End-to-end privacy preserving scheme for IoT-based healthcare systems

被引:16
|
作者
Nasr Esfahani, Maryam [1 ]
Shahgholi Ghahfarokhi, Behrouz [1 ]
Etemadi Borujeni, Shahram [1 ]
机构
[1] Univ Isfahan, Fac Comp Engn, Esfahan, Iran
关键词
Healthcare systems; IoT; Patient privacy; End-to-end privacy preserving; WIRELESS SENSOR NETWORKS; KEY AGREEMENT SCHEME; BODY AREA NETWORKS; ANONYMOUS AUTHENTICATION; BLOCKCHAIN TECHNOLOGY; USER AUTHENTICATION; DATA AGGREGATION; DATA-COLLECTION; SHARING SCHEME; EFFICIENT;
D O I
10.1007/s11276-021-02652-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Preserving patients' privacy is one of the most important challenges in IoT-based healthcare systems. Although patient privacy has been widely addressed in previous work, there is a lack of a comprehensive end-to-end approach that simultaneously preserves the location and data privacy of patients assuming that system entities are untrusted. Most of the past researches assume that parts of this end-to-end system are trustworthy while privacy may be threatened by insider attacks. In this paper, we propose an end-to-end privacy preserving scheme for the patients assuming that all main entities of the healthcare system (including sensors, gateways, and application providers) are untrusted. The proposed scheme preserves end-to-end privacy against insider threats as well as external attacks concerning the resource restrictions of the sensors. This scheme provides mutual authentication between main entities while preserves patients' anonymity. Only the allowed users can access the real identity of patients alongside their locations and their healthcare information. Informal security analysis and formal security verification of the proposed protocol in AVISPA show that it is secure against impersonation, replay, modification, and man-in-the-middle attacks. Moreover, performance assessments show that the proposed protocol provides more security services without considerable growth in the computation overhead of the sensors. Also, it is shown that the proposed protocol diminishes the signaling overhead of the sensors and so their energy consumption compared to the literature at the expense of adding a little more signaling overhead to the gateways.
引用
收藏
页码:4009 / 4037
页数:29
相关论文
共 50 条
  • [41] A smart lightweight privacy preservation scheme for IoT-based UAV communication systems
    Deebak, B. D.
    Al-Turjman, Fadi
    [J]. COMPUTER COMMUNICATIONS, 2020, 162 : 102 - 117
  • [42] End-to-end privacy preserving deep learning on multi-institutional medical imaging
    Kaissis, Georgios
    Ziller, Alexander
    Passerat-Palmbach, Jonathan
    Ryffel, Theo
    Usynin, Dmitrii
    Trask, Andrew
    Lima, Ionesio, Jr.
    Mancuso, Jason
    Jungmann, Friederike
    Steinborn, Marc-Matthias
    Saleh, Andreas
    Makowski, Marcus
    Rueckert, Daniel
    Braren, Rickmer
    [J]. NATURE MACHINE INTELLIGENCE, 2021, 3 (06) : 473 - 484
  • [43] End-to-end privacy preserving deep learning on multi-institutional medical imaging
    Georgios Kaissis
    Alexander Ziller
    Jonathan Passerat-Palmbach
    Théo Ryffel
    Dmitrii Usynin
    Andrew Trask
    Ionésio Lima
    Jason Mancuso
    Friederike Jungmann
    Marc-Matthias Steinborn
    Andreas Saleh
    Marcus Makowski
    Daniel Rueckert
    Rickmer Braren
    [J]. Nature Machine Intelligence, 2021, 3 : 473 - 484
  • [44] AHEC: End-to-end Compiler Framework for Privacy-preserving Machine Learning Acceleration
    Chen, Huili
    Cammarota, Rosario
    Valencia, Felipe
    Regazzoni, Francesco
    Koushanfar, Farinaz
    [J]. PROCEEDINGS OF THE 2020 57TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2020,
  • [45] A Guide to End-to-End Privacy Accountability
    Butin, Denis
    Le Metayer, Daniel
    [J]. 2015 IEEE/ACM 1ST INTERNATIONAL WORKSHOP ON TECHNICAL AND LEGAL ASPECTS OF DATA PRIVACY AND SECURITY TELERISE 2015, 2015, : 20 - 25
  • [46] A secure end-to-end IoT solution
    Mathur, Avijit
    Newe, Thomas
    Elgenaidi, Walid
    Rao, Muzaffar
    Dooly, Gerard
    Toal, Daniel
    [J]. SENSORS AND ACTUATORS A-PHYSICAL, 2017, 263 : 291 - 299
  • [47] End-to-End Management of IoT Applications
    Khazaei, Hamzeh
    Bannazadeh, Hadi
    Leon-Garcia, Alberto
    [J]. 2017 IEEE CONFERENCE ON NETWORK SOFTWARIZATION (IEEE NETSOFT), 2017,
  • [48] A Novel Secure End-to-End IoT Communication Scheme Using Lightweight Cryptography Based on Block Cipher
    Winarno, Agus
    Sari, Riri Fitri
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (17):
  • [49] SDC-Net: End-to-End Multitask Self-Driving Car Camera Cocoon IoT-Based System
    Abdou, Mohammed
    Kamal, Hanan Ahmed
    [J]. SENSORS, 2022, 22 (23)
  • [50] A seamless vertical handover scheme for end-to-end reconfigurability systems
    Feng, Zhiyong
    Le, Vanbien
    Zhang, Ping
    [J]. 2008 IEEE 67TH VEHICULAR TECHNOLOGY CONFERENCE-SPRING, VOLS 1-7, 2008, : 2152 - 2156