An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks
Abstract
:1. Introduction
- We develop an IoT algorithm that provides an anonymous function.
- We present a strong mathematical basis to prove the privacy and security functions that protect the data being exchanged over the internet using a wireless communication system. This method follows the homomorphism equation via the Identity-based Encryption (IBE).
- We provide an algorithm on computational complexity to evaluate the proposed anonymization algorithm whether it satisfies the complexity requirements during algorithm execution.
- Conversely, the proposed method has a couple of limitations that introduces some opportunities for further research in the IoT-based health care system:
- The anonymization algorithms work within a standalone healthcare system and third party. As many services and providers gradually adopting cloud-based operations, further research are required to overcome the limitation in our algorithm. This would require an additional function to communicate with a cloud provider with anonymization as security service.
- Taking of privacy for data anonymization into account, the user should have the ability to choose his anonymous parameters. However, our method does not offer the option that is reserved for future work.
2. Related Work
3. Proposed IoT-Based Anonymization Algorithm for Security and Privacy in Health Care
3.1. System Model and Overall Description
Algorithm 1: Overall Algorithm (Tripartite: <User, HSys and HTP>) |
3.2. Process of Health Data-Set Anonymization
3.3. Description of the Algorithms
- To boost the allocations number with a no-null response, the heuristic method is designed and can be observed in Algorithm 2. From step 5, some d-encrypted samples are allocated to the HSys from its submission to its response. This operation is done until each considered health system (in a distributed environment such as IoT-based healthcare [29,30]). It is not allowed that in case a sample is put on the reply, a similar action cannot be computed on the rest of the responses in the health system. Partial data (samples) is allocated to the HSys, which performs the big data of the user through the probability of the prediction. The observation of a chosen sample has probably a low value when it is randomly submitted. The steps 16 to step 18, show such case when it is not possible for a response to be allocated d samples, therefore the systems ensures that null samples are allocated. During this process of the operation, the algorithm guarantees that any location should provide a user data within d size otherwise d–anonymity rules are not satisfied.
- The approximation method can be seen at step 21 where it processed using a minimally sized submission allocation to the rest if the encrypted sample from the HSys submission. According to a distributed IoT-based healthcare in [29,30] where more than one health system is interacting, these samples are removed from other entities in which all system have no samples to send until no more system can be allocated samples to release. When all steps of the algorithms are completed, the HTP broadcast a message to each contributing HSys that a sample has been designed to be public or/and which one is anonymized.
3.4. Algorithm Complexity Computation
Algorithm 2: Anonymization Process (α, Ω, and β-anonym parameter) |
4. Algorithm Evaluation Based on Mathematical Concepts
4.1. Preliminary
4.2. Generation of Homomorphism Equation via IBE
- Set-up: The responsible of key generation runs Setup to generate a secret parameter a where it receives an ensemble of parameters (parames) and main key. In this early stage, the parames comprise a space of message with limitations denoted P together with L as a crypto-message. To have the main key as a private element, the PKG is involved.
- Extract: This algorithm is about input parames, including the main key with Id belongs to [0, 1]* where it receives f as a private key. During this phase, the id and public key are an arbitrary sequence with f as a private key.
- Enc: Basically, any algorithm with the encryption phase takes some parameter to encrypt and in this case, they are as follow: The input is <parames, Id, and P0 ∈ P>, the output is a cipher-message <L0 ∈ L>.
- Dec: In the same way, the decryption is the counter-part algorithm with parameters such as the input is <parames, L0 ∈ L, the private key d>, where the output is <P0 ∈ M>.
Homomorphism Equation
- Init step: Let be ε a prime order of <Ꝕ1, Ꝕ2 > the two cyclic groups, and : Ꝕ1 X Ꝕ2 → Ꝕ2 as an acceptable bilinear map of group Ꝕ1 with generator Q. Now, consider s a secret factor and t to be ϖ-bit prime. Assuming that τ-bit strings represented all identities (where τ is polynomial in ϖ). With Β: [0, 1]τ → Ꝕ1 as an algorithm for data mapping (B is the hash function). Next, ∀ δ ∈ {0, 1, …, ε −1}, the computation of the public key relies on a random choice of δ homogeneously and it gives PbKey = δQ. From this computation, the only parameter δ is the secret main key but the rest of the parameters remain public.
- Secret Key Generation Step: This is the step where the <I-B-E> scheme computes the main keys such as secret (or private) and its corresponding public key as follow: For ∀ Id, ∃ ΦId = B (δId, Id) and ΘId = B (δQ, Id) as main secret and public keys respectively. Here B is a cryptographic hash function to compute the keys.
