skip to main content
10.1145/3508072.3508082acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System

Published: 13 April 2022 Publication History

Abstract

Historically, health data was stored locally on the hospital’s server as patient health records, and we had to rely on the planned check-up during doctor’s visits. Now, we can monitor health continuously and in real-time. Remote healthcare monitoring can also be helpful in setting up alerts, allowing early intervention and treatment. In this way, the patient gets timely treatment, avoids doctor visits or hospitalization hassles, and reduces healthcare expenses. Additionally, in an ambulance, real-time patient data can be sent to the physician via wireless communication which can save the life of a critical patient. The critical problem that arises in Internet of Medical Things (IoMT) is how securely the health vitals can be transmitted to the physician. There are numerous ways to transmit data securely to the physician, however Identity-based cryptography is the most popular these days to provide solutions for secure transmission. Identity-based cryptography is the public key cryptography in which an arbitrary string representing an individual is used as a public key. Biometric information based public key generation by identity based encryption is a potential candidate for providing a solution to such a problem. In this work, we propose using facial biometric information of the clinicians to create a public key for encrypting health vitals of a patient.

References

[1]
Hadeal Abdulaziz Al Hamid, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, and Atif Alamri. 2017. A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography. IEEE Access 5(2017), 22313–22328. https://doi.org/10.1109/ACCESS.2017.2757844
[2]
Sana Belguith, Nesrine Kaaniche, Mohammad Hammoudeh, and Tooska Dargahi. 2020. Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications. Future Generation Computer Systems 111 (2020), 899–918.
[3]
Ian Blake, Gadiel Seroussi, and Nigel Smart (Eds.). 2005. Advances in Elliptic Curve Cryptography. Cambridge University Press. https://doi.org/10.1017/CBO9780511546570
[4]
Marina Blanton and Paolo Gasti. 2011. Secure and efficient protocols for iris and fingerprint identification. In European Symposium on Research in Computer Security. Springer, 190–209.
[5]
Dan Boneh, Xavier Boyen, and Eu-Jin Goh. 2005. Hierarchical identity based encryption with constant size ciphertext. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 440–456.
[6]
B Chen and Vinod Chandran. 2007. Biometric based cryptographic key generation from faces. In 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007). IEEE, 394–401.
[7]
Steven D Galbraith, Kenneth G Paterson, and Nigel P Smart. 2008. Pairings for cryptographers. Discrete Applied Mathematics 156, 16 (2008), 3113–3121.
[8]
Steven D. Galbraith, Kenneth G. Paterson, and Nigel P. Smart. 2008. Pairings for cryptographers. Discrete Applied Mathematics 156, 16 (2008), 3113–3121. https://doi.org/10.1016/j.dam.2007.12.010 Applications of Algebra to Cryptography.
[9]
Craig Gentry. 2006. Practical identity-based encryption without random oracles. In Annual international conference on the theory and applications of cryptographic techniques. Springer, 445–464.
[10]
Jorge Gómez, Byron Oviedo, and Emilio Zhuma. 2016. Patient monitoring system based on internet of things. Procedia Computer Science 83 (2016), 90–97.
[11]
Manju Khari, Aditya Kumar Garg, Amir H Gandomi, Rashmi Gupta, Rizwan Patan, and Balamurugan Balusamy. 2019. Securing data in Internet of Things (IoT) using cryptography and steganography techniques. IEEE Transactions on Systems, Man, and Cybernetics: Systems 50, 1(2019), 73–80.
[12]
Allison Lewko and Brent Waters. 2014. Why proving HIBE systems secure is difficult. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 58–76.
[13]
Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou. 2013. Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption. IEEE Transactions on Parallel and Distributed Systems 24, 1 (2013), 131–143. https://doi.org/10.1109/TPDS.2012.97
[14]
Miracl. [n.d.]. MIRACL/MIRACL: MIRACL CRYPTOGRAPHIC SDK: Multiprecision integer and rational arithmetic cryptographic library is a C software library that is widely regarded by developers as the gold standard open source SDK for elliptic curve cryptography (ECC).https://github.com/miracl/MIRACL
[15]
Steve Moffat, Mohammad Hammoudeh, and Robert Hegarty. 2017. A survey on ciphertext-policy attribute-based encryption (CP-ABE) approaches to data security on mobile devices and its application to IoT. In Proceedings of the International Conference on Future Networks and Distributed Systems.
[16]
Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, and Tatsuya Suzuki. 2020. Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings. International Journal of Networking and Computing 10 (07 2020), 174–188. https://doi.org/10.15803/ijnc.10.2_174
[17]
HD Phaneendra 2014. Identity-based cryptography and comparison with traditional public key encryption: A survey. International Journal of Computer Science and Information Technologies 5, 4(2014), 5521–5525.
[18]
Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. In Annual international conference on the theory and applications of cryptographic techniques. Springer, 457–473.
[19]
Neyire Deniz Sarier. 2018. Multimodal biometric identity based encryption. Future Generation Computer Systems 80 (2018), 112–125.
[20]
Adil Hussain Seh, Mohammad Zarour, Mamdouh Alenezi, Amal Krishna Sarkar, Alka Agrawal, Rajeev Kumar, and Raees Ahmad Khan. 2020. Healthcare data breaches: Insights and implications. In Healthcare, Vol. 8. Multidisciplinary Digital Publishing Institute, 133.
[21]
Adi Shamir. 1984. Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques. Springer, 47–53.
[22]
R Somasundaram and Mythili Thirugnanam. 2020. Review of security challenges in healthcare internet of things. Wireless Networks (2020), 1–7.
[23]
Steven Walker-Roberts, Mohammad Hammoudeh, Omar Aldabbas, Mehmet Aydin, and Ali Dehghantanha. 2020. Threats on the horizon: Understanding security threats in the era of cyber-physical systems. The Journal of Supercomputing 76, 4 (2020), 2643–2664.
[24]
Liwei Wang, Yan Zhang, and Jufu Feng. 2005. On the Euclidean distance of images. IEEE transactions on pattern analysis and machine intelligence 27, 8(2005), 1334–1339.
[25]
Brent Waters. 2005. Efficient identity-based encryption without random oracles. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 114–127.
[26]
Lifang Wu, Xingsheng Liu, Songlong Yuan, and Peng Xiao. 2010. A novel key generation cryptosystem based on face features. In IEEE 10th International Conference on Signal Processing Proceedings. IEEE, 1675–1678.
[27]
Mohammed Zubair, Devrim Unal, Abdulla Al-Ali, and Abdullatif Shikfa. 2019. Exploiting bluetooth vulnerabilities in e-health IoT devices. In Proceedings of the 3rd International Conference on Future Networks and Distributed Systems. 1–7.

Cited By

View all
  • (2024)Fault-tolerant identity-based encryption from SM9Science China Information Sciences10.1007/s11432-022-3706-767:2Online publication date: 22-Jan-2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICFNDS '21: Proceedings of the 5th International Conference on Future Networks and Distributed Systems
December 2021
847 pages
ISBN:9781450387347
DOI:10.1145/3508072
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Biometric identity based encryption
  2. Fuzzy Identity based Encryption
  3. Internet of Medical Things
  4. Type-3 pairing
  5. User authentication

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ICFNDS 2021

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)14
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Fault-tolerant identity-based encryption from SM9Science China Information Sciences10.1007/s11432-022-3706-767:2Online publication date: 22-Jan-2024

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media