Secure Healthcare Applications Data Storage in Cloud Using Signal Scrambling Method

Yang Z, Guang, Meng, Chen and DiBao, Shu Secure Healthcare Applications Data Storage in Cloud Using Signal Scrambling Method., 2017 . In IEEE Journal of Biomedical and Health Informatics. [Conference paper]

[thumbnail of Secure Healthcare Applications Data Storage in Cloud Using Signal Scrambling Method.pdf]
Preview
Text
Secure Healthcare Applications Data Storage in Cloud Using Signal Scrambling Method.pdf

Download (956kB) | Preview

English abstract

A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet based applications, and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally whereas the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks.

Item type: Conference paper
Keywords: Healthcare data; cloud; security; data scrambling
Subjects: B. Information use and sociology of information
I. Information treatment for information services
L. Information technology and library technology
Depositing user: Guang Yang Z
Date deposited: 21 Sep 2020 06:05
Last modified: 21 Sep 2020 06:05
URI: http://hdl.handle.net/10760/40473

References

G.Z. Yang, “Body sensor networks”, Second Edition, Springer, 2014, ISBN 978-1-4471-6374-9.

B.P.L. Lo, I. Henry, G.Z. Yang, “Transforming health care: body sensor networks, wearables, and the Internet of things,” IEEE Pulse, 2016, 7(1): 4–8.

Y .L Zheng, X.R. Ding, C.C.Y . Poon, et al., “Unobtrusive sensing and wearable devices for health informatics,” IEEE Transactions on Biomedical Engineering, 2014, 61(5): 1538–1554.

C.C.Y. Poon, Y.T. Zhang, S.D. Bao, “A novel biometrics method to secure wireless body area sensor networks for telemedicine and m- health,” IEEE Communications Magazine, 2006, 44(4):73–81.

M. Vossberg, T. Tolxdorff, D. Krefting, “DICOM image communication in globus-based medical grids,” IEEE Transactions on Information Technology in Biomedicine, 2008, 12(2): 145–153.

E. Park, H.S. Nam, “A service-oriented medical framework for fast and adaptive information delivery in mobile environment,” IEEE Transactions on Information Technology in Biomedicine, 2009, 13(6): 1049–1056.

A. Helmer, M. Lipprandt, T. Frenken, et al., “Empowering patients through personal health records: a survey of existing third-party web- based PHR products, ” Electronic Journal of Health Informatics, 2011, 6(3):1–19.

S. Subashini, V. Kavitha, “A survey on security issues in service delivery models of cloud computing,” Journal of Network and Computer Applications, 2011, 34(1): 1–11.

R.H. Weber, “Internet of things – new security and privacy challenges,” Computer Law & Security Review, 2010, 26(1): 23–30.

A.J. Jara, M.A. Zamora, A.F.G. Skarmeta, “An architecture based on internet of things to support mobility and security in medical environments,” Proceedings of 7th IEEE Consumer Communications and Networking Conference, 2010, pp: 1–5.

S.D. Bao, C.C.Y. Poon, Y.T.Zhang, and L.F. Shen, “Using the Timing Information of Heartbeats as an Entity Identifier to Secure Body Sensor Network,” IEEE Transactions on Information Techonology in Biomedicine, 2008, 12(6): 772–779.

K.K. Venkatasubramanian, A. Banerjee, S.K.S. Gupta, “PSKA: Usable and secure key agreement scheme for body area networks,” IEEE Transactions on Information Technology in Biomedicine, 2010, 14(1): 60–68.

Tadapaneni, N. R. (2016). Overview and Opportunities of Edge Computing. Social Science Research Network.

S.D. Bao, Y. Lu, Y.K Yang, et al., “A data partitioning and scrambling method to secure cloud storage with healthcare applications,”Proceedings of IEEE International Conference on Communications, 2015, London, United Kingdom, pp. 2075–2079.

J. Andreu-Perez, C.C.Y. Poon, R.D. Merrifield, et al., “Big data for health,” IEEE Journal of Biomedical and Health Informatics, 2015, 19(4): 1193–1208.

[FDA of U.S., “Radio frequency wireless technology in medical devices,” https://www.fda.gov/downloads/MedicalDevices/DeviceRegulationandG uidance/GuidanceDocuments/ucm077272.pdf, 2013.

Tadapaneni, N. R. (2018). Cloud Computing: Opportunities And Challenges. International Journal of Technical Research and Applications.

G.J. Annas, “HIPPA regulations – A new era of medical-record privacy,” The New England Journal of Medicine, 2003, 348(15): 1486–1490.

D. Blumenthal, “Launching HITECH,” The New England Journal of Medicine, 2010, 362(5): 382–385.

T. Denning, K. Fu, T. Kohno, “Absence makes the heart grow fonder: new directions for implantable medical device security,” Proceedings of 3rd USENIX Workshop on Hot Topics in Security, 2008, San Jose, CA, USA, pp. 1–7.

J. Granjal, E. Monteiro, J.S. Silva, “Application-layer security for WoT: extending CoAP to support end-to-end message security for internet- integrated sensing applications,” Proceedings of International Conference on Wired/Wireless Internet Communication, 2013, pp. 140–153.

F. Miao, S.D. Bao, Y. Li, “Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security,” IET Information Security, 2013, 7(2):87–96.

Rao, M. L., Gulraiz, J. J., Farooq, A., & Rehman, S. (2017). Future Challenges, Benefits of Internet of Medical Things and Applications in Healthcare Domain.

G.D. Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map,” Pattern Recognition Letters, 2010, 31(5): 347–354.

A. Ibaida, I. Khalil, “Wavelet-based ECG steganography for protecting patient confidential information in point-of-care systems,” IEEE Transactions on Biomedical Engineering, 2013, 60(12): 3322–3330.

R.M. Rad, K. Wong, R. Moradi, et al., “A unified data embedding and scrambling method,” IEEE Transactions on Image Processing, 2014, 23(4): 1463–1475.

Fatima, S. S., Alsaadi, F., & Ahmad, A. A Comprehensive Review on Cloud Computing Security Issues.

Abdullah, A., Phamhung, P., & Namhuh, E. (2017). An Architecture of Thin Client in Internet of Things and Efficient Resource Allocation in Cloud for Data Distribution. The International Arab Journal of Information Technology, 14.


Downloads

Downloads per month over past year

Actions (login required)

View Item View Item