A privacy-preserving cryptosystem for IoT E-healthcare

Abstract Privacy preservation has become a prerequisite for modern applications in the cloud, social media, Internet of things (IoT), and E- healthcare systems. In general, health and medical data contain images and medical information about the patients and such personal data should be kept confidential in order to maintain the patients’ privacy. Due to limitations in digital data properties, traditional encryption schemes over textual and structural one-dimension data cannot be applied directly to e-health data. In addition, when personal data are sent over the open channels, patients may lose privacy of data contents. Hence, a secure lightweight keyframe extraction method is highly required to ensure timely, correct, and privacy-preserving e-health services. Besides this, it is inherently difficult to achieve a satisfied level of security in a cost-effective way while considering the constraints of real-time e-health applications. In this paper, we propose a privacy preserving chaos-based encryption cryptosystem for patients’ privacy protection. The proposed cryptosystem can protect patient’s images from a compromised broker. In particular, we propose a fast probabilistic cryptosystem to secure medical keyframes that are extracted from wireless capsule endoscopy procedure using a prioritization method. The encrypted images produced by our cryptosystem exhibits randomness behavior, which guarantee computational efficiency as well as a highest level of security for the keyframes against various attacks. Furthermore, it processes the medical data without leaking any information, thus preserving patient’s privacy by allowing only authorized users for decryption. The experimental results and security analysis from different perspectives verify the excellent performance of our encryption cryptosystem compared to other recent encryption schemes.

[1]  Khan Muhammad,et al.  CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method , 2017, Multimedia Tools and Applications.

[2]  Yicong Zhou,et al.  Cascade Chaotic System With Applications , 2015, IEEE Transactions on Cybernetics.

[3]  Saudi Arabia,et al.  Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority , 2014 .

[4]  Claude E. Shannon,et al.  The mathematical theory of communication , 1950 .

[5]  Sung Wook Baik,et al.  Dual-Level Security based Cyclic18 Steganographic Method and its Application for Secure Transmission of Keyframes during Wireless Capsule Endoscopy , 2016, Journal of Medical Systems.

[6]  Zhihan Lv,et al.  Secure video summarization framework for personalized wireless capsule endoscopy , 2017, Pervasive Mob. Comput..

[7]  Sung Wook Baik,et al.  Image steganography using uncorrelated color space and its application for security of visual contents in online social networks , 2016, Future Gener. Comput. Syst..

[8]  Yue Wu,et al.  Image encryption using the two-dimensional logistic chaotic map , 2012, J. Electronic Imaging.

[9]  Robert H. Deng,et al.  Encrypted data processing with Homomorphic Re-Encryption , 2017, Inf. Sci..

[10]  Robert H. Deng,et al.  Trustworthy Authentication on Scalable Surveillance Video with Background Model Support , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[11]  Lingfeng Liu,et al.  Pseudorandom sequence generator based on the Chen chaotic system , 2013, Comput. Phys. Commun..

[12]  David H. Bailey,et al.  High-precision floating-point arithmetic in scientific computation , 2004, Computing in Science & Engineering.

[13]  Adnan Abdul-Aziz Gutub,et al.  Counting-based secret sharing technique for multimedia applications , 2019, Multimedia Tools and Applications.

[14]  L. Cardoza-Avendaño,et al.  A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.

[15]  Khan Muhammad,et al.  Hash Based Encryption for Keyframes of Diagnostic Hysteroscopy , 2018, IEEE Access.

[16]  A. A-A Gutub,et al.  Hybrid Crypto Hardware Utilizing Symmetric-Key and Public-Key Cryptosystems , 2012, 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT).

[17]  Yicong Zhou,et al.  Image encryption using 2D Logistic-adjusted-Sine map , 2016, Inf. Sci..

[18]  Jim Harkin,et al.  Cryptanalysis and Improvement of a Chaotic Map-Control-Based and the Plain Image-Related Cryptosystem , 2019 .

[19]  Hong Zhao,et al.  Multi-layer assignment steganography using graph-theoretic approach , 2014, Multimedia Tools and Applications.

[20]  Jim Harkin,et al.  Counteracting Dynamical Degradation of Digital Chaotic Chebyshev Map via Perturbation , 2017, Int. J. Bifurc. Chaos.

[21]  Robert H. Deng,et al.  Privacy-Preserving Data Processing with Flexible Access Control , 2020, IEEE Transactions on Dependable and Secure Computing.

[22]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .

[23]  Wenhua Wang,et al.  A Fast Color Image Encryption Algorithm Using 4-Pixel Feistel Structure , 2016, PloS one.

[24]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[25]  Chin-Chen Chang,et al.  Reversible Steganographic Method with High Payload for JPEG Images , 2008, IEICE Trans. Inf. Syst..

[26]  Zhi-Hong Mao,et al.  High-Throughput Finite Field Multipliers Using Redundant Basis for FPGA and ASIC Implementations , 2015, IEEE Transactions on Circuits and Systems I: Regular Papers.

[27]  Junbeom Hur,et al.  Scalable and efficient approach for secure group communication using proxy cryptography , 2012, Wirel. Networks.

[28]  Afshan Mulla,et al.  Probabilistic triangular shuffling approach in DWT based image compression scheme , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).

[29]  V. Konda,et al.  Wireless Capsule Endoscopy , 2020, Geriatric Gastroenterology.

[30]  Sung Wook Baik,et al.  Visual saliency models for summarization of diagnostic hysteroscopy videos in healthcare systems , 2016, SpringerPlus.

[31]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[32]  Rafik Hamza,et al.  A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map , 2016, Inf. Secur. J. A Glob. Perspect..

[33]  Adnan Abdul-Aziz Gutub,et al.  Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography , 2018 .

[34]  Sung Wook Baik,et al.  Secure Surveillance Framework for IoT Systems Using Probabilistic Image Encryption , 2018, IEEE Transactions on Industrial Informatics.

[35]  Jian Weng,et al.  AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo , 2018, Comput. Secur..

[36]  Shiguo Lian,et al.  A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system , 2012, J. Syst. Softw..

[37]  Safya Belghith,et al.  A novel image encryption scheme based on substitution-permutation network and chaos , 2016, Signal Process..

[38]  Sirma Yavuz,et al.  Security problems for a pseudorandom sequence generator based on the Chen chaotic system , 2013, Comput. Phys. Commun..

[39]  Dawei Wang,et al.  A novel lossless color image encryption scheme using 2 D DWT and 6 D hyperchaotic system , 2016 .

[40]  Rafik Hamza,et al.  A novel pseudo random sequence generator for image-cryptographic applications , 2017, J. Inf. Secur. Appl..

[41]  Bin Wang,et al.  Encryption Method Based on a New Secret Key Algorithm for Color Images , 2016 .

[42]  Safya Belghith,et al.  Efficient cryptosystem approaches: S-boxes and permutation–substitution-based encryption , 2016, Nonlinear Dynamics.

[43]  Sung Wook Baik,et al.  A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image , 2015, Multimedia Tools and Applications.

[44]  Kamlesh Gupta,et al.  Novel Approach for fast Compressed Hybrid color image Cryptosystem , 2012, Adv. Eng. Softw..

[45]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..