Privacy-Aware Access Control in IoT-Enabled Healthcare: A Federated Deep Learning Approach

被引:17
|
作者
Lin, Hui [1 ,2 ]
Kaur, Kuljeet [3 ]
Wang, Xiaoding [1 ,2 ]
Kaddoum, Georges [3 ]
Hu, Jia [4 ]
Hassan, Mohammad Mehedi [5 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fuzhou, Peoples R China
[2] Fujian Prov Univ, Engn Res Ctr Cyber Secur & Educ Informatizat, Fuzhou 350117, Peoples R China
[3] Ecole Technol Super, Elect Engn Dept, Montreal, PQ H3C 1K3, Canada
[4] Univ Exeter, Dept Comp Sci, Exeter EX4 4PY, England
[5] King Saud Univ, Coll Comp & Informat Sci, Informat Syst Dept, Riyadh 11543, Saudi Arabia
来源
IEEE INTERNET OF THINGS JOURNAL | 2023年 / 10卷 / 04期
关键词
Access control; Medical services; Servers; Data privacy; Internet of Things; Deep learning; Data models; federated learning; graph convolutional networks (GCNs); Internet-of-Things (IoT)-enabled healthcare; social attributes; LIGHTWEIGHT; SCHEME;
D O I
10.1109/JIOT.2021.3112686
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The traditional healthcare is overwhelmed by the processing and storage of massive medical data. The emergence and gradual maturation of Internet-of-Things (IoT) technologies bring the traditional healthcare an excellent opportunity to evolve into the IoT-enabled healthcare of massive data storage and extraordinary data processing capability. However, in IoT-enabled healthcare, sensitive medical data are subject to both privacy leakage and data tampering caused by unauthorized users. In this article, an attribute-based secure access control mechanism, coined (SACM), is proposed for IoT-Health utilizing the federated deep learning (FDL). Specifically, we manage to discover the relationship between users' social attributes and their trusts, which is the trustworthiness of users rely on their social influences. By applying graph convolutional networks to the social graph with the susceptible-infected-recovered model-based loss function, users' influences are obtained and then are transformed to their trusts. For each occupation, users' trusts allow them to access specific medical data only if their trusts are higher than the corresponding threshold. Then, the FDL is applied to obtain the optimal threshold and relevant access control parameters for the improvement of access control accuracy and the enhancement of privacy preservation. The experimental results show that the proposed SACM achieves accurate access control in IoT-enabled healthcare with high data integrity and low privacy leakage.
引用
收藏
页码:2893 / 2902
页数:10
相关论文
共 50 条
  • [21] A blockchain-orchestrated deep learning approach for secure data transmission in IoT-enabled healthcare system
    Kumar, Prabhat
    Kumar, Randhir
    Gupta, Govind P.
    Tripathi, Rakesh
    Jolfaei, Alireza
    Islam, A. K. M. Najmul
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2023, 172 : 69 - 83
  • [22] A Semantic Framework for Privacy-Aware Access Control
    Lioudakis, Georgios V.
    Dellas, Nikolaos L.
    Koutsoloukas, Eleftherios A.
    Kapitsaki, Georgia M.
    Kaklamani, Dimitra I.
    Venieris, Iakovos S.
    [J]. 2008 INTERNATIONAL MULTICONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (IMCSIT), VOLS 1 AND 2, 2008, : 757 - 764
  • [23] Towards Privacy-Aware Causal Structure Learning in Federated Setting
    Huang, Jianli
    Guo, Xianjie
    Yu, Kui
    Cao, Fuyuan
    Liang, Jiye
    [J]. IEEE Transactions on Big Data, 2023, 9 (06): : 1525 - 1535
  • [24] FedQAS: Privacy-Aware Machine Reading Comprehension with Federated Learning
    Ait-Mlouk, Addi
    Alawadi, Sadi A.
    Toor, Salman
    Hellander, Andreas
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (06):
  • [25] Access control in a privacy-aware eLearning environment
    Franz, Elke
    Wahrig, Hagen
    Boettcher, Alexander
    Borcea-Pfitzmann, Katrin
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 879 - +
  • [26] Privacy-Aware Data Collection and Aggregation in IoT Enabled Fog Computing
    Zhang, Yinghui
    Zhao, Jiangfan
    Zheng, Dong
    Deng, Kaixin
    Ren, Fangyuan
    Zheng, Xiaokun
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT IV, 2018, 11337 : 581 - 590
  • [27] Trustworthy, Secure, and Privacy-aware Food Monitoring Enabled by Blockchains and the IoT
    Stach, Christoph
    Gritti, Clementine
    Przytarski, Dennis
    Mitschang, Bernhard
    [J]. 2020 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2020,
  • [28] Efficient Privacy-Aware Federated Learning by Elimination of Downstream Redundancy
    Lohana, Aditya
    Rupani, Ansh
    Rai, Shubham
    Kumar, Akash
    [J]. IEEE DESIGN & TEST, 2022, 39 (03) : 73 - 81
  • [29] Feature fusion federated learning for privacy-aware indoor localization
    Tasbaz, Omid
    Farahani, Bahar
    Moghtadaiee, Vahideh
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024,
  • [30] Blockchain-Aware Rollbackable Data Access Control for IoT-Enabled Digital Twin
    Qi, Saiyu
    Yang, Xu
    Yu, Jiahe
    Qi, Yong
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2023, 41 (10) : 3517 - 3532