New secure healthcare system using cloud of things

Modern healthcare services are serving patients needs by using new technologies such as wearable devices or cloud of things. The new technology provides more facilities and enhancements to the existing healthcare services as it allows more flexibility in terms of monitoring patients records and remotely connecting with the patients via cloud of things. However, there are many security issues such as privacy and security of healthcare data which need to be considered once we introduce wearable devices to the healthcare service. Although some of the security issues were addressed by some researchers in the literature, they mainly addressed cloud of things security or healthcare security separately and their work still suffers from limited security protection and vulnerabilities to some security attacks. The proposed new healthcare system combines security of both healthcare and cloud of things technologies. It also addresses most of the security challenges that might face the healthcare services such as the man in the middle (MITM), eavesdropping, replay, repudiation, and modification attacks. Scyther verification tool was also used to verify the robustness and correctness of the proposed system.

[1]  Michele Zorzi,et al.  Health care applications: a solution based on the internet of things , 2011, ISABEL '11.

[2]  L. Gostin,et al.  Privacy and security of health information in the emerging health care system. , 1995, Health matrix.

[3]  Dongho Won,et al.  A mechanical approach to derive identity-based protocols from Diffie-Hellman-based protocols , 2014, Inf. Sci..

[4]  Kwangjo Kim,et al.  Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..

[5]  James G. Phillips,et al.  Personality and self reported mobile phone use , 2008, Comput. Hum. Behav..

[6]  Melanie Swan,et al.  Sensor Mania! The Internet of Things, Wearable Computing, Objective Metrics, and the Quantified Self 2.0 , 2012, J. Sens. Actuator Networks.

[7]  Kyung Sup Kwak,et al.  Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications , 2010, Journal of Medical Systems.

[8]  Kim-Kwang Raymond Choo,et al.  A Generic Process to Identify Vulnerabilities and Design Weaknesses in iOS Healthcare Apps , 2015, 2015 48th Hawaii International Conference on System Sciences.

[9]  Cecilia Mascolo,et al.  METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[10]  Chia-Hung Hsiao,et al.  Privacy preservation and information security protection for patients' portable electronic health records , 2009, Comput. Biol. Medicine.

[11]  Md. Rafiqul Islam,et al.  A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering , 2015, SecureComm.

[12]  Kim-Kwang Raymond Choo,et al.  Forensic Taxonomy of Popular Android mHealth Apps , 2015, AMCIS.

[13]  Jan H. P. Eloff,et al.  Security in health-care information systems - current trends , 1999, Int. J. Medical Informatics.

[14]  Mahmoud Al-Qutayri,et al.  Framework for secure wireless health monitoring and remote access system , 2010 .

[15]  Mohamed Jamal Zemerly,et al.  Lightweight mutual authentication protocol for securing RFID applications , 2010 .

[16]  ALESSANDRA TONINELLI,et al.  Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.

[17]  Ernesto Damiani,et al.  Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[18]  Alptekin Küpçü,et al.  Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..

[19]  M. Eric Johnson,et al.  Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..

[20]  Chan Yeob Yeun,et al.  Lightweight secure storage model with fault-tolerance in cloud environment , 2014, Electronic Commerce Research.

[21]  Athanasios V. Vasilakos,et al.  A Markov adversary model to detect vulnerable iOS devices and vulnerabilities in iOS apps , 2017, Appl. Math. Comput..

[22]  Kim-Kwang Raymond Choo,et al.  A Novel Hybrid Key Revocation Scheme for Wireless Sensor Networks , 2014, NSS.

[23]  Jong Hyuk Park,et al.  Secure and efficient public key management in next generation mobile networks , 2011, Personal and Ubiquitous Computing.

[24]  Kim-Kwang Raymond Choo,et al.  Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds , 2016, Journal of Medical Systems.

[25]  Mohamed Jamal Zemerly,et al.  Security and privacy framework for ubiquitous healthcare IoT devices , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[26]  Kim-Kwang Raymond Choo,et al.  An Android Social App Forensics Adversary Model , 2016, 2016 49th Hawaii International Conference on System Sciences (HICSS).

[27]  K. Harding,et al.  The cost-effectiveness of wound management protocols of care. , 2000, British journal of nursing.

[28]  Geng Yang,et al.  Wearable Internet of Things: Concept, architectural components and promises for person-centered healthcare , 2014 .

[29]  Mohamed Jamal Zemerly,et al.  A Novel Hybrid Cellular Automata Based Cipher System for Internet of Things , 2014 .

[30]  Kim-Kwang Raymond Choo,et al.  A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network , 2018, IEEE Transactions on Dependable and Secure Computing.

[31]  Arshdeep Bahga,et al.  A Cloud-based Approach for Interoperable Electronic Health Records (EHRs) , 2013, IEEE Journal of Biomedical and Health Informatics.

