Practical integrity preservation for data streaming in cloud-assisted healthcare sensor systems

Abstract In this paper, we address the problem of integrity protection for data streaming in cloud-assisted healthcare sensor systems. First, we propose a novel data structure, called the arithmetic Merkle tree (AMT), as a candidate method for ensuring the flexibility of the tree structure. However, AMT is flawed by one-wayness and therefore cannot be applied directly. We consider integrating homomorphic encryption with the AMT, and propose two solutions, called the PAMT (partially homomorphic encryption-based AMT) and the FAMT (fully homomorphic encryption-based AMT). Our proposed PAMT outperforms the existing solution because of the implementation of widely used software that optimizes partially homomorphic encryption. However, although the design of our proposed FAMT includes fully homomorphic encryption, in the case of data archival applications, transferal of the computation burden to the cloud server renders it very lightweight. The theoretical analysis and simulation results also confirm the efficiency of our PAMT and FAMT solutions.

[1]  Chun-Shien Lu,et al.  Secure Multidimensional Queries in Tiered Sensor Networks , 2009, ArXiv.

[2]  Kee Sung Kim,et al.  Efficient verifiable data streaming , 2015, Secur. Commun. Networks.

[3]  Yevgeniy Vahlis,et al.  Verifiable Delegation of Computation over Large Datasets , 2011, IACR Cryptol. ePrint Arch..

[4]  Rui Li,et al.  A digital watermarking approach to secure and precise range query processing in sensor networks , 2013, 2013 Proceedings IEEE INFOCOM.

[5]  Alex X. Liu,et al.  This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 Privacy- and Integrity-Preserving Range Queries in Sensor Networks , 2022 .

[6]  Dario Fiore,et al.  Nearly Optimal Verifiable Data Streaming , 2016, Public Key Cryptography.

[7]  JeongGil Ko,et al.  Wireless Sensor Networks for Healthcare , 2010, Proceedings of the IEEE.

[8]  Mark Simkin,et al.  VeriStream - A Framework for Verifiable Data Streaming , 2015, Financial Cryptography.

[9]  C.-S. Lu,et al.  Practical and Secure Multidimensional Query Framework in Tiered Sensor Networks , 2011, IEEE Transactions on Information Forensics and Security.

[10]  Matt Welsh,et al.  Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.

[11]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[12]  Kian-Lee Tan,et al.  Verifying completeness of relational query results in data publishing , 2005, SIGMOD '05.

[13]  Gene Tsudik,et al.  Authentication and integrity in outsourced databases , 2006, TOS.

[14]  Elaine Shi,et al.  Streaming Authenticated Data Structures , 2013, EUROCRYPT.

[15]  Craig Gentry,et al.  Fully homomorphic encryption using ideal lattices , 2009, STOC '09.

[16]  Ha T. Lam,et al.  Encryption Performance Improvements of the Paillier Cryptosystem , 2015, IACR Cryptol. ePrint Arch..

[17]  Dominique Schröder,et al.  Verifiable data streaming , 2012, CCS.

[18]  Pan Li,et al.  Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability , 2014, IEEE Journal of Biomedical and Health Informatics.