Abstract
Pervasive data collected from e-healthcare devices possess significant medical value through data sharing with professional healthcare service providers. However, health data sharing poses several security issues, such as access control and privacy leakage, as well as faces critical challenges to obtain efficient data analysis and services. In this article, we propose an efficient and privacy-preserving fog-assisted health data sharing (PFHDS) scheme for e-healthcare systems. Specifically, we integrate the fog node to classify the shared data into different categories according to disease risks for efficient health data analysis. Meanwhile, we design an enhanced attribute-based encryption method through combination of a personal access policy on patients and a professional access policy on the fog node for effective medical service provision. Furthermore, we achieve significant encryption consumption reduction for patients by offloading a portion of the computation and storage burden from patients to the fog node. Security discussions show that PFHDS realizes data confidentiality and fine-grained access control with collusion resistance. Performance evaluations demonstrate cost-efficient encryption computation, storage and energy consumption.
- Moreno Ambrosin, Mauro Conti, and Tooska Dargahi. 2015. On the feasibility of attribute-based encryption on smartphone devices. In Proceedings of the Annual Conference on IoT Challenges in Mobile and Industrial Systems (IoT-Sys’15). 49--54.Google ScholarDigital Library
- Diego F. Aranha and Conrado Porto Lopes Gouvea. 2013. RELIC. Retrieved May 2, 2018 from https://github.com/relic-toolkit/relic.Google Scholar
- Joakim Borgh, Edith Ngai, Börje Ohlman, and AdeelMohammad Malik. 2017. Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context. In Proceedings of the Global IoT Summit (GIoTS’17). 1--6.Google ScholarCross Ref
- Raphael Bost, RalucaAda Popa, Stephen Tu, and Shafi Goldwasser. 2015. Machine learning classification over encrypted data. In Proceedings of the Annual Network and Distributed System Security Symposium (NDSS’15). 1--14.Google ScholarCross Ref
- Yu Cao, Peng Hou, Donald Brown, Jie Wang, and Songqing Chen. 2015. Distributed analytics and edge intelligence: Pervasive health monitoring at the era of fog computing. In Proceedings of the Annual Conference on Mobidata. 43--48.Google ScholarDigital Library
- Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, and Long Hu. 2016. Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans. Cloud Comput. (2016). DOI:10.1109/TCC.2016.2617382Google Scholar
- ChengKang Chu, ShermanSM Chow, WenGuey Tzeng, Jianying Zhou, and RobertH Deng. 2014. Key-aggregate cryptosystem for scalable data sharing in cloud storage. IEEE Trans. Parallel Distrib. Syst. 25, 2 (2014), 468--477.Google ScholarDigital Library
- Dan Dobre, Paolo Viotti, and Marko Vukolić. 2014. Hybris: Robust hybrid cloud storage. In Proceedings of the ACM Symposium on Cloud Computing (SoCC’14). 1--14.Google ScholarDigital Library
- Martin Dugas, Philipp Neuhaus, Alexandra Meidt, Justin Doods, Michael Storck, Philipp Bruland, and Julian Varghese. 2016. Portal of medical data models: Information infrastructure for medical research and healthcare. Database: The Journal of Biological Databases 8 Curation (Oxford) 2016, Article bav121 (2016). DOI:10.1093/database/bav121Google Scholar
- Yaniv Harel, Irad Ben Gal, and Yuval Elovici. 2017. Cyber security and the role of intelligent systems in addressing its challenges. ACM Trans. Intell. Syst. Technol. 8, 4 (2017), 49.Google ScholarDigital Library
- Cheng Huang, Rongxing Lu, Hui Zhu, Jun Shao, and Xiaodong Lin. 2016. FSSR: Fine-grained EHRs sharing via similarity-based recommendation in cloud-assisted eHealthcare system. In Proceedings of the Annual Conference of the ACM ASIA Conference on Computer and Communications Security (AisaCCS’16). 95--106.Google ScholarDigital Library
- Jiawen Kang, Rong Yu, Xumin Huang, Maoqiang Wu, Sabita Maharjan, Shengli Xie, and Yan Zhang. 2018. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE IoT J. 6, 3 (2018), 4660--4670. DOI:10.1109/JIOT.2018.2875542Google Scholar
- Eduard Kovacs. 2013. FDA Issues Alert Over Vulnerable Hospira Drug Pumps. Retrieved May 2, 2018 from http://www.securityweek.com/fda-issues-alert-over-vulnerable-hospira-drug-pumps.Google Scholar
