Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing

With the popularity of wearable devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users’ sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Thus in this paper, we build up a novel healthcare system by utilizing the flexibility of cloudlet. The functions of cloudlet include privacy protection, data sharing and intrusion detection. In the stage of data collection, we first utilize Number Theory Research Unit (NTRU) method to encrypt user's body data collected by wearable devices. Those data will be transmitted to nearby cloudlet in an energy efficient fashion. Second, we present a new trust model to help users to select trustable partners who want to share stored data in the cloudlet. The trust model also helps similar patients to communicate with each other about their diseases. Third, we divide users’ medical data stored in remote cloud of hospital into three parts, and give them proper protection. Finally, in order to protect the healthcare system from malicious attacks, we develop a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh, which can effectively prevent the remote healthcare big data cloud from attacks. Our experiments demonstrate the effectiveness of the proposed scheme.

[1]  Jianqiang Li,et al.  A hybrid solution for privacy preserving medical data sharing in the cloud environment , 2015, Future Gener. Comput. Syst..

[2]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[3]  Y.T. Zhang,et al.  Wearable medical devices for tele-home healthcare , 2004, The 26th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[4]  Xiaohui Liang,et al.  Security and privacy for mobile healthcare networks: from a quality of protection perspective , 2015, IEEE Wireless Communications.

[5]  Min Chen,et al.  Smart Clothing: Connecting Human with Clouds and Big Data for Sustainable Health Monitoring , 2016, Mobile Networks and Applications.

[6]  Jinjun Chen,et al.  A security framework in G-Hadoop for big data computing across distributed Cloud data centres , 2014, J. Comput. Syst. Sci..

[7]  Leigh Griffin,et al.  Social networking healthcare , 2009, Proceedings of the 6th International Workshop on Wearable, Micro, and Nano Technologies for Personalized Health.

[8]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[9]  Jing Chen,et al.  Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[10]  Mani Krishna,et al.  SPOC : A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2012 .

[11]  G. Nagarajan,et al.  Hybrid Intrusion Detection System for Private Cloud: A Systematic Approach☆ , 2015 .

[12]  Kai Hwang,et al.  Cloudlet Mesh for Securing Mobile Clouds from Intrusions and Network Attacks , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.

[13]  M KaufmanLori Data Security in the World of Cloud Computing , 2009, S&P 2009.

[14]  N. Cao,et al.  Privacy-preserving multi-keyword ranked search over encrypted cloud data , 2011, 2011 Proceedings IEEE INFOCOM.

[15]  Piyush Jha,et al.  DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments , 2017 .

[16]  Sarmistha Neogy,et al.  A cloud security framework for a data centric WSN application , 2016, ICDCN.

[17]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.

[18]  Randi Karlsen,et al.  Privacy preserving health data processing , 2014, 2014 IEEE 16th International Conference on e-Health Networking, Applications and Services (Healthcom).

[19]  Albert Y. Zomaya,et al.  Associative Big Data Sharing in Community Clouds: The MeePo Approach , 2015, IEEE Cloud Computing.

[20]  Christos Grecos,et al.  Comparative study of internet cloud and cloudlet over wireless mesh networks for real-time applications , 2014, Photonics Europe.

[21]  LiMing,et al.  Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data , 2014 .

[22]  Jianqiang Li,et al.  Emerging information technologies for enhanced healthcare , 2015, Comput. Ind..

[23]  Muhammad Yousaf,et al.  Neighbor Node Trust based Intrusion Detection System for WSN , 2015, EUSPN/ICTH.

[24]  Melanie Swan,et al.  Big Desire to Share Big Health Data: A Shift in Consumer Attitudes toward Personal Health Information , 2014, AAAI Spring Symposia.

[25]  Ing-Ray Chen,et al.  Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems , 2015, IEEE Transactions on Dependable and Secure Computing.

[26]  Qinghua Li,et al.  Efficient and Privacy-Aware Data Aggregation in Mobile Sensing , 2014, IEEE Transactions on Dependable and Secure Computing.

[27]  Wei Xiang,et al.  Big video data for light-field-based 3D telemedicine , 2016, IEEE Network.

[28]  Xiaohui Liang,et al.  PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs , 2014, Inf. Sci..

[29]  Fei Wang,et al.  Supervised patient similarity measure of heterogeneous patient records , 2012, SKDD.

[30]  Medromi Hicham,et al.  A collaborative intrusion detection and Prevention System in Cloud Computing , 2013, 2013 Africon.

[31]  M. Shamim Hossain,et al.  Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring , 2016, Comput. Networks.

[32]  Qing Guo,et al.  Mining Cloud 3D Video Data for Interactive Video Services , 2015, Mob. Networks Appl..

[33]  Benjamin Fabian,et al.  Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..

[34]  Haider Abbas,et al.  Data Privacy in Cloud-assisted Healthcare Systems: State of the Art and Future Challenges , 2016, Journal of Medical Systems.

[35]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[36]  EMMANOUIL VASILOMANOLAKIS,et al.  Taxonomy and Survey of Collaborative Intrusion Detection , 2015, ACM Comput. Surv..

[37]  Javier López,et al.  NTRUReEncrypt: An Efficient Proxy Re-Encryption Scheme Based on NTRU , 2015, AsiaCCS.

[38]  M. Shamim Hossain,et al.  Cloud-Supported Cyber–Physical Localization Framework for Patients Monitoring , 2017, IEEE Systems Journal.

[39]  Joseph K. Liu,et al.  Toward efficient and privacy-preserving computing in big data era , 2014, IEEE Network.

[40]  Kirti A. Dongre,et al.  Secure cloud storage of data , 2014, 2014 International Conference on Computer Communication and Informatics.

[41]  Kurt Rohloff,et al.  A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU , 2014, Financial Cryptography Workshops.

[42]  Jianqiang Li,et al.  A top-down approach for approximate data anonymisation , 2013, Enterp. Inf. Syst..

[43]  M. Shamim Hossain,et al.  Audio-Visual Emotion Recognition Using Big Data Towards 5G , 2016, Mob. Networks Appl..

[44]  Yaser Jararweh,et al.  Cloudlet-based Efficient Data Collection in Wireless Body Area Networks , 2015, Simul. Model. Pract. Theory.