Abstract
As a kind of medical service around people, community health care is closely related to peoples lives, and thus it has also been placed higher requirements. In the face of growing community medical needs, the construction and development of community medical Internet of things is imminent. Subsequently, massive multi-type of medical data which contain all kinds of user identity data, various types of vital signs data and other sensitive information are generated. Such a large scale of data in the transmission, storage and access process is facing the risk of data leakage. To effectively protect the privacy information of patients, an infrastructure framework for privacy protection of community medical Internet of things is proposed. It includes transmission protection based on multi-path asymmetric encryption fragment transmission mechanism, storage protection using distributed symmetric encryption cloud storage scheme and access control with identity authentication and dynamic access authorization. Through theoretical analysis and simulation experiments, it is proved that the community medical data can be effectively protected.
Similar content being viewed by others
References
Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 29–43 (2006)
Beato, F., Meul, S., Preneel, B.: Practical identity-based private sharing for online social networks. Comput. Commun. 73, 243–250 (2016)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption IEEE Symposium on Security and Privacy (2007)
Chen, M., Qian, Y., Mao, S., et al.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729–743 (2016)
Ding, Z., Li, J., Bo, F.: Research on hash-based RFID security authentication protocol. J. Comput. Res. Dev. 46(4), 583–592 (2009)
Du, W., Deng, J., Han, Y.S., et al.: A pairwise key pre-distribution scheme for wireless sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security, pp 42–51 (2003)
Forsstrom, S., Kanter, T., Osterberg, P.: Ubiquitous secure interactions with intelligent artifacts on the internet-of-things IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom), pp 1520–1524 (2012)
Groce, A., Katz, J.: A new framework for efficient password-based authenticated key exchange Proceedings of the 17th ACM Conference on Computer and Communications Security, pp 516–525 (2010)
Hong, Z.Z.: Research on electronic health records of community residents Fudan University (2008)
Hou, Q.H., Wu, Y.W., Zheng, W.M.: A method on protection of user data privacy in cloud storage platform. J. Comput. Res. Dev. 48(7), 1146–1154 (2011)
Huang, R.W., Gui, X.L., Yu, S., et al.: Privacy-preserving computable encryption scheme of cloud computing. Chinese J. Comput. 34(12), 2391–2402 (2011)
Hwang, J.J., Yeh, T.C.: Improvement on Peyravian-Zunics password authentication schemes. IEICE Trans. Commun. 85(4), 823–825 (2002)
Jing, Q., Vasilakos, A., Wan, J., Lu, J., Qiu, D.: Security of the internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)
Kamara, S., Lauter, K.: Cryptographic cloud storage Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp 136–149 (2010)
Kothmayr, T., Schmitt, C., Hu, W., et al.: A DTLS based end-to-end security architecture for the internet of things with two-way authentication IEEE 37th Conference on Local Computer Networks Workshops, pp 956–963 (2012)
Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770–772 (1981)
Ma, W.J.: Research and application on security authentication technologies in internet of things Shandong University (2011)
Maeda, T., Sato, K., Muraoka, Y., et al.: RFID System and RFID tag. U.S. Patent 8274367 (2012)
Mao, J., Li, K., Xu, X.: Privacy protection scheme for cloud computing. Journal of Tsinghua University (Sci & Tech) 51(10), 1357–1362 (2011)
Ning, H.S., Xu, Q.Y.: Research on global internet of things developments and its lonstruction in China. Acta Electronica Sinica 38(11), 2590–2599 (2010)
Peyravian, M., Jeffries, C.: Secure remote user access over insecure networks. Comput. Commun. 29(5), 660C667 (2006)
Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure atrributebased systems Proceedings of the 13th ACM Conference on Computer and Communications Security, pp 99–112 (2006)
Song, Z., Zhang, Y., Wu, C.: A reliable transmission scheme for security and protection system based on internet of things IET International Conference on Communication Technology & Application, pp 806–810 (2011)
Venkatasubramanian, K.K., Banerjee, A., Gupta, S.K.S.: PSKA: Usable and secure key agreement scheme for body area networks. IEEE Trans. Inf. Technol. Biomed. 14(1), 60–68 (2010). A Publication of the IEEE Engineering in Medicine & Biology Society
Vimercati, S., Foresti, S., Jajodia, S., et al.: Over-encryption: management of access control evolution on outsourced data Proceedings of the 33rd International Conference on Very Large Data Base, pp 123–134 (2007)
Wang, H., Cao, J., Zhang, Y.: A flexible payment scheme and its role-based access control. IEEE Trans. Knowl. Data Eng. 17(3), 425–436 (2005)
Wang, B., Zhang, H., Wang, Z, et al.: A secure mutual password authentication scheme with user anonymity. Geomatics & Information Science of Wuhan University 33 (10), 1073–1075 (2008)
Wang, W., Li, Z., Owens, R., et al.: Secure and efficient access to outsourced data Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp 55–66 (2009)
Wu, C.K.: An overview on the security techniques and challenges of the internet of things. Journal of Cryptologic Research 2(1), 40–53 (2015)
Wu, Z.Q., Zhou, Y.W., Ma, J.F.: A secure transmission model for internet of things. Chinese J. Comput. 34(8), 1351–1364 (2011)
Xie, W.J.: A secure communication scheme based on multipath transportation for the internet of things South China University of Technology (2013)
Yong-Hong, Y.U., Bai, W.Y.: Enforcing data privacy and user privacy over outsourced database service. Application Research of Computers 6(3), 404–412 (2011)
Yu, S., Wang, C., Ren, K., et al.: Achieving secure, scalable, and fine-grained data access control in cloud computing. Proc. - IEEE INFOCOM 29(16), 1–9 (2010)
Yuen, T.H., Chow, S.S.M, Zhang, Y., et al.: Identity-based encryption resilient to continual auxiliary leakage Proceedings of the 31st Annual International Conference on Theory and Applications of Cryptographic Techniques, pp 117–134 (2012)
Zhang, F.Z., Chen, J., Chen, H.B., et al.: Lifetime privacy and self-destruction of data in the cloud. J. Comput. Res. Dev. 48(7), 1155–1167 (2011)
Zhang, J., Li, H., Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. IEEE Trans. Dependable Secure Comput. doi:10.1109/TDSC.2015.2483503 (2015)
Zhang, Y., Shen, Y., Wang, H., Zhang, Y., Jiang, X.: On secure wireless communications for service oriented computing. IEEE Trans. Serv. Comput. doi:10.1109/TSC.2015.2478453 (2015)
Zhang, Y., Shen, Y., Wang, H., Yong, J., Jiang, X.: On secure wireless communications for IoT under eavesdropper collusion. IEEE Trans. Autom. Sci. Eng. 13(3), 1281–1293 (2016)
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China[No.61572036, No.61672039 and No.61402014], Anhui Province University Outstanding Youth Talent Support Program [No.gxyqZD2016026] and Anhui Provincial Natural Science Foundation [No.1708085MF156].
Author information
Authors and Affiliations
Corresponding author
Additional information
This article belongs to the Topical Collection: Special Issue on Security and Privacy of IoT
Guest Editors: Tarik Taleb, Zonghua Zhang, and Hua Wang
Rights and permissions
About this article
Cite this article
Chen, F., Luo, Y., Zhang, J. et al. An infrastructure framework for privacy protection of community medical internet of things. World Wide Web 21, 33–57 (2018). https://doi.org/10.1007/s11280-017-0455-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11280-017-0455-z