Skip to main content
Log in

Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks (WSNs) have been widely used in many applications recently. As an important application of the WSNs, the wireless medical sensor networks (WMSNs) could improve health-care quality and have become significant in the modern medical system. WMSNs devices typically have limited computing, storage and communication capabilities. To enhance the capabilities of WSNs, cloud-assisted WMSNs have been introduced, and they can provide more efficient processing of cloud users’ medical data records stored in the cloud. The integrity of medical data records is very important since these data will be used to provide a medical diagnosis and other medical treatments. In this paper, we propose an efficient integrity verification scheme for medical data records in cloud-assisted WMSNs. Based on elliptic curve digital signature algorithm, we construct linearly homomorphic authenticator, so that the third party auditor (TPA) can verify the the integrity of medical data records without bringing in new security threats. TPA does not need to retrieve the entire medical data records, thus can dramatically reduce the communication and computation overhead. Moreover, we further extend our scheme to support batch integrity verification for multiple cloud users simultaneously. In particular, to achieve efficient medical data dynamic operations, using index hash tables, our scheme can execute dynamic operations efficiently. Performance comparison shows that our scheme is more light-weight, and can be used much more practically in cloud-assisted WMSNs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Kumar, P., Lee, Y. D., & Lee, H. J., (2010). Secure health monitoring using medical wireless conference on networked. In Proceedings of the 6th international conference on networked computing and advanced information management (NCM’10), Seoul, Korea (pp. 491–494).

  2. Kumar, P., Lee, S., & Lee, H. (2012). E-SAP: Efficient-strong authentication protocol for healthcare applications using wireless medical sensor networks. Sensors, 12, 1625–1647.

    Article  Google Scholar 

  3. Huang, Y. M., Hsieh, M. Y., Chao, H. C., Hung, S. H., & Park, J. H. (2009). Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks. IEEE Journal of Selected Areas in Communication, 27, 400–411.

    Article  Google Scholar 

  4. He, D., Chen, J., & Zhang, R. (2012). A more secure authentication scheme for telecare medicine information systems. Journal of Medical Systems, 36(3), 1989–1995.

    Article  Google Scholar 

  5. He, D., Kumar, N., Jianhua, C., Lee, C. C., Chilamkurti, N., & Yeo, S. S. (2015). Robust anonymous authentication protocol for health-care applications using wireless medical sensor networks. Multimedia Systems, 21, 49–60.

    Article  Google Scholar 

  6. Sun, J., Fang, Y., & Zhu, X. (2010). Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wireless Communication, 17(1), 51–8.

    Article  Google Scholar 

  7. Wang, H., Wu, Q., Qin, B., & Josep, D. F. (2014). FRR: Fair remote retrieval of putsourced private medical records in electronic health nwtworks. Journal of Biomedical Informatiocs, 50, 226–233.

    Article  Google Scholar 

  8. Cloud Security Alliance. (2010). Top threats to cloud computing. http://www.cloudsecurityalliance.org.

  9. Wang, Q., Wang, C., Ren, K., Lou, W., & Li, J. (2011). Enabling public auditability and data dynamics for storage security in cloud computing. IEEE Transactions on Parallel and Distributed systems, 22(5), 847–859.

    Article  Google Scholar 

  10. Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., & Song, D. (2007). Provable data possession at untrusted stores. In Proceeding of the 14th ACM conference computer and communication security (CCS’07) (pp. 598–609).

  11. Shah, M. A., Swaminathan, R. & Baker, M. (2008). Privacy-preserving auditing and extraction of digital contents. Cryptology ePrint Archive, Report 2008/186.

  12. Wang, Q., Wang, C., Li, J., Ren, K. & Lou, W. (Sep.2009). Enabling public verifiability and data dynamics for storage security in cloud computing. In Proceeding of ESORICS’09, Saint Malo, France.

  13. Shacham, H., & Waters, B. (2008). Compact proofs of retrievability. In Proceedings of Asiacrypt 2008 (vol. 5350, pp. 90-107). Springer, Berlin.

  14. Juels, A., Burton, J. & Kaliski, S. (2007). Pors: Proofs of retrievability for large files. In Proceedings of CCS’07, Alexandia, VA (pp. 584–597).

  15. Zhu, Y., Wang, H., Hu. Z., Ahn, G. J., Hu, H., & Yau, S. (2011). Dynamic audit services for integrity verification of outsourced storages in clouds. In Proceeding of the 2011 ACM symposium on applied computing, ser. SAC’11. New York, NY, USA (pp. 1550–1557).

  16. Wang, H. (2013). Proxy provable data possession in public clouds. IEEE Transactions on Service Computing, 6(4), 551–559.

    Article  MathSciNet  Google Scholar 

  17. Yuan, J. & Yu, S. (2013) Proofs of retrievability with public verifiability and constant communication cost in cloud. In Proceedings of the 2013 international workshop on security in cloud computing, Hangzhou, China (pp. 19–26).

  18. Wang, C., Chow, S. M., Wang, Q., Ren, K., & Lou, W. (2013). Privacy-preserving public auditing for secure cloud storage. IEEE Transactions on Computers, 62(2), 362–375.

    Article  MathSciNet  MATH  Google Scholar 

  19. He, D., Zeadally, S. & Wu, L. (2015). Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Systems Journal, pp. 1–10. doi:10.1109/JSYST.2015.2428620.

  20. Wang, B., Li, B., & Li, H. (2015). Panda: Public auditing for shared data with efficient user revocation in the cloud. IEEE Transactions on Services Computing, 8(1), 92C106.

    Article  Google Scholar 

  21. Zhang, Y., Xu, C., Yu, S., Li, H., & Zhang, X. (2015). Sclpv: Secure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors. IEEE Transactions on Computational Social Systems, 2(4), 159C170.

    Article  Google Scholar 

  22. Yu, J., Ren, K., Wang, C., & Varadharajan, V. (2015). Enabling cloud storage auditing with key-exposure resistance. IEEE Transactions on Information Forensics and Security, 10(6), 1167–1179.

    Article  Google Scholar 

  23. Ferrara, A. L., Green, M, Hohenberger, S, & Pedersen, M. (2009). Practical short signature batch verification. In Proceedings Cryptographers’ Track at the RSA Conference 2009 on Topics in Cryptology (CT-RSA) (pp. 309–324).

  24. Ateniese, G., Pietro, R. D., Mancini, L. V., & Tsudik, G. (2008). Scalable and efficient provable data possession. In Proceedings of the 4th interanational conference security and privacy in Communication Networks (SecureComm’08) (pp. 1–10).

  25. Wang, C., Wang, Q., Ren, K., & Lou, W. (2012). Towards secure and dependable storage services in cloud computing. IEEE Transactions on Service Computing, 5(2), 220–232.

    Article  Google Scholar 

  26. Erway, C., Kupcu, A., Papamanthou, C., & Tamassia, R. (2009). Dynamic provable data possession. In Proceedings of the ACM Conference Computer and Communication Security (CCS’09) (pp. 213–222).

Download references

Acknowledgements

The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work is supported by the National Natural Science Foundation of China (No. 61370203) and the Young Scholars Development Fund of SWPU (No. 201599010139).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaojun Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, X., Xu, C., Zhang, Y. et al. Efficient Integrity Verification Scheme for Medical Data Records in Cloud-Assisted Wireless Medical Sensor Networks. Wireless Pers Commun 96, 1819–1833 (2017). https://doi.org/10.1007/s11277-017-4270-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4270-8

Keywords

Navigation