273 research outputs found
A Secure Medical Record Sharing Scheme Based on Blockchain and Two-fold Encryption
Usually, a medical record (MR) contains the patients disease-oriented
sensitive information. In addition, the MR needs to be shared among different
bodies, e.g., diagnostic centres, hospitals, physicians, etc. Hence, retaining
the privacy and integrity of MR is crucial. A blockchain based secure MR
sharing system can manage these aspects properly. This paper proposes a
blockchain based electronic (e-) MR sharing scheme that (i) considers the
medical image and the text as the input, (ii) enriches the data privacy through
a two-fold encryption mechanism consisting of an asymmetric cryptosystem and
the dynamic DNA encoding, (iii) assures data integrity by storing the encrypted
e-MR in the distinct block designated for each user in the blockchain, and (iv)
eventually, enables authorized entities to regain the e-MR through decryption.
Preliminary evaluations, analyses, comparisons with state-of-the-art works,
etc., imply the efficacy of the proposed scheme.Comment: 6 pages, 3 tables, 8 figures, ICCIT 202
MIGRATING DATA TO THE CLOUD: AN ANALYSIS OF CLOUD STORAGE PRIVACY AND SECURITY ISSUES AND SOLUTIONS
The rise of a digital economy has transformed how individuals do business and carry out daily tasks, including how data is maintained. Because of the vast amount of data that organizations own, cloud storage, a component of the cloud computing paradigm, has emerged as a feasible solution to many businesses\u27 data storage concerns. Despite this, organizations are still cautious about moving all of their data to the cloud due to security concerns, particularly since data management is outsourced to third parties. The aim of this paper is to provide an overview of current challenges in the field of cloud storage privacy and security, with an emphasis on issues related to data confidentiality, integrity, and availability. Using a comprehensive literature study, this research investigates innovative strategies for creating a secure cloud storage environment. The idea of maintaining privacy and data security through the very design of the services, or through the so-called "privacy by design" approach, is explained while avoiding getting into the technical details of how the algorithms and presented solutions work
Privacy-Aware Architectures for NFC and RFID Sensors in Healthcare Applications
World population and life expectancy have increased steadily in recent years, raising issues regarding access to medical treatments and related expenses. Through last-generation medical sensors, NFC (Near Field Communication) and radio frequency identification (RFID) technologies can enable healthcare internet of things (H-IoT) systems to improve the quality of care while reducing costs. Moreover, the adoption of point-of-care (PoC) testing, performed whenever care is needed to return prompt feedback to the patient, can generate great synergy with NFC/RFID H-IoT systems. However, medical data are extremely sensitive and require careful management and storage to protect patients from malicious actors, so secure system architectures must be conceived for real scenarios. Existing studies do not analyze the security of raw data from the radiofrequency link to cloud-based sharing. Therefore, two novel cloud-based system architectures for data collected from NFC/RFID medical sensors are proposed in this paper. Privacy during data collection is ensured using a set of classical countermeasures selected based on the scientific literature. Then, data can be shared with the medical team using one of two architectures: in the first one, the medical system manages all data accesses, whereas in the second one, the patient defines the access policies. Comprehensive analysis of the H-IoT system can be useful for fostering research on the security of wearable wireless sensors. Moreover, the proposed architectures can be implemented for deploying and testing NFC/RFID-based healthcare applications, such as, for instance, domestic PoCs
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes numerous security and privacy issues. In the process of ensuring data confidentiality and fine-grained access control to data in the cloud, several studies have proposed Attribute-Based Encryption (ABE) schemes, with Key Policy-ABE (KP-ABE) being the prominent one. Recent works have however suggested that the confidentiality of data is violated through collusion attacks between a revoked user and the cloud server. We present a secured and efficient Proxy Re-Encryption (PRE) scheme that incorporates an Inner-Product Encryption (IPE) scheme in which decryption of data is possible if the inner product of the private key, associated with a set of attributes specified by the data owner, and the associated ciphertext is equal to zero 0 . We utilize a blockchain network whose processing node acts as the proxy server and performs re-encryption on the data. In ensuring data confidentiality and preventing collusion attacks, the data are divided into two, with one part stored on the blockchain network and the other part stored on the cloud. Our approach also achieves fine-grained access control
Efficient and Secure Key Management and Authentication Scheme for WBSNs Using CP-ABE and Consortium Blockchain
publishedVersio
Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing
[EN] Internet of Things (IoT) is a developing technology for supporting heterogeneous physical objects into smart things and improving the individuals living using wireless communication systems. Recently, many smart healthcare systems are based on the Internet of Medical Things (IoMT) to collect and analyze the data for infectious diseases, i.e., body fever, flu, COVID-19, shortness of breath, etc. with the least operation cost. However, the most important research challenges in such applications are storing the medical data on a secured cloud and make the disease diagnosis system more energy efficient. Additionally, the rapid explosion of IoMT technology has involved many cyber-criminals and continuous attempts to compromise medical devices with information loss and generating bogus certificates. Thus, the increase in modern technologies for healthcare applications based on IoMT, securing health data, and offering trusted communication against intruders is gaining much research attention. Therefore, this study aims to propose an energy-efficient IoT e-health model using artificial intelligence with homomorphic secret sharing, which aims to increase the maintainability of disease diagnosis systems and support trustworthy communication with the integration of the medical cloud. The proposed model is analyzed and proved its significance against relevant systems.Prince Sultan University, Riyadh Saudi Arabia, (SEED-CCIS-2021{85}) under Artificial Intelligence & Data Analytics Research Lab. CCIS.Rehman, A.; Saba, T.; Haseeb, K.; Marie-Sainte, SL.; Lloret, J. (2021). Energy-Efficient IoT e-Health Using Artificial Intelligence Model with Homomorphic Secret Sharing. Energies. 14(19):1-15. https://doi.org/10.3390/en14196414S115141
