Abstract
Reliable data exchange and efficient image transfer are currently significant research challenges in health care systems. To incentivize data exchange within the Internet of Things (IoT) framework, we need to ensure data sovereignty by facilitating secure data exchange between trusted parties. The security and reliability of data-sharing infrastructure require a community of trust. Therefore, this paper introduces an encryption frame based on data fragmentation. It also presents a novel, deterministic grey-scale optical encryption scheme based on fundamental mathematics. The objective is to use encryption as the underlying measure to make the data unintelligible while exploiting fragmentation to break down sensitive relationships between attributes. Thus, sensitive data distributed in separate data repositories for decryption and reconstruction using interpolation by knowing polynomial coefficients and personal values from the DBMS Database Management System. Aims also to ensure the secure acquisition of diagnostic images, micrography, and all types of medical imagery based on probabilistic approaches. Visual sharing of confidential medical imageries based on implementing a novel method, where transparencies ≤k − 1 out of n cannot reveal the original image.

Similar content being viewed by others
References
Agrawal D, Abbadi AE, Emekci F, Metwally A (2009) Database management as a service: challenges and opportunities, in 2009 IEEE 25th International Conference on Data Engineering, Shanghai
Alshayea T, Mavromoustakis C, Mastorakis G, Batalla JM, Markakis E, Pallis E (2018) On the Efficiency evaluation of a novel scheme based on daubechies wavelet for watermarking in 5G,” in 2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Barcelona
Alshayeh T, Mavromoustakis C, Batalla JM, Mastorakis G (Dec. 2019) A hybridized measurement methodology for different wavelet transformations targeting medical images in internet of things (IoT) infrastructures. Measurement 148(106813)
Alshayeh T, Mavromoustakis C, Batalla JM, Mastorakis G, Mukherjee M, Chatzimisios P (2019) Efficiency-aware watermarking using different wavelet families for the internet of things, in 2019 IEEE International Conference on Communications (ICC), Shanghai
Anderson S, Revesz P (2007) CDB-PV: a constraint database-based program Verifier, in International Symposium on Abstraction, Reformulation, and Approximation
Andreas A, Mavromoustakis C, Mastorakis G, Mumtaz S, Batalla JM, Pallis E (2020) Modified machine learning Techique for curve fitting on regression models for COVID-19 projections. In: IEEE international workshop on computer aided modeling and Design of Communication Links and Networks (CAMAD)
Barták R (2007) Generating implied boolean constraints via singleton consistency, in International Symposium on Abstraction, Reformulation, and Approximation
Bisio I, Lavagetto F, Márchese M, Sciarrone A (2014) Comparison of situation awareness algorithms for remote health monitoring with smartphones, in 2014 IEEE Global Communications Conference, Austin
Bisio I, Fedeli A, Lavagetto F, Pastorino M, Randazzo A, Sciarrone A, Tavanti E (27 Jun. 2017) A numerical study concerning brain stroke detection by microwave imaging systems. Multimed Tools Appl 77:9341–9363
Bisio I, Garibotto C, Grattarola A, Lavagetto F, Sciarrone A (2018) Exploiting context-aware capabilities over the internet of things for industry 4.0 applications. IEEE Netw 32(3):101–107, May/June
Blumenthal D, Tavenner M (05 Aug. 2010) The “meaningful use” regulation for electronic health records. N Engl J Med 363:501–504
Blundo C, Santis AD, Naor M (30 Nov. 2000) Visual cryptography for grey level images. Inf Process Lett 75(6):255–259
Chang C-C, Yu T-X (2002) Sharing a secret gray image in multiple images, in First International Symposium on Cyber Worlds, Tokyo, Japan
Chang C-C, Tsai C-S, Chen T-S (2000) A new scheme for sharing secret color images in computer network, in Seventh International Conference on Parallel and Distributed Systems, Iwate, Japan
Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P (2007) Fragmentation and encryption to enforce privacy in data storage, in 12th European Symposium On Research In Computer Security
Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P (2009) Keep a few: outsourcing data while maintaining confidentiality, in European Symposium on Research in Computer Security
Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P(2009) Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients, in IFIP Annual Conference on Data and Applications Security and Privacy
Ciriani V, Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P (July 2010) Combining fragmentation and encryption to protect privacy in data storage. ACM Trans Inf Syst Secur 13(3):1–33
Emekci F, Methwally A, Agrawal D, Abbadi AE (01 Apr 2014) Dividing secrets to secure data outsourcing. Inf Sci 263:198–210
“enovacom,” Enovacom Canada Inc., [Online]. Available: https://www.enovacom.com/interoperability/fhir-what-are-the-challenges-to-adoption/.