- Cipher Process Step: The cipher message is the result of the secret key with the encryption process over the message itself from the sender. This operation is done as follow: Let σ be a sample data ∈ Ꝕ2 and Id the user identity, Ψ=EncId (σ, μ) = (σ⋅ (μId, Id), ΘId), where μ ∈ {0, 1, …, q − 1} is a secret parameter which is arbitrary selected consistently. The cipher from this encryption process generates a result denoted Ψ.
- Decipher Process Step: To complete the <I-B-E> full cycle algorithm, the system must provide a function to retrieve the original message from the sender. This operation is called decryption. Let Id be the user identity and Ψ the cipher such as Ψ = {, }, the decryption process is a function of (plaintext) and Ψ (cipher):
4.3. Theoretical Proof with Mathematical Analysis
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Yao, L.; Sheng, Q.Z.; Benatallah, B.; Dustdar, S.; Wang, X.; Shemshadi, A.; Kanhere, S.S. WITS: An IoT-endowed computational framework for activity recognition in personalized smart homes. Computing 2018, 100, 369–385. [Google Scholar] [CrossRef]
- Höller, J.; Tsiatsis, V.; Mulligan, C.; Karnouskos, S.; Avesand, S.; Boyle, D. From Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence; Elsevier: Amsterdam, The Netherlands, 2014. [Google Scholar]
- Wang, G.; Gunasekaran, A.; Ngai, E.W.; Papadopoulos, T. Big data analytics in logistics and supply chain management: Certain investigations for research and applications. Int. J. Prod. Econ. 2016, 176, 98–110. [Google Scholar] [CrossRef]
- Shahzad, A.A.; Kim, Y.G.; Elgamoundi, A. Security IoT Platform for Industrial Systems. In Proceedings of the 2017 International Conference on Platform Technology and Service (PlatCon), San Francisco, CA, USA, 8–12 June 2015. [Google Scholar] [CrossRef]
- Ji, Z.; Ganchev, I.; O’Droma, M.; Zhao, L.; Zhang, X. A Cloud-Based Car Parking Middleware for IoT-Based Smart Cities: Design and Implementation. Sensors 2014, 14, 22372–22393. [Google Scholar] [CrossRef] [PubMed]
- Bhatti, F.; Shah, M.A.; Maple, C.; Islam, S.U. A Novel Internet of Things-Enabled Accident Detection and Reporting System for Smart City Environments. Sensors 2019, 19, 2071. [Google Scholar] [CrossRef] [PubMed]
- Arafat, A.D.; Muresan, R.; Mayhew, M.; Lieberman, M. IoT-Based Multifunctional Scalable Real-Time Enhanced Road Side Unit for Intelligent Transportation Systems. In Proceedings of the 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, Canada, 30 April–3 May 2017. [Google Scholar] [CrossRef]
- Dziak, D.; Jachimczyk, B.; Kulesza, W.J. IoT-Based Information System for Healthcare Application: Design Methodology Approach. Appl. Sci. 2017, 7, 596. [Google Scholar] [CrossRef]
- Dwivedi, A.D.; Srivastava, G.; Dhar, S.; Singh, R. A Decentralized Privacy-Preserving Healthcare Blockchain for IoT. Sensors 2019, 19, 326. [Google Scholar] [CrossRef] [PubMed]
- Li, M.; Yu, S.; Zheng, Y.; Ren, K.; Lou, K. Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans. Parallel Distrib. Syst. 2013, 24, 131–143. [Google Scholar] [CrossRef]
- Lee, J.Y.; Lin, W.C.; Huang, Y.H. A lightweight authentication protocol for Internet of Things. In Proceedings of the 3rd International Symposium on Next-Generation Electronics (ISNE 2014), Kwei-Shan, Taiwan, 7–10 May 2014. [Google Scholar]
- Gong, T.; Huang, H.; Li, P.; Zhang, K.; Jiang, H. A Medical Healthcare System for Privacy Protection Based on IoT. In Proceedings of the 7th International Symposium on Parallel Architectures, Algorithms, and Programming (PAAP), Nanjing, China, 12–14 December 2015; pp. 217–222. [Google Scholar]
- Seyed, F.A.; Mala, H.; Shojafar, M.; Peris-Lopez, P. LACO: Lightweight Three-Factor Authentication, Access Control and Ownership Transfer Scheme for E-Health Systems in IoT. Future Gener. Comput. Syst. 2019, 96, 410–424. [Google Scholar] [CrossRef]
- Sliwa, J. A generalized framework for multi-party data exchange for IoT systems. In Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications Workshops, (WAINA), Crans-Montana, Switzerland, 23–25 March 2016; pp. 193–198. [Google Scholar]
