Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme

Pervasive data collected from e-healthcare devices possess significant medical value through data sharing with professional healthcare service providers. However, health data sharing poses several security issues, such as access control and privacy leakage, as well as faces critical challenges to obtain efficient data analysis and services. In this article, we propose an efficient and privacy-preserving fog-assisted health data sharing (PFHDS) scheme for e-healthcare systems. Specifically, we integrate the fog node to classify the shared data into different categories according to disease risks for efficient health data analysis. Meanwhile, we design an enhanced attribute-based encryption method through combination of a personal access policy on patients and a professional access policy on the fog node for effective medical service provision. Furthermore, we achieve significant encryption consumption reduction for patients by offloading a portion of the computation and storage burden from patients to the fog node. Security discussions show that PFHDS realizes data confidentiality and fine-grained access control with collusion resistance. Performance evaluations demonstrate cost-efficient encryption computation, storage and energy consumption.

[1]  Shaobo Zhang,et al.  A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services , 2019, Future Gener. Comput. Syst..

[2]  Lei Yang,et al.  Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).

[3]  Scott D. Stoller,et al.  Mining Attribute-Based Access Control Policies , 2013, IEEE Transactions on Dependable and Secure Computing.

[4]  Yuval Elovici,et al.  Cyber Security and the Role of Intelligent Systems in Addressing its Challenges , 2017, ACM Trans. Intell. Syst. Technol..

[5]  Shengli Xie,et al.  Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.

[6]  Ju Ren,et al.  Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing , 2017, IEEE Network.

[7]  Woei-Jiunn Tsaur,et al.  Secure IoT-Based, Incentive-Aware Emergency Personnel Dispatching Scheme with Weighted Fine-Grained Access Control , 2017, ACM Trans. Intell. Syst. Technol..

[8]  Xiaodong Lin,et al.  FSSR: Fine-Grained EHRs Sharing via Similarity-Based Recommendation in Cloud-Assisted eHealthcare System , 2016, AsiaCCS.

[9]  Pan Li,et al.  Towards auditable cloud-assisted access of encrypted health data , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[10]  Ju Ren,et al.  Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features , 2019, IEEE Transactions on Mobile Computing.

[11]  Jian Shen,et al.  Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.

[12]  Jianfeng Ma,et al.  Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification , 2016, IEEE Journal of Biomedical and Health Informatics.

[13]  Jie Ling,et al.  Secure and fine-grained access control on e-healthcare records in mobile cloud computing , 2018, Future Gener. Comput. Syst..

[14]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[15]  Weixin Xie,et al.  An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing , 2016, IEEE Transactions on Information Forensics and Security.

[16]  Yang Xu,et al.  A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT , 2019, IEEE Transactions on Industrial Informatics.

[17]  Meikang Qiu,et al.  Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.

[18]  Jianqiang Li,et al.  A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..

[19]  Xiaohui Liang,et al.  Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.

[20]  Robert H. Deng,et al.  Hybrid privacy-preserving clinical decision support system in fog-cloud computing , 2018, Future Gener. Comput. Syst..

[21]  Xiaohui Liang,et al.  Exploiting Social Network to Enhance Human-to-Human Infection Analysis without Privacy Leakage , 2018, IEEE Transactions on Dependable and Secure Computing.

[22]  Hao Wu,et al.  Evaluation of data quality of multisite electronic health record data for secondary analysis , 2015, 2015 IEEE International Conference on Big Data (Big Data).

[23]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[24]  Keqin Li,et al.  A query privacy-enhanced and secure search scheme over encrypted data in cloud computing , 2017, J. Comput. Syst. Sci..

[25]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[26]  Robert H. Deng,et al.  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage , 2014, IEEE Transactions on Parallel and Distributed Systems.

[27]  Carmen C. Y. Poon,et al.  Attenuation of Systolic Blood Pressure and Pulse Transit Time Hysteresis During Exercise and Recovery in Cardiovascular Patients , 2014, IEEE Transactions on Biomedical Engineering.

[28]  Jie Wang,et al.  Distributed Analytics and Edge Intelligence: Pervasive Health Monitoring at the Era of Fog Computing , 2015, Mobidata@MobiHoc.

[29]  W. Liu,et al.  Big Data as an e-Health Service , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[30]  Dan Dobre,et al.  Hybris: Robust Hybrid Cloud Storage , 2014, SoCC.

[31]  Tooska Dargahi,et al.  On the Feasibility of Attribute-Based Encryption on Smartphone Devices , 2015, IoT-Sys@MobiSys.

[32]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[33]  Jianqing Zhang,et al.  Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT , 2014, 2014 IEEE International Conference on Communications (ICC).

[34]  Ju Ren,et al.  Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision , 2019, IEEE Communications Magazine.

[35]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[36]  Edith C. H. Ngai,et al.  Employing attribute-based encryption in systems with resource constrained devices in an information-centric networking context , 2017, 2017 Global Internet of Things Summit (GIoTS).

[37]  Ju Ren,et al.  DPPro: Differentially Private High-Dimensional Data Release via Random Projection , 2017, IEEE Transactions on Information Forensics and Security.

[38]  Philipp Neuhaus,et al.  Portal of medical data models: information infrastructure for medical research and healthcare , 2016, Database J. Biol. Databases Curation.

[39]  Min Chen,et al.  Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing , 2020, IEEE Transactions on Cloud Computing.

[40]  Zhen Liu,et al.  Time-Domain Attribute-Based Access Control for Cloud-Based Video Content Sharing: A Cryptographic Approach , 2016, IEEE Transactions on Multimedia.

[41]  Ju Ren,et al.  BOAT: A Block-Streaming App Execution Scheme for Lightweight IoT Devices , 2018, IEEE Internet of Things Journal.

[42]  Xiaohui Liang,et al.  Poster: Balancing disclosure and utility of personal information , 2014, MobiSys.

[43]  Jin Li,et al.  A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.

[44]  Shafi Goldwasser,et al.  Machine Learning Classification over Encrypted Data , 2015, NDSS.