An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks

In the age of the Internet of Things, connected devices are changing the delivery system in the healthcare communication environment. With the integration of IoT in healthcare, there is a huge potential for improvement of the quality, safety, and efficiency of health care in addition to promising technological, economical, and social prospects. Nevertheless, this integration comes with security risks such as data breach that might be caused by credential-stealing malware. In addition, the patient valuable data can be disclosed when the perspective devices are compromised since they are connected to the internet. Hence, security has become an essential part of today’s computing world regarding the ubiquitous nature of the IoT entities in general and IoT-based healthcare in particular. In this paper, research on the algorithm for anonymizing sensitive information about health data set exchanged in the IoT environment using a wireless communication system has been presented. To preserve the security and privacy, during the data session from the users interacting online, the algorithm defines records that cannot be revealed by providing protection to user’s privacy. Moreover, the proposed algorithm includes a secure encryption process that enables health data anonymity. Furthermore, we have provided an analysis using mathematical functions to valid the algorithm’s anonymity function. The results show that the anonymization algorithm guarantees safety features for the considered IoT system applied in context of the healthcare communication systems.

[1]  Tharam S. Dillon,et al.  Context-aware access control with imprecise context characterization for cloud-based data resources , 2019, Future Gener. Comput. Syst..

[2]  J. Wenny Rahayu,et al.  A Policy Model and Framework for Context-Aware Access Control to Information Resources , 2017, ArXiv.

[3]  Mohammad Shojafar,et al.  LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT , 2019, Future Gener. Comput. Syst..

[4]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[5]  Hao Jiang,et al.  A Medical Healthcare System for Privacy Protection Based on IoT , 2015, 2015 Seventh International Symposium on Parallel Architectures, Algorithms and Programming (PAAP).

[6]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[7]  Catherine Mulligan,et al.  From Machine-to-Machine to the Internet of Things - Introduction to a New Age of Intelligence , 2014 .

[8]  Carsten Maple,et al.  A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments , 2019, Sensors.

[9]  Jordi Cortadella,et al.  Algorithm Analysis , 2003 .

[10]  Keshav P. Dahal,et al.  Toward Anonymizing IoT Data Streams via Partitioning , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[11]  Arafat J. Al-Dweik,et al.  IoT-based multifunctional Scalable real-time Enhanced Road Side Unit for Intelligent Transportation Systems , 2017, 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE).

[12]  Jan Sliwa A Generalized Framework for Multi-party Data Exchange for IoT Systems , 2016, 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA).

[13]  Johan Lilius,et al.  A semantic security framework and context-aware role-based access control ontology for smart spaces , 2016, SBD '16.

[14]  Jie Wu,et al.  PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems , 2018, IEEE Communications Magazine.

[15]  A. Gunasekaran,et al.  Big data analytics in logistics and supply chain management: Certain investigations for research and applications , 2016 .

[16]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[17]  Robert John Walters,et al.  Fog Computing and the Internet of Things: A Review , 2018, Big Data Cogn. Comput..

[18]  Lim Fung Chen,et al.  Developing a Privacy Compliance Scale for IoT Health Applications , 2018 .

[19]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[20]  Young-Gab Kim,et al.  Secure IoT Platform for Industrial Control Systems , 2017, 2017 International Conference on Platform Technology and Service (PlatCon).

[21]  Wlodek Kulesza,et al.  IoT-based information system for healthcare application : Design methodology approach , 2017 .

[22]  Li Zhao,et al.  A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation , 2014, Sensors.

[23]  Abdelhamid Belmekki,et al.  Privacy Preservation in the Internet of Things , 2016, UNet.

[24]  Francisco José Vial Prado Contributions to design and analysis of Fully Homomorphic Encryption schemes. (Contributions à la conception et analyse des schémas de chiffrement complètement homomorphe) , 2017 .

[25]  Adrien Hauteville,et al.  Identity-Based Encryption from Codes with Rank Metric , 2017, CRYPTO.

[26]  Mahadev Satyanarayanan,et al.  A Scalable and Privacy-Aware IoT Service for Live Video Analytics , 2017, MMSys.

[27]  Elena Ferrari,et al.  Enhancing NoSQL datastores with fine-grained context-aware access control: a preliminary study on MongoDB , 2017, Int. J. Cloud Comput..

[28]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[29]  Tomás Cerný,et al.  On security level usage in context-aware role-based access control , 2016, SAC.

[30]  Lina Yao,et al.  WITS: an IoT-endowed computational framework for activity recognition in personalized smart homes , 2018, Computing.

[31]  Yu-Hung Huang,et al.  A lightweight authentication protocol for Internet of Things , 2014, 2014 International Symposium on Next-Generation Electronics (ISNE).

[32]  William C. Chu,et al.  Privacy Preservation in Affect-Driven Personalization , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).

[33]  Ruhul Amin,et al.  Lightweight and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment , 2018, Future Gener. Comput. Syst..

[34]  Yuji Yamaoka,et al.  IoT Security for Utilization of Big Data : Mutual Authentication Technology and Anonymization Technology for Positional Data , 2016 .