- Jin Li, YanKit Li, Xiaofeng Chen, PatrickPC Lee, and Wenjing Lou. 2015. A hybrid cloud approach for secure authorized deduplication. IEEE Trans. Parallel Distrib. Syst. 26, 5 (2015), 1206--1216.Google ScholarDigital Library
- Jin Li, Yinghui Zhang, Xiaofeng Chen, and Yang Xiang. 2018. Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72 (2018), 1--12.Google ScholarDigital Library
- Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou. 2013. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 24, 1 (2013), 131--143.Google ScholarDigital Library
- Qing Liu, BryanP Yan, CheukMan Yu, YuanTing Zhang, and CarmenCY Poon. 2014. Attenuation of systolic blood pressure and pulse transit time hysteresis during exercise and recovery in cardiovascular patients. IEEE Trans. Biomed. Eng. 61, 2 (2014), 346--352.Google ScholarCross Ref
- W Liu and E. K. Park. 2014. Big data as an e-health service. In Proceedings of the International Conference on Computing, Networking and Communication (ICNC’14). 982--988.Google Scholar
- Ximeng Liu, Robert H. Deng, Yang Yang, Hieu N. Tran, and Shangping Zhong. Hybrid privacy-preserving clinical decision support system in fog--cloud computing. (unpublished).Google Scholar
- Ximeng Liu, Rongxing Lu, Jianfeng Ma, Le Chen, and Baodong Qin. 2016. Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification. IEEE J. Biomed. Health Inf. 20, 2 (2016), 655--668.Google ScholarCross Ref
- Yi Liu, Yinghui Zhang, Jie Ling, and Zhusong Liu. 2017. Secure and fine-grained access control on e-healthcare records in mobile cloud computing. Fut. Gener. Comput. Syst. 78, 3 (2017).Google Scholar
- Xuhong Peng, Ju Ren, Liang She, Deyu Zhang, Jie Li, and Yaoxue Zhang. 2018. Boat: A block-streaming app execution scheme for lightweight iot devices. IEEE IoT J. 5, 3 (2018), 1816--1829.Google Scholar
- Aarathi Prasad, Xiaohui Liang, and David Kotz. 2014. Poster: Balancing disclosure and utility of personal information. In Proceedings of the International Conference on Mobile Systems, Applications, and Services (MobiSys’14). 380--381.Google ScholarDigital Library
- Amir Rahmani, Tuan Gia, Behailu Negash, Arman Anzanpour, Iman Azimi, Mingzhe Jiang, and Pasi Liljeberg. 2017. Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach. Fut. Gener. Comput. Syst. 78 (2017), 641--658.Google ScholarDigital Library
- Ju Ren, Hui Guo, Chugui Xu, and Yaoxue Zhang. 2017. Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Netw. 31, 5 (2017), 96--105.Google ScholarDigital Library
- Adi Shamir. 1979. How to share a secret. Commun. ACM 22, 11 (1979), 612--613.Google ScholarDigital Library
- Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, and Willy Susilo. 2017. Anonymous and traceable group data sharing in cloud computing. IEEE Trans. Inf. Forens. Secur. 13, 4 (2017), 912--925.Google ScholarCross Ref
- Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, and Xuemin Shen. 2019. Flexible and efficient authenticated key agreement scheme for bans based on physiological features. IEEE Trans. Mobile Comput. 18, 4 (2019), 845--856.Google ScholarDigital Library
- Wenjuan Tang, Kuan Zhang, Deyu Zhang, Ju Ren, Yaoxue Zhang, and Xuemin Sherman Shen. 2019. Fog-enabled smart health: Toward cooperative and secure healthcare service provision. IEEE Commun. Mag. 57, 5 (2019), 42--48.Google ScholarCross Ref
- Yue Tong, Jinyuan Sun, Sherman Chow, and Pan Li. 2013. Towards auditable cloud-assisted access of encrypted health data. In Proceedings of the Annual Conference of the Canadian Nuclear Society. 514--519.Google Scholar
- Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen, and Weixin Xie. 2016. An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forens. Secur. 11, 6 (2016), 1265--1277.Google ScholarDigital Library
- Xinlei Wang, Jianqing Zhang, Eve M. Schooler, and Mihaela Ion. 2014. Performance evaluation of attribute-based encryption: Toward data privacy in the IoT. In Proceedings of the Annual Conference on IEEE International Conference on Communications (ICC’14). 725--730.Google ScholarCross Ref
- Brent Waters. 2011. Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In Proceedings of the International Conference on Theory and Practice in Public Key Cryptography (PKC’11). 53--70.Google ScholarCross Ref