Gagan A, Mayank B, Prasanna G, Hector GM, Krishnaram K, Rajeev M, Utkarsh S, Dilys T, Ying X (2005) Two can keep a secret: a distributed architecture for secure database services, in The Second Biennial Conference on Innovative Data Systems Research (CIDR 2005), Asilomar, California
Le DN, Seth B, Dalal S (12 Sep. 2018) A hybrid approach of secret sharing with fragmentation and encryption in cloud environment for securing outsourced medical database: a revolutionary approach. J Cyber Secur Mobility 7(4):379–408
Leng C, Yu H, Wang J, Huang J (Apr. 2013) Securing personal health Records in the Cloud by enforcing sticky policies. TELKOMNIKA 11(4):2200–2208
Mavromoustakis C, Batalla JM, Mastorakis G, Markakis E, Pallis E (Jul. 2018) Socially oriented edge computing for energy awareness in IoT architectures. IEEE Commun Mag 56(7):139–145
Naor M, Shamir A (1994) Visual cryptography. Advances in Cryptology, EUROCRYPT 950:1–12
Odisho A, Lui H, Yerramsetty R, Bautista F, Gleason N, Martin E, Young J, Blum M, Neinstein A (2020) Design and development of referrals automation, a SMART on FHIR solution to improve patient access to specialty care. JAMIA Open 3(3):405–412
Sareen S, Sood S, Gupta SK (06 Feb. 2016) Towards the design of a secure data outsourcing using fragmentation and secret sharing scheme. Inform Secur J A Global Perspective 25(1–3):39–53
Shamir A (Nov 1979) How to share a secret. Commun ACM 22(11)
Snezana S, Kilintzis V, Jakimovski B, Jolevski I, Beredimas N, Mourouzis A, Corbev I, Chouvarda I, Maglaveras N, Trajkovik V (2020) Cloud based personal health records data exchange in the age of IoT: The Cross4all Project,” in Machine Learning and Applications. ICT Innovations 2020. Communications in Computer and Information Science, vol. 1316, Springer, Cham, pp. 28–41.
Sridhar S, Smys S (2017) Intelligent security framework for iot devices cryptography based end-to-end security architecture, in International Conference on Inventive Systems and Control , Coimbatore
Stoldt J-P, Weber J (2020) Safety Improvement for SMART on FHIR Apps with Data Quality by Contract,” in IEEE International Conference on Software Architecture Companion , Salvador, Brazil
Verheul E, Tilborg H (1997) Constructions and properties of k out of n visual secret sharing schemes. Des Codes Crypt 11:179–196
WH Organization, 2020-2024. [Online]. Available: https://www.who.int/docs/default-source/documents/gs4dhdaa2a9f352b0445bafbc79ca799dce4d.pdf?sfvrsn=f112ede5_42.
Wang D, Yi F, Li X (01 June 2011) Probabilistic visual secret sharing schemes for grey-scale images and color images. Inf Sci 181(11):2189–2208
Yang C-N (Mar. 2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn Lett 25(4):481–494
Yang C-N, Laih C-S (2000) New colored visual secret sharing schemes. Des Codes Crypt 20:325–336
Acknowledgements
The research work presented in this article was partially supported by the project entitled ‘Smart and Health Ageing through People Engaging in supporting Systems’ with acronym SHAPES, which has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 857159. Undertaken by the SPHINX project through the European Union’s Horizon 2020 Research and Innovation Programme (Digital Society, Trust & Cyber Security E-Health, Well-Being and Ageing) under grant agreement 826183. It is also part of the Ambient Assisted Living (AAL) project vINCI: “Clinically-validated INtegrated Support for Assistive Care and Lifestyle Improvement: The Human Link” funded by Research & Innovation Foundation in Cyprus under the AAL framework with Grant Nr. vINCI /P2P/AAL/0217/0016.
We sincerely thank anonymous reviewers for critically reading the manuscript and suggesting substantial improvements, which helped us significantly improve our paper’s presentation and research work quality.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Andreas, A., Mavromoustakis, C.X., Mastorakis, G. et al. Towards an optimized security approach to IoT devices with confidential healthcare data exchange. Multimed Tools Appl 80, 31435–31449 (2021). https://doi.org/10.1007/s11042-021-10827-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-021-10827-x