Skip to main content
Log in

An infrastructure framework for privacy protection of community medical internet of things

Transmission protection, storage protection and access control

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

As a kind of medical service around people, community health care is closely related to peoples lives, and thus it has also been placed higher requirements. In the face of growing community medical needs, the construction and development of community medical Internet of things is imminent. Subsequently, massive multi-type of medical data which contain all kinds of user identity data, various types of vital signs data and other sensitive information are generated. Such a large scale of data in the transmission, storage and access process is facing the risk of data leakage. To effectively protect the privacy information of patients, an infrastructure framework for privacy protection of community medical Internet of things is proposed. It includes transmission protection based on multi-path asymmetric encryption fragment transmission mechanism, storage protection using distributed symmetric encryption cloud storage scheme and access control with identity authentication and dynamic access authorization. Through theoretical analysis and simulation experiments, it is proved that the community medical data can be effectively protected.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14

Similar content being viewed by others

References

  1. Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)

    Article  MATH  Google Scholar 

  2. Beato, F., Meul, S., Preneel, B.: Practical identity-based private sharing for online social networks. Comput. Commun. 73, 243–250 (2016)

    Article  Google Scholar 

  3. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption IEEE Symposium on Security and Privacy (2007)

  4. Chen, M., Qian, Y., Mao, S., et al.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)

    Article  Google Scholar 

  5. Ding, Z., Li, J., Bo, F.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)

    Google Scholar 

  6. Du, W., Deng, J., Han, Y.S., et al.: A pairwise key pre-distribution scheme for wireless sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 42–51 (2003)

  7. Forsstrom, S., Kanter, T., Osterberg, P.: Ubiquitous secure interactions with intelligent artifacts on the internet-of-things IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), pp 1520–1524 (2012)

  8. Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 516–525 (2010)

  9. Hong, Z.Z.: Research on electronic health records of community residents Fudan University (2008)

  10. Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011)

    Google Scholar 

  11. Huang, R.W., Gui, X.L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chinese J. Comput. 34(12), 2391–2402 (2011)

    Article  Google Scholar 

  12. Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunics password authentication schemes. IEICE Trans. Commun. 85(4), 823–825 (2002)

    Google Scholar 

  13. Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  14. Kamara, S., Lauter, K.: Cryptographic cloud storage Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp 136–149 (2010)

  15. Kothmayr, T., Schmitt, C., Hu, W., et al.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication IEEE 37th Conference on Local Computer Networks Workshops, pp 956–963 (2012)

  16. Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)

    Article  MathSciNet  Google Scholar 

  17. Ma, W.J.: Research and application on security authentication technologies in internet of things Shandong University (2011)

  18. Maeda, T., Sato, K., Muraoka, Y., et al.: RFID System and RFID tag. U.S. Patent 8274367 (2012)

  19. Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. Journal of Tsinghua University (Sci & Tech) 51(10), 1357–1362 (2011)

    Google Scholar 

  20. Ning, H.S., Xu, Q.Y.: Research on global internet of things developments and its lonstruction in China. Acta Electronica Sinica 38(11), 2590–2599 (2010)

    Google Scholar 

  21. Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Comput. Commun. 29(5), 660C667 (2006)

    Article  Google Scholar 

  22. Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure atrributebased systems Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 99–112 (2006)

  23. Song, Z., Zhang, Y., Wu, C.: A reliable transmission scheme for security and protection system based on internet of things IET International Conference on Communication Technology & Application, pp 806–810 (2011)

  24. Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010). A Publication of the IEEE Engineering in Medicine & Biology Society

    Article  Google Scholar 

  25. Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd International Conference on Very Large Data Base, pp 123–134 (2007)

  26. Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)

    Article  Google Scholar 

  27. Wang, B., Zhang, H., Wang, Z, et al.: A secure mutual password authentication scheme with user anonymity. Geomatics & Information Science of Wuhan University 33 (10), 1073–1075 (2008)

    Google Scholar 

  28. Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp 55–66 (2009)

  29. Wu, C.K.: An overview on the security techniques and challenges of the internet of things. Journal of Cryptologic Research 2(1), 40–53 (2015)

    Google Scholar 

  30. Wu, Z.Q., Zhou, Y.W., Ma, J.F.: A secure transmission model for internet of things. Chinese J. Comput. 34(8), 1351–1364 (2011)

    Article  Google Scholar 

  31. Xie, W.J.: A secure communication scheme based on multipath transportation for the internet of things South China University of Technology (2013)

  32. Yong-Hong, Y.U., Bai, W.Y.: Enforcing data privacy and user privacy over outsourced database service. Application Research of Computers 6(3), 404–412 (2011)

    Google Scholar 

  33. Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. - IEEE INFOCOM 29(16), 1–9 (2010)

    Google Scholar 

  34. Yuen, T.H., Chow, S.S.M, Zhang, Y., et al.: Identity-based encryption resilient to continual auxiliary leakage Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp 117–134 (2012)

  35. Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Dev. 48(7), 1155–1167 (2011)

    Google Scholar 

  36. Zhang, J., Li, H., Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. doi:10.1109/TDSC.2015.2483503 (2015)

  37. Zhang, Y., Shen, Y., Wang, H., Zhang, Y., Jiang, X.: On secure wireless communications for service oriented computing. IEEE Trans. Serv. Comput. doi:10.1109/TSC.2015.2478453 (2015)

  38. Zhang, Y., Shen, Y., Wang, H., Yong, J., Jiang, X.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)

    Article  Google Scholar 

Download references

Acknowledgements

This work was supported in part by the National Natural Science Foundation of China[No.61572036, No.61672039 and No.61402014], Anhui Province University Outstanding Youth Talent Support Program [No.gxyqZD2016026] and Anhui Provincial Natural Science Foundation [No.1708085MF156].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fulong Chen.

Additional information

This article belongs to the Topical Collection: Special Issue on Security and Privacy of IoT

Guest Editors: Tarik Taleb, Zonghua Zhang, and Hua Wang

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, F., Luo, Y., Zhang, J. et al. An infrastructure framework for privacy protection of community medical internet of things. World Wide Web 21, 33–57 (2018). https://doi.org/10.1007/s11280-017-0455-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-017-0455-z

Keywords

Navigation