Cryptographic security models for eHealth P2P database management systems network

In an eHealth peer-to-peer database management system(P2PDBMS), peers exchange data in a pair-wise fashion on-the-fly in response to a query without any centralized control. Generally, the communication link between two peers is insecure and peers create a temporary session while exchanging data. When peers exchange highly confidential data in an eHealth network over an insecure communication link, the data might be tampered with or trapped and disclosed by intruders, which is a serious offence for the clients of an eHealth P2PDBMS. As there is no centralized control for data exchange in eHealth P2PDBMS, it is infeasible to assume a centralized third party security infrastructure to protect confidential data. So far, there is currently no available/existing security protocol for secured data exchange in eHealth P2PDBMS. In this paper we propose three models for secure data exchange in eHealth P2PDBMSs and the corresponding security protocols. The proposed protocol allows the peers to compute their secret session keys dynamically during data exchange based on the policies between them. Our proposed protocol is robust against the man-in-the middle attack, the masquerade attack, and the replay attack.

[1]  Catriel Beeri,et al.  A Proof Procedure for Data Dependencies , 1984, JACM.

[2]  Renée J. Miller,et al.  Mapping data in peer-to-peer systems: semantics and algorithmic issues , 2003, SIGMOD '03.

[3]  John Mylopoulos,et al.  Data Sharing in the Hyperion Peer Database System , 2005, VLDB.

[4]  Diana K. Smetters,et al.  Secret handshakes from pairing-based key agreements , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Jie Zhao,et al.  Schema Mediation in Peer Data Management Systems , 2011, Int. J. Cooperative Inf. Syst..

[6]  Sanjit Chatterjee,et al.  On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings , 2010, WAIFI.

[7]  A. Taleb-Bendiab,et al.  E-health support services based on service-oriented architecture , 2006, IT Professional.

[8]  Michael Scott,et al.  A Taxonomy of Pairing-Friendly Elliptic Curves , 2010, Journal of Cryptology.

[9]  Phokion G. Kolaitis,et al.  Peer data exchange , 2005, PODS '05.

[10]  Dan Suciu,et al.  The Piazza peer data management system , 2004, IEEE Transactions on Knowledge and Data Engineering.

[11]  Marcus Stögbauer Efficient Algorithms for Pairing-Based Cryptosystems , 2004 .

[12]  Mehedi Masud,et al.  Don't Mind Your Vocabulary: Data Sharing Across Heterogeneous Peers , 2005, OTM Conferences.

[13]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[14]  Dan Suciu,et al.  Schema mediation in peer data management systems , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[15]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.