A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography

Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate, and treat a patient using telecommunication technology. To diagnose and evaluate a patient, the healthcare professionals need to access the electronic medical record (EMR) of the patient, which might contain huge multimedia big data including X-rays, ultrasounds, CT scans, and MRI reports. For efficient access and supporting mobility for both the healthcare professionals as well as the patients, the EMR needs to be kept in big data storage in the healthcare cloud. In spite of the popularity of the healthcare cloud, it faces different security issues; for instance, data theft attacks are considered to be one of the most serious security breaches of healthcare data in the cloud. In this paper, the main focus has been given to secure healthcare private data in the cloud using a fog computing facility. To this end, a tri-party one-round authenticated key agreement protocol has been proposed based on the bilinear pairing cryptography that can generate a session key among the participants and communicate among them securely. Finally, the private healthcare data are accessed and stored securely by implementing a decoy technique.

[1]  Karamjeet Singh,et al.  IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB , 2013 .

[2]  Manreet Kaur,et al.  Fog Computing Providing Data Security: A Review , 2014 .

[3]  Hien Ba Nguyen An overview of the NTRU cryptographic system , 2014 .

[4]  A. Menezes An Introduction to Pairing-Based Cryptography , 2005 .

[5]  Hans Eberle,et al.  Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs , 2004, CHES.

[6]  A. Malla Reddy,et al.  Securing the cloud using Decoy Information Technology to preventing them from distinguishing the Real Sensitive data from fake Worthless data , 2013 .

[7]  Min Chen,et al.  Wearable 2.0: Enabling Human-Cloud Integration in Next Generation Healthcare Systems , 2017, IEEE Communications Magazine.

[8]  M. Shamim Hossain,et al.  Healthcare Big Data Voice Pathology Assessment Framework , 2016, IEEE Access.

[9]  Bora A. Akyol Cyber Security Challenges in Using Cloud Computing in the Electric Utility Industry , 2012 .

[10]  S. Solanke Vikas,et al.  Mobile cloud computing: Security threats , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).

[11]  Min Chen,et al.  Disease Prediction by Machine Learning Over Big Data From Healthcare Communities , 2017, IEEE Access.

[12]  M. Shamim Hossain,et al.  Toward end-to-end biomet rics-based security for IoT infrastructure , 2016, IEEE Wireless Communications.

[13]  Sonali Khairnar,et al.  FOG COMPUTING: A NEW CONCEPT TO MINIMIZE THE ATTACKS AND TO PROVIDE SECURITY IN CLOUD COMPUTING ENVIRONMENT , 2014 .

[14]  Vaibhav Patel,et al.  A Hybrid Protocol to Secure the Cloud from Insider Threats , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).

[15]  Jordan Shropshire,et al.  Extending the Cloud with Fog: Security Challenges & Opportunities , 2014, AMCIS.

[16]  Khalil El-Khatib,et al.  Private key agreement and secure communication for heterogeneous sensor networks , 2010, J. Parallel Distributed Comput..

[17]  Min Chen,et al.  Emotion Communication System , 2017, IEEE Access.

[18]  Arbat Rashmi Vinod,et al.  HINDERING DATA THEFT ATTACK THROUGH FOG COMPUTING , 2014 .

[19]  Nagesh Kumar,et al.  DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis , 2011 .

[20]  Yunhao Liu,et al.  Big Data: A Survey , 2014, Mob. Networks Appl..

[21]  Min Chen,et al.  A 5G Cognitive System for Healthcare , 2017, Big Data Cogn. Comput..

[22]  Fan Yu,et al.  Towards large-scale twitter mining for drug-related adverse events , 2012, SHB '12.

[23]  Amit K. Awasthi,et al.  A Key Agreement Algorithm Based on ECDSA for Wireless Sensor Network , 2016 .

[24]  B Nayak Signcryption schemes based on elliptic curve cryptography , 2014 .

[25]  Ayse Cufoglu,et al.  User Profiling - A Short Review , 2014 .

[26]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[27]  Salvatore J. Stolfo,et al.  Bait and Snitch: Defending Computer Systems with Decoys , 2013 .

[28]  Malek Ben Salem,et al.  Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[29]  Wentao Liu,et al.  Research on cloud computing security problem and strategy , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).

[30]  Viju Raghupathi,et al.  An Overview of Health Analytics , 2013 .

[31]  S. Sunanda,et al.  A Secure Framework for Mollifying Attacks in Cloud , 2014 .

[32]  G. Dileep Kumar,et al.  SURVEY ON INSIDER DATA THEFT MISUSE ATTACKS IN THE CLOUD , 2014 .

[33]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[34]  Ragib Hasan,et al.  Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems , 2013, ArXiv.

[35]  Hadeal Abdulaziz Al-Hamid,et al.  Securing photos in the cloud using decoy photo gallery , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).

[36]  Mehedi Masud,et al.  Towards Secure Data Exchange in Peer-to-Peer Data Management Systems , 2014 .

[37]  P. Mell,et al.  The NIST Definition of Cloud Computing , 2011 .

[38]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[39]  Allen Roginsky,et al.  Report on Pairing-based Cryptography , 2015, Journal of research of the National Institute of Standards and Technology.

[40]  Saeid Gorgin,et al.  A Review on Modern Distributed Computing Paradigms: Cloud Computing, Jungle Computing and Fog Computing , 2014, J. Comput. Inf. Technol..

[41]  Michael Scott,et al.  Implementing Cryptographic Pairings on Smartcards , 2006, CHES.

[42]  M. Shamim Hossain,et al.  Cloud-assisted Industrial Internet of Things (IIoT) - Enabled framework for health monitoring , 2016, Comput. Networks.

[43]  Ahmad A. Al-Daraiseh,et al.  Effectiveness of Iphone’s Touch ID: KSA Case Study , 2015 .

[44]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.