Preserving Privacy in Mobile Health Systems Using Non-Interactive Zero-Knowledge Proof and Blockchain

被引:27
|
作者
Tomaz, Antonio Emerson Barros [1 ]
Do Nascimento, Jose Claudio [2 ]
Hafid, Abdelhakim Senhaji [3 ]
De Souza, Jose Neuman [1 ]
机构
[1] Univ Fed Ceara, Comp Sci Dept, BR-60440900 Fortaleza, Ceara, Brazil
[2] Univ Fed Ceara, Elect Engn Dept, Campus Sobral, BR-62010560 Sobral, Brazil
[3] Univ Montreal, Network Res Lab, Montreal, PQ H3C 3J7, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Authentication; blockchain; resource-limited devices; Internet of Things; mobile health; privacy-preserving; AUTHENTICATION SCHEME; ACCESS-CONTROL; CHALLENGES; SECURITY; FRAMEWORK; FOG; TECHNOLOGIES; ARCHITECTURE; NETWORKS; INTERNET;
D O I
10.1109/ACCESS.2020.3036811
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The advent of miniaturized mobile devices with wireless communication capability and integrated with biosensors has revolutionized healthcare systems. The devices can be used by individuals as wearable accessories to collect health data regularly. This type of medical assistance supported by mobile devices to monitor patients and offer health services remotely is known as mobile health (mHealth). Although mHealth provides many benefits and has become popular, it can pose severe privacy risks. Many features in mHealth are managed through a smartphone. Thus, one of the most worrying issues involves communication between the monitoring devices and the smartphone. When communication uses Bluetooth, it is standard for a device to be paired with the smartphone; but generally, it is not exclusively associated with a specific mHealth app. This characteristic can allow a data theft attack by a malicious app or fake data injection by an illegitimate device. To address this issue, we present an authentication scheme based on Non-Interactive Zero-Knowledge Proof that is lightweight enough to run on mHealth devices with minimal resources. Our scheme ensures that legitimate devices interact exclusively with the official mHealth application. To ensure the patient's privacy-preserving throughout the system, we address the issues of storing, managing, and sharing data using blockchain. Since there is no privacy in the standard blockchain, we present a scheme in which the health data transmitted, stored, or shared are protected by Attribute-Based Encryption. The outcome is a system with fine-grained access control, entirely managed by the patient, and an end-to-end privacy guarantee.
引用
收藏
页码:204441 / 204458
页数:18
相关论文
共 50 条
  • [1] NON-INTERACTIVE ZERO-KNOWLEDGE PROOF SYSTEMS
    DESANTIS, A
    MICALI, S
    PERSIANO, G
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 52 - 72
  • [2] Non-Interactive Zero-Knowledge for Blockchain: A Survey
    Partala, Juha
    Nguyen, Tri Hong
    Pirttikangas, Susanna
    [J]. IEEE ACCESS, 2020, 8 : 227945 - 227961
  • [3] A Privacy-Preserving Zero-Knowledge Proof for Blockchain
    Chi, Po-Wen
    Lu, Yun-Hsiu
    Guan, Albert
    [J]. IEEE ACCESS, 2023, 11 : 85108 - 85117
  • [4] Increasing the power of the dealer in non-interactive zero-knowledge proof systems
    Gutfreund, D
    Ben-Or, M
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 429 - 442
  • [5] An enhanced Kerberos protocol with non-interactive zero-knowledge proof
    Zhu, Yuesheng
    Ma, Limin
    Zhang, Jinjiang
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (06) : 1108 - 1117
  • [6] ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques
    Schanzenbach, Martin
    Kilian, Thomas
    Schuette, Julian
    Banse, Christian
    [J]. PROCEEDINGS OF THE 16TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS, VOL 2: SECRYPT, 2019, : 325 - 332
  • [7] Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages
    Liu, Wei
    Weng, Jian
    Zhang, Bingsheng
    He, Kai
    Huang, Junjie
    [J]. INFORMATION SCIENCES, 2022, 613 : 324 - 343
  • [8] A note on one popular non-interactive zero-knowledge proof system
    Cao, Zhengjun
    Wang, Xiqi
    Liu, Lihua
    [J]. International Journal of Network Security, 2020, 22 (04) : 681 - 685
  • [9] An Improved Non-Interactive Zero-Knowledge Range Proof for Decentralized Applications
    Tsai, Ya-Che
    Tso, Raylin
    Liu, Zi-Yuan
    Chen, Kung
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON DECENTRALIZED APPLICATIONS AND INFRASTRUCTURES (DAPPCON), 2019, : 129 - 134
  • [10] Unconditional characterizations of non-interactive zero-knowledge
    Pass, R
    Shelat, A
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 118 - 134