Stochastic Gradient Deep Multilayer Neural Network based Linear Congruential Generative Cryptosystem for Secured Data Communication in Cloud
Cloud computing is a kind of distributed computing that use a vast network of interconnected resources accessible over the internet. Security is a crucial concern in cloud computing due to the fact that users save their data on the cloud for convenient access from any location and at any time. Consequently, many users are worried about safeguarding their sensitive data in an unsafe location. Therefore, cloud computing architecture requires an innovative cryptographic method that ensures the secrecy, authenticity, integrity, and non-repudiation of data transfer in the cloud. A new technique called SEMcrypt, which stands for Stochastic Gradient DEep Multilayer Neural Network based Linear Congruential Generative Cryptography, has been developed to enhance secure data transmission. SEMcrypt ensures higher data confidentiality and reduces the time required for communication between the cloud user (i.e., patient) and the server. The SEMcrypt approach has two distinct processes: categorization and secure data transport. Initially, the data is gathered from the patients and is used as input for the stochastic gradient regularised deep multilayer neural network. The deep neural network consists of one input layer, two hidden layers, and one output layer. At first, the information is gathered from the patients and sent to the input layer. Next, the patient data that has been gathered is examined in hidden layer 1 using the generalised Tikhonov regularisation function. The patient data that has been analysed is sent to hidden layer 2. The hyperbolic tangent activation function is used at that layer to classify the patient data. Subsequently, the categorised data undergoes encryption via the use of Linear Congruential Generative Goldwasser-Micali encryption, ensuring safe transfer of the data. Subsequently, the encrypted data is sent to the cloud server. The patient data is encrypted on the server side using the Linear Congruential Generative Goldwasser-Micali decryption technique to prevent unauthorised access or assaults. Consequently, the authorised recipient receives the unaltered information, which is then kept in the database for further analysis. Secured data transmission is achieved by ensuring better levels of data confidentiality and reducing the time required for the process. The experimental assessment focuses on criteria such as the time it takes to generate keys, the level of data confidentiality and integrity, the computing time, and the accuracy of categorization. The empirical findings demonstrate that our suggested SEMcrypt approach delivers efficient performance outcomes by attaining superior levels of data confidentiality and integrity within a minimal timeframe
Recommended from our members
Post-quantum blockchain for internet of things domain
This thesis was submitted for the award of Doctor of Philosophy and was awarded by Brunel University LondonIn the evolving realm of quantum computing, emerging advancements reveal substantial challenges and threats to existing cryptographic infrastructures, particularly impacting blockchain technologies. These are pivotal for securing the Internet of Things (IoT) ecosystems. The traditional blockchain structures, integral to myriad IoT applications, are susceptible to potential quantum computations, emphasizing an urgent need for innovations in post-quantum blockchain solutions to reinforce security in the expansive domain of IoT.
This PhD thesis delves into the crucial exploration and meticulous examination of the development and implementation of post-quantum blockchain within the IoT landscape, focusing on the incorporation of advanced post-quantum cryptographic algorithms in Hyperledger Fabric, a forefront blockchain platform renowned for its versatility and robustness. The primary aim is to discern viable post-quantum cryptographic solutions capable of fortifying blockchain systems against impending quantum threats enhancing security and reliability in IoT applications.
The research comprehensively evaluates various post-quantum public-key generation and digital signature algorithms, performing detailed analyses of their computational time and memory usage to identify optimal candidates. Furthermore, the thesis proposes an innovative lattice-based digital signature scheme Fast-Fourier Lattice-based Compact Signature over NTRU (Falcon), which leverages the Monte Carlo Markov Chain (MCMC) algorithm as a trapdoor sampler to augment its security attributes.
The research introduces a post-quantum version of the Hyperledger Fabric blockchain that integrates post-quantum signatures. The system utilizes the Open Quantum Safe (OQS) library, rigorously tested against NIST round 3 candidates for optimal performance. The study highlights the capability to manage IoT data securely on the post-quantum Hyperledger Fabric blockchain through the Message Queue Telemetry Transport (MQTT) protocol. Such a configuration ensures safe data transfer from IoT sensors directly to the blockchain nodes, securing the processing and recording of sensor data within the node ledger. The research addresses the multifaceted challenges of quantum computing advancements and significantly contributes to establishing secure, efficient, and resilient post-quantum blockchain infrastructures tailored explicitly for the IoT domain. These findings are instrumental in elevating the security paradigms of IoT systems against quantum vulnerabilities and catalysing innovations in post-quantum cryptography and blockchain technologies.
Furthermore, this thesis introduces strategies for the optimization of performance and scalability of post-quantum blockchain solutions and explores alternative, energy-efficient consensus mechanisms such as the Raft and Stellar Consensus Protocol (SCP), providing sustainable alternatives to the conventional Proof-of-Work (PoW) approach.
A critical insight emphasized throughout this thesis is the imperative of synergistic collaboration among academia, industry, and regulatory bodies. This collaboration is pivotal to expedite the adoption and standardization of post-quantum blockchain solutions, fostering the development of interoperable and standardized technologies enriched with robust security and privacy frameworks for end users.
In conclusion, this thesis furnishes profound insights and substantial contributions to implementing post-quantum blockchain in the IoT domain. It delineates original contributions to the knowledge and practices in the field, offering practical solutions and advancing the state-of-the-art in post-quantum cryptography and blockchain research, thereby paving the way for a secure and resilient future for interconnected IoT systems
- …