Security algorithms for distributed storage system for E-health application over wireless body area network

Wireless body area networks (WBANs) are an upcoming technology for achieving effective healthcare. The security and privacy of patient-related data are two essential aspects of WBAN system security. Storing data on a single server is simple but may lead to a single point of failure (whether a typical failure or a failure due to security attacks). In this paper, enhanced security and privacy of patient information and E-health systems based on distributed storage systems (DSSs) are developed using public-key cryptography to store patient information. The storage of data and the security requirements (such as confidentiality, reliability, authentication, and dynamic integrity) are simultaneously distributed among individual nodes throughout the network. The patient data are encrypted using the redundant residue number system (RRNS) technique, which depends on a library of moduli in the encrypting process to generate residues. Three algorithms were implemented to decode the RRNS: the Chinese Remainder Theorem (CRT), Base Extension (BEX) with mixed radix conversion, and the new Chinese Remainder Theorem I (CRT I). The results of a system prototype implementation showed that whenever the value of the moduli was a big prime number, the coding efficiency became large, and the time to send a message decreased by 2 s. The performance of the algorithms was expressed in terms of execution time and cyclomatic complexity (CC). The results showed that the CRT I was 1 s faster than the other decoding algorithms and took around 2.5 s to decode the RRNS. The CRT had a low CC of 15, whereas the MRC and CRT I had a CC of 45 and 40, respectively. The main operation phases of the proposed system are described.

[1]  Naeem Ramzan,et al.  Remote patient monitoring: a comprehensive study , 2017, Journal of Ambient Intelligence and Humanized Computing.

[2]  E. O. Nwoye,et al.  Novel Algorithm for Decoding Redundant Residue Number Systems (RRNS) Codes , 2012 .

[3]  Sinan Q. Salih,et al.  TrustData: Trustworthy and Secured Data Collection for Event Detection in Industrial Cyber-Physical System , 2020, IEEE Transactions on Industrial Informatics.

[4]  Geetha Gurunathan,et al.  Secured storage and disease prediction of E-health data in cloud , 2020 .

[5]  Radu Sion,et al.  TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2014, IEEE Trans. Knowl. Data Eng..

[6]  Sinan Q. Salih,et al.  Internet of things assisted condition‐based support for smart manufacturing industry using learning technique , 2020, Comput. Intell..

[7]  Sinan Q. Salih,et al.  DependData: Data collection dependability through three-layer decision-making in BSNs for healthcare monitoring , 2020, Inf. Fusion.

[8]  Ingrid Moerman,et al.  A Comprehensive Survey of Wireless Body Area Networks , 2012, Journal of Medical Systems.

[9]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[10]  Musheer Ahmad,et al.  A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.

[11]  Javed Iqbal,et al.  Traffic priority based delay-aware and energy efficient path allocation routing protocol for wireless body area network , 2019, J. Ambient Intell. Humaniz. Comput..

[12]  Abdennaceur Kachouri,et al.  Wireless body area network for e-health applications: Overview , 2017, 2017 International Conference on Smart, Monitored and Controlled Cities (SM2C).

[13]  Mohamed Elhoseny,et al.  A secure real-time internet of medical smart things (IOMST) , 2018, Comput. Electr. Eng..

[14]  Sindhu Hak Gupta,et al.  An approach to investigate the best location for the central node placement for energy efficient WBAN , 2020, Journal of Ambient Intelligence and Humanized Computing.

[15]  M. A. Mokhtar,et al.  Security for wireless sensor network , 2016, 2016 6th International Conference on Information Communication and Management (ICICM).

[16]  Alexandros G. Dimakis,et al.  Security in distributed storage systems by communicating a logarithmic number of bits , 2010, 2010 IEEE International Symposium on Information Theory.

[17]  Ahmed Farouk,et al.  Secure Medical Data Transmission Model for IoT-Based Healthcare Systems , 2018, IEEE Access.

[18]  Ernesto Damiani,et al.  A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema , 2019, J. Ambient Intell. Humaniz. Comput..

[19]  Mohamed Elhoseny,et al.  Collaborative task assignment of interconnected, affective robots towards autonomous healthcare assistant , 2019, Future Gener. Comput. Syst..

[20]  Balasubramaniam Natarajan,et al.  Redundant residue number system based space-time block codes , 2014, Phys. Commun..

[21]  Zuqing Zhu,et al.  Availability-aware survivable virtual network embedding in optical datacenter networks , 2015, IEEE/OSA Journal of Optical Communications and Networking.

[22]  Thomas Peltier,et al.  Information Security Fundamentals, Second Edition , 2013 .

[23]  A. Jakubski Selected application of the Chinese Remainder Theorem in multiparty computation , 2016 .

[24]  Min Chen,et al.  An Integrated Biometric-Based Security Framework Using Wavelet-Domain HMM in Wireless Body Area Networks (WBAN) , 2011, 2011 IEEE International Conference on Communications (ICC).

[25]  P. Pandiaraja,et al.  RETRACTED ARTICLE: E health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption , 2020, Journal of Ambient Intelligence and Humanized Computing.

[26]  Chip-Hong Chang,et al.  A new algorithm for single residue digit error correction in Redundant Residue Number System , 2014, 2014 IEEE International Symposium on Circuits and Systems (ISCAS).

[27]  Kyung Sup Kwak,et al.  Hybrid security mechanisms for wireless body area networks , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).

[28]  Mohamed Elhoseny,et al.  The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems , 2017, Journal of Ambient Intelligence and Humanized Computing.

[29]  Indumathi Jayaraman,et al.  RETRACTED ARTICLE: A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud , 2020, Journal of Ambient Intelligence and Humanized Computing.

[30]  Kannan Ramchandran,et al.  Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks , 2010, IEEE Transactions on Information Theory.

[31]  Amit Kumar Singh,et al.  Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications , 2018, Multimedia Tools and Applications.