Secure e-Health System for the Integrated Management of Personal Health Data Collected by IoT Devices

The definition of a smart city as a broad concept values the versatile acquisition, storage, and processing of relevant data for the city’s community. In this context, health data occupies a privileged place. The reliable gathering of personal health information has become recently possible through wearable medical devices. These devices usually do not store the data locally and offer, in the most favorable case, limited basic data processing features, and virtually no advanced processing capabilities for the collected personal health data. This paper describes an integrated distributed e-Health system, which collects health data from the enrolled city residents, and allows secure storage and processing of medical data in the cloud by using a comprehensive encryption model to preserve the data privacy, which is based on the NTRU public-key cryptosystem. The correct assignment of the medical data to the respective person is verified by the usage of a hash-based digital signature mechanism. The system collects the user data through a client application module that is installed on the user’s smartphone or smartwatch and securely transports it to the cloud backend. The homomorphic processing of the encrypted data is performed using the Apache Spark service. The eventbased handlers are triggered by the IBM OpenWhisk programming service. The prototype has been tested using a real-world use case, which involves five hundred residents of Brasov City, Romania.

[1]  Yuguang Fang,et al.  Privacy-Preserving Verifiable Proximity Test for Location-Based Services , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[2]  N. Cao,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  Erkay Savas,et al.  An efficient privacy-preserving multi-keyword search over encrypted cloud data with ranking , 2014, Distributed and Parallel Databases.

[4]  Marek Aleksander,et al.  New Secure Block Cipher for Critical Applications: Design, Implementation, Speed and Security Analysis , 2019 .

[5]  Samah Osama M. Kamel,et al.  Mitigating the Impact of IoT Routing Attacks on Power Consumption in IoT Healthcare Environment using Convolutional Neural Network , 2020 .

[6]  Rosario Gennaro,et al.  Efficiently Verifiable Computation on Encrypted Data , 2014, CCS.

[7]  Chi Zhang,et al.  Verifiable Privacy-Preserving Aggregation in People-Centric Urban Sensing Systems , 2013, IEEE Journal on Selected Areas in Communications.

[8]  Anders Carlsson,et al.  Investigation of the IoT Device Lifetime with Secure Data Transmission , 2019, NEW2AN.

[9]  Rosario Gennaro,et al.  Improved Publicly Verifiable Delegation of Large Polynomials and Matrix Computations , 2012, IACR Cryptol. ePrint Arch..

[10]  Gebräuchliche Fertigarzneimittel,et al.  V , 1893, Therapielexikon Neurologie.

[11]  Roberto Tamassia,et al.  Optimal Verification of Operations on Dynamic Sets , 2011, CRYPTO.

[12]  P. Alam ‘A’ , 2021, Composites Engineering: An A–Z Guide.

[13]  Murat Kantarcioglu,et al.  Efficient Similarity Search over Encrypted Data , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[14]  Trent Jaeger,et al.  Outlook: Cloudy with a Chance of Security Challenges and Improvements , 2010, IEEE Security & Privacy.

[15]  Rosario Gennaro,et al.  Publicly verifiable delegation of large polynomials and matrix computations, with applications , 2012, IACR Cryptol. ePrint Arch..

[16]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[17]  Sergiy Gnatyuk,et al.  Method of Traffic Monitoring for DDoS Attacks Detection in e-Health Systems and Networks , 2018, IDDM.

[18]  Qinghua Li,et al.  Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.