A Distributed Secure Framework for Sharing Patient’s Data among IoMT Devices

Authors

  • Muhammad Asad Bilal University of Engineering and Technology Lahore, Pakistan http://orcid.org/0000-0003-2009-0368
  • Muhammad Awais Hassan University of Engineering and Technology Lahore, Pakistan

Abstract

Encouraging prospective of Internet of Medical Things (IoMT) used different wearable devices and sensors for more quality patient care. It provides more flexibility for monitoring patient’s record remotely as compare to the traditional healthcare system. However, there are some data security and privacy challenges due to the absence of proper security mechanism in low power computing devices. The currently available security techniques such as watermarking and high-level encryption techniques, to protect patients’ record are not sufficient for low-level IoMT devices. It is also observed that 70% of IoT devices have to face security issues due to the unencrypted network services in a centralized system. This paper proposed a secure distributed system, which provides device level encryption and shares patient’s data between different IoMT devices and healthcare providers without the need of the centralized server. The proposed system applies different device level encryption techniques to provide encrypted network services. An Attribute based Elliptic curve cryptographic (ABECC) encryption technique proposed as an additional security layer for lightweight and low power computing devices. The results show that the average response time has been significantly improved using the proposed distributed system as compare to the previous centralized system. In the future, the proposed system could enhance in a way to provide encrypted data transmission also for graphical data like ECG and other medical images.

Author Biography

Muhammad Asad Bilal, University of Engineering and Technology Lahore, Pakistan

Police Communication Officer at Punjab Safe Cities Authority.

References

[[1] Ahmad, M., Amin, M. B., Hussain, S., Kang, B. H., Cheong, T., & Lee, S. (2016). Health Fog: a novel framework for health and wellness applications. Journal of Supercomputing, 72(10), 3677–3695. https://doi.org/10.1007/s11227-016-1634-x
[2] Alam, S., Chowdhury, M. M. R., & Noll, J. (2011). Interoperability of security-enabled internet of things. Wireless Personal Communications, 61(3), 567–586.
[3] Alasmari, S., & Anwar, M. (2016). Security & privacy challenges in IoT-based health cloud. 2016 International Conference on Computational Science and Computational Intelligence (CSCI), 198–201.
[4] Alkeem, E. Al, Shehada, D., Yeun, C. Y., Zemerly, M. J., & Hu, J. (2017). New secure healthcare system using cloud of things. Cluster Computing, 20(3), 2211–2229. https://doi.org/10.1007/s10586-017-0872-x
[5] Alsubaei, F., Abuhussein, A., & Shiva, S. (2017). Security and privacy in the internet of medical things: taxonomy and risk assessment. 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), 112–120.
[6] Alzghoul, M. M. (2016). Towards Nationwide Electronic Health Record System in Jordan. 650–655.
[7] Baccarini, A. N., Griggs, K. N., Howson, E. A., Ossipova, O., Hayajneh, T., & Kohlios, C. P. (2018). Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring. Journal of Medical Systems, 42(7), 1–7. https://doi.org/10.1007/s10916-018-0982-x
[8] Bradley, C., El-Tawab, S., & Heydari, M. H. (2018). Security analysis of an IoT system used for indoor localization in healthcare facilities. 2018 Systems and Information Engineering Design Symposium (SIEDS), 147–152.
[9] Chen, S., Chiang, D. L., Liu, C., Chen, T., Lai, F., Wang, H., & Wei, W. (2016). Confidentiality Protection of Digital Health Records in Cloud Computing. Journal of Medical Systems. https://doi.org/10.1007/s10916-016-0484-7
[10] Chiang, M., & Zhang, T. (2016). Fog and IoT: An overview of research opportunities. IEEE Internet of Things Journal, 3(6), 854–864.
[11] Chung, K., & Park, R. C. (2016). PHR open platform based smart health service using distributed object group framework. Cluster Computing, 19(1), 505–517.
[12] Ekblaw, A., Azaria, A., Halamka, J. D., & Lippman, A. (2016). A Case Study for Blockchain in Healthcare:“MedRec” prototype for electronic health records and medical research data. Proceedings of IEEE Open & Big Data Conference, 13, 13.
[13] Ghanavati, S., Abawajy, J. H., Izadi, D., & Alelaiwi, A. A. (2017). Cloud-assisted IoT-based health status monitoring framework. Cluster Computing, 20(2), 1843–1853. https://doi.org/10.1007/s10586-017-0847-y
[14] Hossain, M. M., Fotouhi, M., & Hasan, R. (2015). Towards an analysis of security issues, challenges, and open problems in the internet of things. 2015 IEEE World Congress on Services, 21–28.
[15] Hossain, M. S., & Muhammad, G. (2016). Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring. Computer Networks, 101, 192–202.
[16] Liu, Z., Huang, X., Hu, Z., Khan, M. K., Seo, H., & Zhou, L. (2016). On Emerging Family of Elliptic Curves to Secure Internet of Things : ECC Comes of Age. XX(XX), 1–12. https://doi.org/10.1109/TDSC.2016.2577022
[17] Ma, Y., Wang, Y., Yang, J. U. N., & Miao, Y. (2017). Big Health Application System based on Health Internet of Things and Big Data. 7885–7897.
[18] Oh, S.-R., & Kim, Y.-G. (2017). Security requirements analysis for the IoT. 2017 International Conference on Platform Technology and Service (PlatCon), 1–6.
[19] Rahulamathavan, Y., Phan, R. C.-W., Rajarajan, M., Misra, S., & Kondoz, A. (2017). Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 1–6.
[20] Saied, Y. Ben, Olivereau, A., Zeghlache, D., & Laurent, M. (2013). Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security, 39, 351–365.
[21] Singh, S., Sharma, P. K., Moon, S. Y., & Park, J. H. (2017). Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing, 1–18.
[22] Tamizharasi, G. S. (2017). IoT-Based E-Health System Security : A Vision Archictecture Elements and Future Directions. 655–661.
[23] Vucinic, M., Tourancheau, B., Rousseau, F., Duda, A., Damon, L., & Guizzetti, R. (2014). OSCAR: Object security architecture for the Internet of Things. Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, WoWMoM 2014. https://doi.org/10.1109/WoWMoM.2014.6918975
[24] Williams, P. A. H., & McCauley, V. (2016). Always connected: The security challenges of the healthcare Internet of Things. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 30–35.
[25] Yang, Y., Zheng, X., & Tang, C. (2017). Lightweight distributed secure data management system for health internet of things. Journal of Network and Computer Applications, 89, 26–37.
[26] Zachariah, T., Klugman, N., Campbell, B., Adkins, J., Jackson, N., & Dutta, P. (2015). The internet of things has a gateway problem. HotMobile 2015 - 16th International Workshop on Mobile Computing Systems and Applications, 27–32. https://doi.org/10.1145/2699343.2699344

Downloads

Published

2019-10-14

Issue

Section

Computer Science