A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System

Historically, health data was stored locally on the hospital’s server as patient health records, and we had to rely on the planned check-up during doctor’s visits. Now, we can monitor health continuously and in real-time. Remote healthcare monitoring can also be helpful in setting up alerts, allowing early intervention and treatment. In this way, the patient gets timely treatment, avoids doctor visits or hospitalization hassles, and reduces healthcare expenses. Additionally, in an ambulance, real-time patient data can be sent to the physician via wireless communication which can save the life of a critical patient. The critical problem that arises in Internet of Medical Things (IoMT) is how securely the health vitals can be transmitted to the physician. There are numerous ways to transmit data securely to the physician, however Identity-based cryptography is the most popular these days to provide solutions for secure transmission. Identity-based cryptography is the public key cryptography in which an arbitrary string representing an individual is used as a public key. Biometric information based public key generation by identity based encryption is a potential candidate for providing a solution to such a problem. In this work, we propose using facial biometric information of the clinicians to create a public key for encrypting health vitals of a patient.

[1]  Tooska Dargahi,et al.  PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications , 2020, Future Gener. Comput. Syst..

[2]  Rajeev Kumar,et al.  Healthcare Data Breaches: Insights and Implications , 2020, Healthcare.

[3]  R. Somasundaram,et al.  Review of security challenges in healthcare internet of things , 2020, Wireless Networks.

[4]  Manju Khari,et al.  Securing Data in Internet of Things (IoT) Using Cryptography and Steganography Techniques , 2020, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[5]  Tatsuya Suzuki,et al.  Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings , 2019, 2019 Seventh International Symposium on Computing and Networking (CANDAR).

[6]  A. Dehghantanha,et al.  Threats on the horizon: understanding security threats in the era of cyber-physical systems , 2019, The Journal of Supercomputing.

[7]  Abdullatif Shikfa,et al.  Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices , 2019, ICFNDS.

[8]  Neyire Deniz Sarier Multimodal biometric Identity Based Encryption , 2018, Future Gener. Comput. Syst..

[9]  M. Shamim Hossain,et al.  A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography , 2017, IEEE Access.

[10]  Mohammad Hammoudeh,et al.  A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT , 2017, ICFNDS.

[11]  Allison Bishop,et al.  Why Proving HIBE Systems Secure Is Difficult , 2014, EUROCRYPT.

[12]  Marina Blanton,et al.  Secure and Efficient Protocols for Iris and Fingerprint Identification , 2011, ESORICS.

[13]  Lifang Wu,et al.  A novel key generation cryptosystem based on face features , 2010, IEEE 10th INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS.

[14]  Kenneth G. Paterson,et al.  Pairings for Cryptographers , 2008, IACR Cryptol. ePrint Arch..

[15]  B. Chen,et al.  Biometric Based Cryptographic Key Generation from Faces , 2007, 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image Computing Techniques and Applications (DICTA 2007).

[16]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[17]  Yan Zhang,et al.  On the Euclidean distance of images , 2005, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[18]  Brent Waters Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[19]  Dan Boneh,et al.  Hierarchical Identity Based Encryption with Constant Size Ciphertext , 2005, EUROCRYPT.

[20]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[21]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[22]  Byron Oviedo,et al.  The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016) Patient Monitoring System Based on Internet of Things , 2016 .

[23]  Girish Identity-Based Cryptography and Comparison with traditional Public key Encryption : A Survey , 2014 .

[24]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.