Towards design and implementation of security and privacy framework for Internet of Medical Things (IoMT) by leveraging blockchain and IPFS technology

The Internet of Medical Things (IoMT) is the next frontier in the digital revolution and it leverages IoT in the healthcare domain. The underlying technology has changed the current healthcare system by collecting real-time data of patients and providing a patient motioning system. But IoMT also presents a big challenge for data storage management, security, and privacy due to cloud-based storage. Today, this large volume of IoMT generated medical data is stored in the centralized storage system. However, centralization of patient sensitive information leads to a single point of failure, privacy, and security concern. To address these issues, we propose a smart contracts enabled consortium blockchain network. We integrated interplanetary file systems (IPFS) cluster node where smart contracts are deployed at the initial stage for authentication of patient’s and medical devices, the same cluster layer is also proposed as a distributed data storage layer for device-generated data after authentication and these data are securely transmitted over the consortium blockchain. The IPFS cluster node ensures the security and authentication of the devices and it also provides secure storage management in IoMT enabled healthcare system. The consortium network enables the privacy of data owing to hash-based storage in a block of IoMT enabled healthcare network.

[1]  Sridhar Krishnan,et al.  Wearable Hardware Design for the Internet of Medical Things (IoMT) , 2018, Sensors.

[2]  Ahmed Serhrouchni,et al.  Bubbles of Trust: A decentralized blockchain-based authentication system for IoT , 2018, Comput. Secur..

[3]  Thar Baker,et al.  A decentralized lightweight blockchain-based authentication mechanism for IoT systems , 2020, Cluster Computing.

[4]  Huansheng Ning,et al.  The yoking-proof-based authentication protocol for cloud-assisted wearable devices , 2016, Personal and Ubiquitous Computing.

[5]  Kim-Kwang Raymond Choo,et al.  A blockchain future for internet of things security: a position paper , 2017, Digit. Commun. Networks.

[6]  Fadi Al-Turjman,et al.  Intelligence in the Internet of Medical Things era: A systematic review of current and future trends , 2020, Comput. Commun..

[7]  Joel J. P. C. Rodrigues,et al.  Enabling Technologies for the Internet of Health Things , 2018, IEEE Access.

[8]  Sajjan G. Shiva,et al.  Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).

[9]  Nikos Fotiou,et al.  Decentralized name-based security for content distribution using blockchains , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[10]  Hsinchun Chen,et al.  Assessing medical device vulnerabilities on the Internet of Things , 2017, 2017 IEEE International Conference on Intelligence and Security Informatics (ISI).

[11]  Minyi Guo,et al.  A Comprehensive Survey of Blockchain: From Theory to IoT Applications and Beyond , 2019, IEEE Internet of Things Journal.

[12]  Roberto Sanz-Requena,et al.  A Cloud-Based Radiological Portal for the Patients: IT Contributing to Position the Patient as the Central Axis of the 21st Century Healthcare Cycles , 2015, 2015 IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity.

[13]  Baoquan Zhang,et al.  Evaluation on security system of internet of things based on Fuzzy-AHP method , 2011, 2011 International Conference on E-Business and E-Government (ICEE).

[14]  Bashar Nuseibeh,et al.  Privacy-by-Design Framework for Assessing Internet of Things Applications and Platforms , 2016, IOT.

[15]  Elias Yaacoub,et al.  Securing internet of medical things systems: Limitations, issues and recommendations , 2020, Future Gener. Comput. Syst..

[16]  Sudeep Tanwar,et al.  An exhaustive survey on security and privacy issues in Healthcare 4.0 , 2020, Comput. Commun..

[17]  Abid Sultan,et al.  IOT Security Issues Via Blockchain: A Review Paper , 2019, ICBCT.

[18]  Kyung Chang Lee,et al.  Network-based fire-detection system via controller area network for smart home automation , 2004, IEEE Trans. Consumer Electron..

[19]  Biplab Sikdar,et al.  A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures , 2019, IEEE Access.