- Chugui Xu, Ju Ren, Yaoxue Zhang, Zhan Qin, and Kui Ren. 2017. Dppro: Differentially private high-dimensional data release via random projection. IEEE Trans. Inf. Forens. Secur. 12, 12 (2017), 3081--3093.Google ScholarDigital Library
- Yang Xu, Ju Ren, Guojun Wang, Cheng Zhang, Jidian Yang, and Yaoxue Zhang. 2019. A blockchain-based non-repudiation network computing service scheme for industrial IoT. IEEE Trans. Industr. Inf. 15, 6 (2019), 3632--3641. DOI:10.1109/TII.2019.2897133Google ScholarCross Ref
- Zhongyuan Xu and ScottD Stoller. 2015. Mining attribute-based access control policies. IEEE Trans. Depend. Sec. Comput. 12, 5 (2015), 533--545.Google ScholarDigital Library
- JiJiang Yang, JianQiang Li, and Yu Niu. 2015. A hybrid solution for privacy preserving medical data sharing in the cloud environment. Fut. Gener. Comput. Syst. 43 (2015), 74--86.Google ScholarDigital Library
- Kan Yang, Zhen Liu, Xiaohua Jia, and Xuemin Shen. 2016. Time-domain attribute-based access control for cloud-based video content sharing: A cryptographic approach. IEEE Trans. Multimed. 18, 5 (2016), 940--950.Google ScholarDigital Library
- LoYao Yeh, WoeiJiunn Tsaur, and HsinHan Huang. 2017. Secure IoT-based, incentive-aware emergency personnel dispatching scheme with weighted fine-grained access control. ACM Trans. Intell. Syst. Technol. 9, 1 (2017), 10.Google ScholarDigital Library
- Hui Yin, Zheng Qin, Lu Ou, and Keqin Li. 2017. A query privacy-enhanced and secure search scheme over encrypted data in cloud computing. J. Comput. Syst. Sci. 90 (2017), 14--27.Google ScholarCross Ref
- Kuan Zhang, Xiaohui Liang, Jianbing Ni, Kan Yang, and Xuemin Shen. Exploiting social network to enhance human-to-human infection analysis without privacy leakage. (unpublished).Google Scholar
- Kuan Zhang, Kan Yang, Xiaohui Liang, Zhou Su, Xuemin Shen, and Henry H. Luo. 2015. Security and privacy for mobile healthcare networks: From a quality of protection perspective. IEEE Wireless Commun. 22, 4 (2015), 104--112.Google ScholarDigital Library
- Lide Zhang, Birjodh Tiwana, Zhiyun Qian, Zhaoguang Wang, Robert P. Dick, ZhuoqingMorley Mao, and Lei Yang. 2010. Accurate online power estimation and automatic battery behavior based power model generation for smartphones. In Proceedings of the Annual Conference on International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS’10). 105--114.Google ScholarDigital Library
- Shaobo Zhang, Xiong Li, Zhiyuan Tan, Tao Peng, and Guojun Wang. 2019. A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Fut. Gener. Comput. Syst. 94 (2019), 40--50.Google ScholarDigital Library
- Yin Zhang, Meikang Qiu, ChunWei Tsai, MohammadMehedi Hassan, and Atif Alamri. 2017. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11, 1 (2017), 88--95.Google ScholarCross Ref
- Alicia L. Nobles, Ketki Vilankar, Hao Wu, and Laura E. Barnes. 2015. Evaluation of data quality of multisite electronic health record data for secondary analysis. In Proceedings of IEEE International Conference on Big Data (BigData'15). 2612--2620.Google Scholar
Index Terms
- Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme
Recommendations
CP2EH: a comprehensive privacy-preserving e-health scheme over cloud
AbstractIn the Attribute-Based Encryption (ABE) scheme, patients encrypt their electronic health record (EHR), attach the appropriate attributes with it, and outsource them over the cloud. Doctors get the encrypted EHR corresponding to their area of ...
An efficient access control scheme with outsourcing capability and attribute update for fog computing
Fog computing as an extension of cloud computing provides computation, storage and application services to end users. Ciphertext-policy attribute-based encryption (CP-ABE) is a well-known cryptographic technology for guaranteeing data confidentiality ...
Secured Collaboration with Ciphertext Policy Attribute Based Signcryption in a Distributed Fog Environment for Medical Data Sharing
Information Systems SecurityAbstractSmart hospitals are leveraging cloud computing as a practical platform for storing and sharing medical data, enhancing medical analyses. However, entrusting sensitive medical data to third parties poses risks to patient privacy. Cloud-based data ...
Comments