Resource-Efficient Secure Data Sharing for Information Centric E-Health System Using Fog Computing

Recently, an accelerating number of studies are dedicated to deploying various IoT applications in the information centric network paradigm which has lower system complexity than traditional network architectures. However, such a paradigm poses a number of security challenges especially when it is applied in real-time e-health applications. Firstly, it is difficult to ensure security of sensitive data in such a distributed data caching environment because after the data is published in the form of a packet to the information centric network (ICN), it is no longer controlled by the data publisher. Secondly, in some real-time e-health applications, terminal medical sensors are usually resource-constrained, limiting the direct adoption of expensive cryptographic primitives. In order to address these challenges, a resource-efficient secure data sharing scheme in information centric e-health system is proposed, one that utilizes ciphertext-policy attribute based encryption (CP-ABE) and adapts it to the above-mentioned system with respect to necessary security requirements. It also exploits computation resources of fog nodes and employs outsourcing cryptography to improve system efficiency.The evaluation demonstrates that the scheme can significantly reduce the computation overheads of the resource-constrained terminal medical devices, and can better support the real-time e-health applications.

[1]  Brent Waters,et al.  Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys , 2005, CRYPTO.

[2]  George C. Polyzos,et al.  Efficient real-time information delivery in Future Internet Publish-Subscribe Networks , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[3]  Dijiang Huang,et al.  Attribute-based Access Control for ICN Naming Scheme , 2018, IEEE Trans. Dependable Secur. Comput..

[4]  Ruidong Li,et al.  A Verifiable and Flexible Data Sharing mechanism for Information-Centric IoT , 2017, 2017 IEEE International Conference on Communications (ICC).

[5]  Mianxiong Dong,et al.  FCSS: Fog-Computing-based Content-Aware Filtering for Security Services in Information-Centric Social Networks , 2019, IEEE Transactions on Emerging Topics in Computing.

[6]  Mianxiong Dong,et al.  Foud: Integrating Fog and Cloud for 5G-Enabled V2G Networks , 2017, IEEE Network.

[7]  Christopher A. Wood,et al.  Flexible end-to-end content security in CCN , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[8]  George Xylomenos,et al.  Towards an error control scheme for a publish/subscribe network , 2013, 2013 IEEE International Conference on Communications (ICC).

[9]  Minyi Guo,et al.  Joint Optimization of Lifetime and Transport Delay under Reliability Constraint Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.

[10]  David R. Oran Information centric networking for media distribution: will it blend? , 2013, FhMN@SIGCOMM.

[11]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[12]  Jin Li,et al.  Outsourcing Encryption of Attribute-Based Encryption with MapReduce , 2012, ICICS.

[13]  Ali Tizghadam,et al.  An ICN-based publish-subscribe platform to deliver UAV service in smart cities , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).