[20]  Vineet Sahula,et al.  Lightweight security algorithm for low power IoT devices , 2016, 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[21]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[22]  Jeffrey M. Voas,et al.  Building Caring Healthcare Systems in the Internet of Things , 2018, IEEE Systems Journal.

[23]  Habtamu Abie,et al.  Risk-driven security metrics development for an e-health IoT application , 2015, 2015 Information Security for South Africa (ISSA).

[24]  Qian Zhang,et al.  Proximity based IoT device authentication , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[25]  Keon Chul Park,et al.  Security assessment framework for IoT service , 2016, Telecommunication Systems.

[26]  Yingnan Sun,et al.  Security and Privacy for the Internet of Medical Things Enabled Healthcare Systems: A Survey , 2019, IEEE Access.

[27]  Pradeep Deshmukh,et al.  Design of cloud security in the EHR for Indian healthcare services , 2017, J. King Saud Univ. Comput. Inf. Sci..

[28]  Zahid Anwar,et al.  IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics of the Internet of Things , 2017, IEEE Access.

[29]  Brij B. Gupta,et al.  Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework , 2020, Future Gener. Comput. Syst..

[30]  Rajiv Chakravorty,et al.  A programmable service architecture for mobile medical care , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[31]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[32]  Fang Liu,et al.  Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.

[33]  Yaser Jararweh,et al.  Data and Service Management in Densely Crowded Environments: Challenges, Opportunities, and Recent Developments , 2019, IEEE Communications Magazine.

[34]  Mohsen Guizani,et al.  Privacy in the Internet of Things for Smart Healthcare , 2018, IEEE Communications Magazine.

[35]  Biplab Sikdar,et al.  Mutual Authentication in IoT Systems Using Physical Unclonable Functions , 2017, IEEE Internet of Things Journal.

[36]  Abbes Amira,et al.  Evaluating Internet of Medical Things (IoMT)-Based Systems from a Human-Centric Perspective , 2019, Internet Things.

[37]  Ahmed Farouk,et al.  Blockchain platform for industrial healthcare: Vision and future opportunities , 2020, Comput. Commun..

[38]  N. Arunkumar,et al.  An IoMT cloud-based real time sleep apnea detection scheme by using the SpO2 estimation supported by heart rate variability , 2019, Future Gener. Comput. Syst..

[39]  Liang Song,et al.  Research on Privacy Protection in IoT System Based on Blockchain , 2019, SmartBlock.

[40]  Tao Han,et al.  A novel cluster head selection technique for edge-computing based IoMT systems , 2019, Comput. Networks.

[41]  Sajjan G. Shiva,et al.  IoMT-SAF: Internet of Medical Things Security Assessment Framework , 2019, Internet Things.

[42]  Ilangko Balasingham,et al.  Risk-based adaptive security for smart IoT in eHealth , 2012, BODYNETS.

[43]  Rakesh Tripathi,et al.  Secure Healthcare Framework Using Blockchain and Public Key Cryptography , 2020, Blockchain Cybersecurity, Trust and Privacy.

[44]  Fadi Al-Turjman Security in IoT-Enabled Spaces , 2019 .

[45]  Vanga Odelu,et al.  Provably secure pseudo-identity based device authentication for smart cities environment , 2018 .

[46]  Sajjan G. Shiva,et al.  A Framework for Ranking IoMT Solutions Based on Measuring Security and Privacy , 2018 .

[47]  Xiaolei Dong,et al.  PPDM: A Privacy-Preserving Protocol for Cloud-Assisted e-Healthcare Systems , 2015, IEEE Journal of Selected Topics in Signal Processing.

[48]  Stephen D. Wolthusen,et al.  Towards Composable Threat Assessment for Medical IoT (MIoT) , 2017, EUSPN/ICTH.

[49]  Hajar Ziglari,et al.  Evaluating cloud deployment models based on security in EHR system , 2017, 2017 International Conference on Engineering and Technology (ICET).

[50]  Kyung-Sup Kwak,et al.  The Internet of Things for Health Care: A Comprehensive Survey , 2015, IEEE Access.

[51]  Jose Iribarne,et al.  The Future Internet of Things and Security of its Control Systems , 2016, ArXiv.