Secure Remote Monitoring and Cipher Data Sharing for IoT Healthcare System with Privacy Preservation

With the increase of Internet connected IoT devices, remote monitoring and data sharing have become a new trend of IoT healthcare systems. The top three concerns in an IoT system are scalability, secure communication and privacy preservation. SSL/TLS based direct connection to the IoT devices has critical scalability issue and non-encrypted data sharing has high privacy leaking risk. In this paper, we propose a secure remote monitoring and cipher data sharing for IoT healthcare system with the consideration of privacy preservation. In the proposed system, the data transmission between the IoT related devices uses the conventional communication protocols as usual such as Constrained Application Protocol (CoAP) and Message Queuing Telemetry Transport (MQTT) while the remote monitoring and data sharing use Domain Name System (DNS) protocol and Docker container technology. The SIG(0) authentication scheme of DNS protocol is used for the remote monitoring as well as data sharing and only cipher data is transferred via the Docker container in the Internet with clear authentication. A prototype system has been implemented in a local experimental network and the evaluation results confirmed successful secure remote monitoring and cipher data sharing for IoT healthcare system.

[1]  Bodo Möller,et al.  TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventing Protocol Downgrade Attacks , 2015, RFC.

[2]  Qusay H. Mahmoud,et al.  An efficient and secure scheme for smart home communication using identity-based signcryption , 2017, 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC).

[3]  Ying-Tsung Lee,et al.  Privacy-preserving data analytics in cloud-based smart home with community hierarchy , 2017, IEEE Transactions on Consumer Electronics.

[4]  Jon Callas,et al.  OpenPGP Message Format , 1998, RFC.

[5]  Michael Graff,et al.  Extension Mechanisms for DNS (EDNS(0)) , 2013, Request for Comments.

[6]  Paul Vixie,et al.  A DNS RR for specifying the location of services (DNS SRV) , 1996, RFC.

[7]  Donald E. Eastlake,et al.  DNS Request and Transaction Signatures ( SIG(0)s ) , 2000, RFC.

[8]  Richard L. Rosenbaum Using the Domain Name System To Store Arbitrary String Attributes , 1993, RFC.

[9]  Scott Rose,et al.  DNS Security Introduction and Requirements , 2005, RFC.

[10]  P. Gregory,et al.  February , 1890, The Hospital.

[11]  Carsten Bormann,et al.  CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets , 2018, RFC.

[12]  T. Reichherzer,et al.  A Case Study on the Trade-Offs between Security, Scalability, and Efficiency in Smart Home Sensor Networks , 2016, 2016 International Conference on Computational Science and Computational Intelligence (CSCI).

[13]  Yong Jin,et al.  A Secure and Lightweight IoT Device Remote Monitoring and Control Mechanism Using DNS , 2017, 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC).

[14]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.3 , 2018, RFC.