Skip to main content
Log in

A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

Internet of Medical Things (IoMT) technology is widely used in intelligent medical treatment; however, massive mobile data transmission makes the cellular network overburden. The combination of medical Internet of Things technology and cloud storage can greatly improve this problem. Most of the existing medical Internet of Things systems cannot be adapted to the environment with limited resources after considering security and privacy, or after ensuring implementation efficiency, it will lead to reduced system security; that is, the mutual authentication function of the system is easily destroyed. The combination of medical Internet of Things technology and medical cloud storage technology can greatly improve the current smart medical environment. We propose an escrow-free identity-based scheme (EF-IDS) to ensure the function of mutual authentication between system entities, propose a secure lightweight cloud-centric smart medical system based on the medical Internet of Things based on EF-IDS and prove that our system ensures the privacy and security of users' personal health information. It also provides the ability to publicly verify the integrity of the data stored on the medical cloud server. Finally, the performance analysis shows that our proposed system has significant advantages in both communication overhead and computational cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Availability of data and material

The datasets used and/or analyzed during the current study are available from the corresponding author on reasonable request.

Code availability

Not applicable.

References

  1. Laghari AA, Wu K, Laghari RA, Ali M, Khan AA (2021) A review and state of art of Internet of Things (IoT). Arch Comput Methods Eng 29:1395–1413

    Article  Google Scholar 

  2. He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J 12(7):64–73

    Google Scholar 

  3. Xiong H, Qin Z (2015) Revocable and scalable certificateless remote authentication protocol with anonymity for wireless body area networks. IEEE Trans Inf Forensics Secur 10(7):1442–1455

    Article  Google Scholar 

  4. Sureshkumar V, Amin R, Vijaykumar VR, Sekar SR (2019) Robust secure communication protocol for smart healthcare system with FPGA implementation. Futur Gener Comput Syst 100:938–951

    Article  Google Scholar 

  5. Wang H, Feng L, Ji Y, Shao B, Xue R (2021) Toward usable cloud storage auditing, revisited. IEEE Syst J 16(1):693–700

    Article  Google Scholar 

  6. Ming Y, Zhang T (2018) Efficient privacy-preserving access control scheme in electronic health records system. Sensors 18(10):3520

    Article  Google Scholar 

  7. Sun Y, Lo FP-W, Lo B (2019) Security and privacy for the internet of medical things enabled healthcare systems: a survey. IEEE Access 7:183339–183355. https://doi.org/10.1109/ACCESS.2019.2960617

    Article  Google Scholar 

  8. Akinyele JA, Pagano MW, Green MD, Lehmann CU, Peterson ZN, Rubin AD (2011) Securing electronic medical records using attribute-based encryption on mobile devices. In: Proceedings of the 1st ACM workshop on security and privacy in smartphones and mobile devices, pp 75–86.

  9. Chandrasekaran B, Balakrishnan R, Nogami Y (2018) Secure data communication using file hierarchy attribute based encryption in wireless body area networks. JCOMSS 14(1):75–81. https://doi.org/10.24138/jcomss.v14i1.446

    Article  Google Scholar 

  10. Li F et al (2012) Identity-based online/offline signcryption for low power devices. J Netw Comput Appl 35(1):340–347. https://doi.org/10.1016/j.jnca.2011.08.001

    Article  Google Scholar 

  11. Omala AA, Robert N, Li F (2016) A provably secure transmission scheme for wireless body area networks. J Med Syst 40(11):247. https://doi.org/10.1007/s10916-016-0615-1

    Article  Google Scholar 

  12. Zhang A et al (2017) Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems. IEEE Trans Inform Forensic Secur Trans IEEE (Trans) 12(3):662–675. https://doi.org/10.1109/TIFS.2016.2631950

    Article  Google Scholar 

  13. Zhou C (2018) Comments on “light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems.” IEEE Trans Inform Forensic Secur Trans IEEE (Trans) 13(7):1869–1870. https://doi.org/10.1109/TIFS.2018.2799582

    Article  Google Scholar 

  14. Kumar M, Chand S (2020) A secure and efficient cloud-centric internet-of-medical-things-enabled smart healthcare system with public verifiability. IEEE Internet Things J 7(10):10650–10659. https://doi.org/10.1109/JIOT.2020.3006523

    Article  Google Scholar 

  15. Kumar M, Chand S (2021) A provable secure and light weight smart healthcare cyber-physical system with public verifiability. IEEE Syst J 16(4):5501–5508

    Article  Google Scholar 

  16. Zhou C (2018) Comments on “light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems.” IEEE Trans Inf Forensics Secur 13(7):1869–1870

    Article  Google Scholar 

  17. Liu Y, Yu J, Fan J, Vijayakumar P, Chang V (2021) Achieving privacy-preserving DSSE for intelligent IoT healthcare system. IEEE Trans Industr Inf 18(3):2010–2020

    Article  Google Scholar 

  18. Wang R et al (2022) Privacy-preserving federated learning for Internet of medical things under edge computing. IEEE J Biomed Health Inform 27:854–865. https://doi.org/10.1109/JBHI.2022.3157725

    Article  Google Scholar 

  19. Zhou T et al (2022) Human-in-the-loop-aided privacy-preserving scheme for smart healthcare. IEEE Trans Emerg Top Comput Intell 6(1):6–15. https://doi.org/10.1109/TETCI.2020.2993841

    Article  MathSciNet  Google Scholar 

  20. Xu R, Ren Q (2022) Cryptoanalysis on a cloud-centric Internet-of-medical-things-enabled smart healthcare system. IEEE Access 10:23618–23624. https://doi.org/10.1109/ACCESS.2022.3154466

    Article  Google Scholar 

Download references

Acknowledgements

No funds, grants, or other support were received.

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

TM contributed to conceptualization, formal analysis, and writing—original draft preparation; TM and QR were involved in methodology and writing—review and editing; QR contributed to investigation; BS and GB were involved in resources; JS contributed to data curation; and BS and JS were involved in supervision. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Tong Mu.

Ethics declarations

Conflicts of interest

The authors declare that they have no conflicts of interest.

Ethical approval

Not applicable.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mu, T., Ren, Q., Shao, B. et al. A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things. J Supercomput 79, 18820–18848 (2023). https://doi.org/10.1007/s11227-023-05363-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05363-4

Keywords

Navigation