and development of referrals automation, a SMART on FHIR solution to improve patient access to specialty care. JAMIA Open 3(3):405–412

  27. Sareen S, Sood S, Gupta SK (06 Feb. 2016) Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme. Inform Secur J A Global Perspective 25(1–3):39–53

    Article  Google Scholar 

  28. Shamir A (Nov 1979) How to share a secret. Commun ACM 22(11)

  29. Snezana S, Kilintzis V, Jakimovski B, Jolevski I, Beredimas N, Mourouzis A, Corbev I, Chouvarda I, Maglaveras N, Trajkovik V (2020) Cloud based personal health records data exchange in the age of IoT: The Cross4all Project,” in Machine Learning and Applications. ICT Innovations 2020. Communications in Computer and Information Science, vol. 1316, Springer, Cham, pp. 28–41.

  30. Sridhar S, Smys S (2017) Intelligent security framework for iot devices cryptography based end-to-end security architecture, in International Conference on Inventive Systems and Control , Coimbatore

  31. Stoldt J-P, Weber J (2020) Safety Improvement for SMART on FHIR Apps with Data Quality by Contract,” in IEEE International Conference on Software Architecture Companion , Salvador, Brazil

  32. Verheul E, Tilborg H (1997) Constructions and properties of k out of n visual secret sharing schemes. Des Codes Crypt 11:179–196

    Article  MathSciNet  Google Scholar 

  33. WH Organization, 2020-2024. [Online]. Available: https://www.who.int/docs/default-source/documents/gs4dhdaa2a9f352b0445bafbc79ca799dce4d.pdf?sfvrsn=f112ede5_42.

  34. Wang D, Yi F, Li X (01 June 2011) Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf Sci 181(11):2189–2208

    Article  MathSciNet  Google Scholar 

  35. Yang C-N (Mar. 2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):481–494

    Article  Google Scholar 

  36. Yang C-N, Laih C-S (2000) New colored visual secret sharing schemes. Des Codes Crypt 20:325–336

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The research work presented in this article was partially supported by the project entitled ‘Smart and Health Ageing through People Engaging in supporting Systems’ with acronym SHAPES, which has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 857159. Undertaken by the SPHINX project through the European Union’s Horizon 2020 Research and Innovation Programme (Digital Society, Trust & Cyber Security E-Health, Well-Being and Ageing) under grant agreement 826183. It is also part of the Ambient Assisted Living (AAL) project vINCI: “Clinically-validated INtegrated Support for Assistive Care and Lifestyle Improvement: The Human Link” funded by Research & Innovation Foundation in Cyprus under the AAL framework with Grant Nr. vINCI /P2P/AAL/0217/0016.

We sincerely thank anonymous reviewers for critically reading the manuscript and suggesting substantial improvements, which helped us significantly improve our paper’s presentation and research work quality.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andreou Andreas.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Andreas, A., Mavromoustakis, C.X., Mastorakis, G. et al. Towards an optimized security approach to IoT devices with confidential healthcare data exchange. Multimed Tools Appl 80, 31435–31449 (2021). https://doi.org/10.1007/s11042-021-10827-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-021-10827-x

Keywords