[32]  Pedro Castillejo,et al.  An Internet of Things Approach for Managing Smart Services Provided by Wearable Devices , 2013, Int. J. Distributed Sens. Networks.

[33]  O. Geman,et al.  Adopting the Internet of Things technologies in health care systems , 2014, 2014 International Conference and Exposition on Electrical and Power Engineering (EPE).

[34]  Chan Yeob Yeun,et al.  Framework of a national level electronic health record system , 2012, 2012 International Conference on Cloud Computing Technologies, Applications and Management (ICCCTAM).

[35]  Kim-Kwang Raymond Choo,et al.  A technique to circumvent SSL/TLS validations on iOS devices , 2017, Future Gener. Comput. Syst..

[36]  Yu-Ru Lin,et al.  Elucidating user behavior of mobile learning: A perspective of the extended technology acceptance model , 2007, Electron. Libr..

[37]  Jiankun Hu,et al.  Corresponding author’s address: , 2022 .

[38]  Samee Ullah Khan,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .

[39]  L. Srivastava,et al.  Mobile phones and the evolution of social behaviour , 2005, Behav. Inf. Technol..

[40]  Mohamed Jamal Zemerly,et al.  Enhancing the Security of the Shrinking Generator Based Lightweight Mutual Authentication RFID Protocol , 2012 .

[41]  Kim-Kwang Raymond Choo Cryptocurrency and Virtual Currency: Corruption and Money Laundering/Terrorism Financing Risks? , 2015 .

[42]  Rajiv Ranjan,et al.  Trustworthy Processing of Healthcare Big Data in Hybrid Clouds , 2015, IEEE Cloud Computing.

[43]  Daniel Tranel,et al.  Exploring the neurological substrate of emotional and social intelligence. , 2003, Brain : a journal of neurology.

[44]  Kim-Kwang Raymond Choo,et al.  Exfiltrating data from Android devices , 2015, Comput. Secur..

[45]  François Michaud,et al.  Exploring the use of a mobile robot as an imitation agent with children with low-functioning autism , 2008, Auton. Robots.

[46]  Ahmed M. Elmisery,et al.  Privacy Preserving Distributed Learning Clustering of HealthCare Data Using Cryptography Protocols , 2010, COMPSAC Workshops.

[47]  Robert H. Deng,et al.  Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers , 2018, IEEE Transactions on Dependable and Secure Computing.

[48]  Thomas B. Sheridan,et al.  Healthcare safety: the impact of Disabling "safety" protocols , 2004, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[49]  Meng Zhang,et al.  MedMon: Securing Medical Devices Through Wireless Monitoring and Anomaly Detection , 2013, IEEE Transactions on Biomedical Circuits and Systems.

[50]  Kim-Kwang Raymond Choo,et al.  An adversary model to evaluate DRM protection of video contents on iOS devices , 2016, Comput. Secur..

[51]  Kim-Kwang Raymond Choo,et al.  A Forensically Sound Adversary Model for Mobile Devices , 2015, PloS one.

[52]  Ilias Maglogiannis,et al.  Bringing IoT and Cloud Computing towards Pervasive Healthcare , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[53]  Chan Yeob Yeun,et al.  New Secure Storage Architecture for Cloud Computing , 2011 .

[54]  Pete Chown,et al.  Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security (TLS) , 2002, RFC.

[55]  Yong Yu,et al.  Survey on key revocation mechanisms in wireless sensor networks , 2016, J. Netw. Comput. Appl..

[56]  Kim-Kwang Raymond Choo,et al.  Is the data on your wearable device secure? An Android Wear smartwatch case study , 2017, Softw. Pract. Exp..

[57]  Tzonelih Hwang,et al.  BSN-Care: A Secure IoT-Based Modern Healthcare System Using Body Sensor Network , 2016, IEEE Sensors Journal.

[58]  Sherali Zeadally,et al.  An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography , 2015, IEEE Internet of Things Journal.

[59]  Young B. Choi,et al.  Challenges Associated with Privacy in Health Care Industry: Implementation of HIPAA and the Security Rules , 2006, Journal of Medical Systems.

[60]  Joonsang Baek,et al.  Secure NFC Authentication Protocol Based on LTE Network , 2014 .

[61]  Chan Yeob Yeun,et al.  New mutual agreement protocol to secure mobile RFID-enabled devices , 2008, Inf. Secur. Tech. Rep..

[62]  Zhenfu Cao,et al.  An improved identity-based key agreement protocol and its security proof , 2009, Inf. Sci..

[63]  Shaopeng Guan,et al.  Privacy-Preserving Health Data Collection for Preschool Children , 2013, Comput. Math. Methods Medicine.

[64]  Kim-Kwang Raymond Choo New payment methods: A review of 2010-2012 FATF mutual evaluation reports , 2013, Comput. Secur..

[65]  Xiaohui Liang,et al.  Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.