273 research outputs found

    A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption

    Full text link
    Usually, a medical record (MR) contains the patients disease-oriented sensitive information. In addition, the MR needs to be shared among different bodies, e.g., diagnostic centres, hospitals, physicians, etc. Hence, retaining the privacy and integrity of MR is crucial. A blockchain based secure MR sharing system can manage these aspects properly. This paper proposes a blockchain based electronic (e-) MR sharing scheme that (i) considers the medical image and the text as the input, (ii) enriches the data privacy through a two-fold encryption mechanism consisting of an asymmetric cryptosystem and the dynamic DNA encoding, (iii) assures data integrity by storing the encrypted e-MR in the distinct block designated for each user in the blockchain, and (iv) eventually, enables authorized entities to regain the e-MR through decryption. Preliminary evaluations, analyses, comparisons with state-of-the-art works, etc., imply the efficacy of the proposed scheme.Comment: 6 pages, 3 tables, 8 figures, ICCIT 202

    MIGRATING DATA TO THE CLOUD: AN ANALYSIS OF CLOUD STORAGE PRIVACY AND SECURITY ISSUES AND SOLUTIONS

    Get PDF
    The rise of a digital economy has transformed how individuals do business and carry out daily tasks, including how data is maintained. Because of the vast amount of data that organizations own, cloud storage, a component of the cloud computing paradigm, has emerged as a feasible solution to many businesses\u27 data storage concerns. Despite this, organizations are still cautious about moving all of their data to the cloud due to security concerns, particularly since data management is outsourced to third parties. The aim of this paper is to provide an overview of current challenges in the field of cloud storage privacy and security, with an emphasis on issues related to data confidentiality, integrity, and availability. Using a comprehensive literature study, this research investigates innovative strategies for creating a secure cloud storage environment. The idea of maintaining privacy and data security through the very design of the services, or through the so-called "privacy by design" approach, is explained while avoiding getting into the technical details of how the algorithms and presented solutions work

    Privacy-Aware Architectures for NFC and RFID Sensors in Healthcare Applications

    Get PDF
    World population and life expectancy have increased steadily in recent years, raising issues regarding access to medical treatments and related expenses. Through last-generation medical sensors, NFC (Near Field Communication) and radio frequency identification (RFID) technologies can enable healthcare internet of things (H-IoT) systems to improve the quality of care while reducing costs. Moreover, the adoption of point-of-care (PoC) testing, performed whenever care is needed to return prompt feedback to the patient, can generate great synergy with NFC/RFID H-IoT systems. However, medical data are extremely sensitive and require careful management and storage to protect patients from malicious actors, so secure system architectures must be conceived for real scenarios. Existing studies do not analyze the security of raw data from the radiofrequency link to cloud-based sharing. Therefore, two novel cloud-based system architectures for data collected from NFC/RFID medical sensors are proposed in this paper. Privacy during data collection is ensured using a set of classical countermeasures selected based on the scientific literature. Then, data can be shared with the medical team using one of two architectures: in the first one, the medical system manages all data accesses, whereas in the second one, the patient defines the access policies. Comprehensive analysis of the H-IoT system can be useful for fostering research on the security of wearable wireless sensors. Moreover, the proposed architectures can be implemented for deploying and testing NFC/RFID-based healthcare applications, such as, for instance, domestic PoCs

    A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain

    Get PDF
    Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control

    Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing

    Full text link
    [EN] Internet of Things (IoT) is a developing technology for supporting heterogeneous physical objects into smart things and improving the individuals living using wireless communication systems. Recently, many smart healthcare systems are based on the Internet of Medical Things (IoMT) to collect and analyze the data for infectious diseases, i.e., body fever, flu, COVID-19, shortness of breath, etc. with the least operation cost. However, the most important research challenges in such applications are storing the medical data on a secured cloud and make the disease diagnosis system more energy efficient. Additionally, the rapid explosion of IoMT technology has involved many cyber-criminals and continuous attempts to compromise medical devices with information loss and generating bogus certificates. Thus, the increase in modern technologies for healthcare applications based on IoMT, securing health data, and offering trusted communication against intruders is gaining much research attention. Therefore, this study aims to propose an energy-efficient IoT e-health model using artificial intelligence with homomorphic secret sharing, which aims to increase the maintainability of disease diagnosis systems and support trustworthy communication with the integration of the medical cloud. The proposed model is analyzed and proved its significance against relevant systems.Prince Sultan University, Riyadh Saudi Arabia, (SEED-CCIS-2021{85}) under Artificial Intelligence & Data Analytics Research Lab. CCIS.Rehman, A.; Saba, T.; Haseeb, K.; Marie-Sainte, SL.; Lloret, J. (2021). Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing. Energies. 14(19):1-15. https://doi.org/10.3390/en14196414S115141

    Stochastic Gradient Deep Multilayer Neural Network based Linear Congruential Generative Cryptosystem for Secured Data Communication in Cloud

    Get PDF
    Cloud computing is a kind of distributed computing that use a vast network of interconnected resources accessible over the internet.   Security is a crucial concern in cloud computing due to the fact that users save their data on the cloud for convenient access from any location and at any time.   Consequently, many users are worried about safeguarding their sensitive data in an unsafe location.  Therefore, cloud computing architecture requires an innovative cryptographic method that ensures the secrecy, authenticity, integrity, and non-repudiation of data transfer in the cloud.  A new technique called SEMcrypt, which stands for Stochastic Gradient DEep Multilayer Neural Network based Linear Congruential Generative Cryptography, has been developed to enhance secure data transmission. SEMcrypt ensures higher data confidentiality and reduces the time required for communication between the cloud user (i.e., patient) and the server. The SEMcrypt approach has two distinct processes: categorization and secure data transport.  Initially, the data is gathered from the patients and is used as input for the stochastic gradient regularised deep multilayer neural network.   The deep neural network consists of one input layer, two hidden layers, and one output layer.   At first, the information is gathered from the patients and sent to the input layer.   Next, the patient data that has been gathered is examined in hidden layer 1 using the generalised Tikhonov regularisation function.   The patient data that has been analysed is sent to hidden layer 2.   The hyperbolic tangent activation function is used at that layer to classify the patient data.   Subsequently, the categorised data undergoes encryption via the use of Linear Congruential Generative Goldwasser-Micali encryption, ensuring safe transfer of the data.  Subsequently, the encrypted data is sent to the cloud server.   The patient data is encrypted on the server side using the Linear Congruential Generative Goldwasser-Micali decryption technique to prevent unauthorised access or assaults.   Consequently, the authorised recipient receives the unaltered information, which is then kept in the database for further analysis.   Secured data transmission is achieved by ensuring better levels of data confidentiality and reducing the time required for the process.   The experimental assessment focuses on criteria such as the time it takes to generate keys, the level of data confidentiality and integrity, the computing time, and the accuracy of categorization.    The empirical findings demonstrate that our suggested SEMcrypt approach delivers efficient performance outcomes by attaining superior levels of data confidentiality and integrity within a minimal timeframe
    • …
    corecore