A joint resource-aware and medical data security framework for wearable healthcare systems

被引:87
|
作者
Pirbhulal, Sandeep [1 ,2 ,3 ]
Samuel, Oluwarotimi Williams [1 ,2 ,3 ]
Wu, Wanqing [1 ,2 ]
Sangaiah, Arun Kumar [4 ]
Li, Guanglin [1 ,2 ]
机构
[1] Shenzhen Inst Adv Technol, CAS Key Lab Human Machine Intelligence Synergy Sy, Shenzhen 518055, Peoples R China
[2] Chinese Acad Sci, SIAT, Inst Biomed & Hlth Engn, Shenzhen 518055, Peoples R China
[3] Univ Chinese Acad Sci, Shenzahen Coll Adv Technol, Shenzhen 518055, Peoples R China
[4] VIT Univ, Sch Comp Sci & Engn, Vellore 632014, Tamil Nadu, India
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Healthcare; Data security; Patient's privacy; Resource-efficient; Internet of Medical Things; ZERO-WATERMARKING; BODY; BIOMETRICS; ALGORITHM;
D O I
10.1016/j.future.2019.01.008
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet of Medical Things (IoMTs) is a building block for modern healthcare having enormously stringent resource constraints thus lightweight health data security and privacy are crucial requirements. A critical issue in implementing security for the streaming health information is to offer data privacy and validation of a patient's information over networking environment in a resource efficient manner. Therefore, we developed a biometric-based security framework for resource-constrained wearable health monitoring systems by extracting heartbeats from ECG signals. It is analyzed that time-domain based biometric features play a significant role in optimizing security in IoMT based medical applications. Moreover, resource optimization model based on utility function is proposed for clinical information transmission in loMT. In this study, ECG signals from 40 healthy subjects were employed comprising lab environment and publicly available database i-e-physionet. The experimental results validate that proposed framework requires less processing time and energy consumption (0.0068ms and 0.196 microJoule/Byte) then Alarmnet (0.0128ms and 0.351 microJoule/Byte) and BSN-care (0.0175ms and 0.53 microJoule/Byte). Moreover, from the results, it is also observed that biometric key generation mechanism not only provide random and unique keys but it also offer a trade-off between security and resource optimization. Thus, it can be concluded that the proposed framework has got both social and economic significance for real-time healthcare applications. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:382 / 391
页数:10
相关论文
共 50 条
  • [1] A resource-aware framework for resource-constrained service-oriented systems
    Newman, Peter
    Kotonya, Gerald
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 47 : 161 - 175
  • [2] Resource-Aware Placement of Softwarised Security Services in Cloud Data Centers
    Ali, Abeer
    Anagnostopoulos, Christos
    Pezaros, Dimitrios P.
    [J]. 2017 13TH INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE MANAGEMENT (CNSM), 2017,
  • [3] RAMSYS: Resource-Aware Asynchronous Data Transfer with Multicore SYStems
    Li, Tan
    Ren, Yufei
    Yu, Dantong
    Jin, Shudong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 28 (05) : 1430 - 1444
  • [4] A framework for Resource-Aware Data Accumulation in sparse wireless sensor networks
    Shah, Kunal
    Di Francesco, Mario
    Anastasi, Giuseppe
    Kumar, Mohan
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (17) : 2094 - 2103
  • [5] Resource-aware mining of data streams
    Gaber, MM
    Krishnaswamy, S
    Zaslavsky, A
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2005, 11 (08) : 1440 - 1453
  • [6] Resource-Aware Network Topology Management Framework
    Abbasi, Aaqif Afzaal
    Shamshirband, Shahab
    Al-qaness, Mohammed A. A.
    Abbasi, Almas
    AL-Jallad, Nashat T.
    Mosavi, Amir
    [J]. ACTA POLYTECHNICA HUNGARICA, 2020, 17 (04) : 89 - 101
  • [7] A Trustworthy Framework for Resource-Aware Embedded Programming
    Barwell, Adam D.
    Brown, Christopher
    [J]. PROCEEDINGS OF THE 31ST SYMPOSIUM ON IMPLEMENTATION AND APPLICATION OF FUNCTIONAL LANGUAGES, IFL 2019, 2019,
  • [8] Resource-aware Security Configuration for Constrained IoT Devices
    Fischer, Marten
    Toenjes, Ralf
    [J]. PROCEEDINGS OF THE 19TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, Q2SWINET 2023, 2023, : 7 - 14
  • [9] Resource-Aware Data Parallel Array Processing
    Clemens Grelck
    Cédric Blom
    [J]. International Journal of Parallel Programming, 2020, 48 : 652 - 674
  • [10] Ubiquitous Resource-Aware Clustering of Data Streams
    Chao, Ching-Ming
    Chao, Guan-Lin
    [J]. ENTERPRISE INFORMATION SYSTEMS, ICEIS 2011, 2012, 102 : 81 - 97