Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system

Abstract Nowadays the healthcare system is undergoing a paradigm shift to integrate cloud computing and Internet-of-Things with physical medical equipments into a distributed network ensuring real-time and near real-time data transfer from the physical world to the cyber space for computation, storage and analysis. Namely, the healthcare system can be seen as a cyber–physical system (CPS) for patient-centric healthcare applications and services, called Health-CPS, based on cloud computing, Wireless Body Area Networks (WBANs) and big data analytics technologies. Health-CPS has played an important role in healthcare for improving treatment quality and patients’ assistance speed. However, despite these advantages, the development of Health-CPS will be restricted by serious security threats, especially the security threats to the healthcare-related data. Because Health-CPS forward Electronic health records (EHRs), biomedical signals of patients and public health to the cloud which may operate in distributed and hostile environments, novel security mechanisms are required to prevent malicious interactions to the storage infrastructure. Therefore, the cloud providers must take strong security measures to protect the integrity and privacy of the healthcare related data. But most of the researchers do not simultaneously pay attention to both integrity and privacy for Health-CPS. Therefore, we proposed a privacy-preserving data integrity verification model by using lightweight streaming authenticated data structures for Health-CPS. We have given the design idea, architecture, formal definition, security definition, communication protocols of our model in detail. The key construction processes of our model which include initialization, data appending, scale expansion, data query and verification, are also given in this paper. Finally, the security and performance analysis show that our scheme is not only secure but also efficient.

[1]  Shan Gao,et al.  Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks , 2015, IEEE Transactions on Mobile Computing.

[2]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[3]  Chin-Feng Lai,et al.  A green cloud-assisted health monitoring service on wireless body area networks , 2014, Inf. Sci..

[4]  Hoh Peter In,et al.  A scheme for data confidentiality in Cloud-assisted Wireless Body Area Networks , 2014, Inf. Sci..

[5]  Athanasios V. Vasilakos,et al.  Cloud-assisted Wireless Body Area Networks , 2014, Information Sciences.

[6]  Jianfeng Ma,et al.  Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.

[7]  Mark Simkin,et al.  VeriStream - A Framework for Verifiable Data Streaming , 2015, Financial Cryptography.

[8]  Honggang Wang,et al.  Interference Mitigation for Cyber-Physical Wireless Body Area Network System Using Social Networks , 2013, IEEE Transactions on Emerging Topics in Computing.

[9]  Mohammad S. Obaidat,et al.  SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.

[10]  Qian Wang,et al.  Securing SIFT: Privacy-Preserving Outsourcing Computation of Feature Extractions Over Encrypted Image Data , 2016, IEEE Transactions on Image Processing.

[11]  Jin Li,et al.  Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2015, IEEE Transactions on Computers.

[12]  Jin Li,et al.  Secure attribute-based data sharing for resource-limited users in cloud computing , 2018, Comput. Secur..

[13]  Kyung Sup Kwak,et al.  A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Networks , 2011, Sensors.

[14]  Dongqing Xie,et al.  Secure Auditing and Deduplicating Data in Cloud , 2016, IEEE Transactions on Computers.

[15]  Bo Sheng,et al.  Verifiable Privacy-Preserving Sensor Network Storage for Range Query , 2011, IEEE Transactions on Mobile Computing.

[16]  Chun Chen,et al.  Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks , 2013, IEEE Journal of Biomedical and Health Informatics.

[17]  Delia Ioana Dogaru,et al.  Cyber security in healthcare networks , 2017, 2017 E-Health and Bioengineering Conference (EHB).

[18]  Alex X. Liu,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Privacy- and Integrity-Preserving Range Queries in Sensor Networks , 2022 .

[19]  Mohamed F. Younis,et al.  Load-conscious maximization of base-station location privacy in wireless sensor networks , 2017, Comput. Networks.

[20]  Chun-Shien Lu,et al.  Secure Multidimensional Queries in Tiered Sensor Networks , 2009, ArXiv.

[21]  Daojing He,et al.  Lightweight and Confidential Data Discovery and Dissemination for Wireless Body Area Networks , 2014, IEEE Journal of Biomedical and Health Informatics.

[22]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[23]  Rui Li,et al.  A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.

[24]  Kee Sung Kim,et al.  Efficient verifiable data streaming , 2015, Secur. Commun. Networks.

[25]  Meikang Qiu,et al.  Health-CPS: Healthcare Cyber-Physical System Assisted by Cloud and Big Data , 2017, IEEE Systems Journal.

[26]  Pan Li,et al.  Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability , 2014, IEEE Journal of Biomedical and Health Informatics.

[27]  Rui Zhang,et al.  A Spatiotemporal Approach for Secure Range Queries in Tiered Sensor Networks , 2011, IEEE Transactions on Wireless Communications.

[28]  Ralph C. Merkle,et al.  A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.

[29]  Jin Li,et al.  Privacy-preserving outsourced classification in cloud computing , 2017, Cluster Computing.

[30]  Xiong Li,et al.  Applying biometrics to design three-factor remote user authentication scheme with key agreement , 2014, Secur. Commun. Networks.

[31]  Han-Chieh Chao,et al.  Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks , 2015, IEEE Communications Magazine.

[32]  Elaine Shi,et al.  Streaming Authenticated Data Structures , 2013, EUROCRYPT.

[33]  Xin Zhou,et al.  Data Authentication Model Based on Reed-solomon Error-correcting Codes in Wireless Sensor Networks , 2013 .

[34]  Sherali Zeadally,et al.  A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture , 2017, Computer.

[35]  Xiong Li,et al.  Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks , 2017, Comput. Networks.