- Berrehili, F.Z.; Belmekki, A. Privacy Preservation in the Internet of Things. In Advances in Ubiquitous Networking 2; Lecture Notes in Electrical Engineering; Springer: Singapore, 2017; Volume 397, pp. 163–175. [Google Scholar]
- Shinzaki, T.; Morikawa, I.; Yamaoka, Y.; Sakemi, Y. IoT security for utilization of big data: Mutual authentication technology and anonymization technology for positional data. Fujitsu Sci. Tech. J. 2016, 52, 52–60. [Google Scholar]
- Otgonbayar, A.; Pervez, Z.; Dahal, K. Toward Anonymizing IoT Data Streams via Partitioning. In Proceedings of the 13th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS 2016), Brasilia, Brazil, 10–13 October 2016; pp. 331–336. [Google Scholar]
- Wang, J.; Amos, B.; Das, A.; Pillai, P.; Sadeh, N.; Satyanarayanan, M. A scalable and privacy-aware IoT service for live video analytics. In Proceedings of the 8th ACM Multimedia Systems Conference (MMSys 2017), Taipei, Taiwan, 20–23 June 2017; pp. 38–49. [Google Scholar]
- Addo, I.D.; Madiraju, P.; Ahamed, S.I.; Chu, W.C. Privacy Preservation in Affect-Driven Personalization. In Proceedings of the 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC 2016), Atlanta, GA, USA, 10–14 June 2016; pp. 400–405. [Google Scholar]
- Langheinrich, M. A Privacy Awareness System for Ubiquitous Computing Environments. In UbiComp 2002: Ubiquitous Computing; Lecture Notes in Computer Science; Springer: Berlin/Heidelberg, Germany, 2002; Volume 2498, pp. 237–245. [Google Scholar]
- Langheinrich, M. Privacy by design-principles of privacy-aware ubiquitous systems. In Ubicomp 2001: Ubiquitous Computing; Lecture Notes in Computer Science; Springer: Berlin, Germany, 2001; Volume 2201, pp. 273–291. [Google Scholar]
- Kavenesh, T.; Jasapaljeet, S.D.; Saraswathy, S.G.; Lim, F.C. Developing a Privacy Compliance Scale for IoT Heath Applications. Comput. Sci. Inf. Technol. 2018, 6, 54–62. [Google Scholar] [CrossRef]
- Luo, E.; Bhuiyan, M.Z.A.; Wang, G.; Rahman, M.A.; Wu, J.; Atiquzzaman, M. PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems. IEEE Commun. Mag. 2018, 56, 163–168. [Google Scholar] [CrossRef]
- Trnka, M.; Cerny, T. On security level usage in context-aware role-based access control. In Proceedings of the 31st Annual ACM Symposium on Applied Computing, Pisa, Italy, 4–8 April 2016; pp. 1192–1195. [Google Scholar] [CrossRef]
- Colombo, P.; Ferrari, E. Enhancing NoSQL datastores with fine-grained context-aware access control: A preliminary study on MongoDB. Int. J. Cloud Comput. 2017, 6, 292–305. [Google Scholar] [CrossRef]
- Hosseinzadeh, S.; Virtanen, S.; Rodríguez, N.D.; Lilius, J. A semantic security framework and context-aware role-based access control ontology for smart spaces. In Proceedings of the International Workshop on Semantic Big Data, San Francisco, CA, USA, 26 June–1 July 2016. [Google Scholar] [CrossRef]
- Kayes, A.S.M.; Jun, H.; Wenny, R.; Tharam, D.; Md, S.I.; Alan, C. A Policy Model and Framework for Context-Aware Access Control to Information resources. Comput. J. 2019, 62, 670–705. [Google Scholar] [CrossRef]
- Kayes, A.S.M.; Wenny, R.; Tharam, D.; Elizabeth, C.; Jun, H. Context-Aware Access Control with Imprecise Context Characterization for Cloud-Based Data Resources. Future Gener. Comput. Syst. 2019, 93, 237–255. [Google Scholar] [CrossRef]
- Prosanta, G.; Ruhul, A.; Islamc, S.K.H.; Neeraj, K.; Vinod, K.B. Lightweight, and privacy-preserving RFID authentication scheme for distributed IoT infrastructure with secure localization services for smart city environment. Future Gener. Comput. Syst. 2018, 83, 629–637. [Google Scholar] [CrossRef]
- Atlam, H.F.; Walters, R.J.; Wills, G.B. Fog Computing and the Internet of Things: A Review. Big Data Cogn. Comput. 2018, 2, 10. [Google Scholar] [CrossRef]
- Algorithm Analysis. Available online: https://everythingcomputerscience.com/algorithms/Algorithm_Analysis.html (accessed on 3 July 2019).
- Ian, P. Lecture Notes on Algorithm Analysis and Computational Complexity, 4th ed.; Department of Computer Sciences University of North Texas: Denton, TX, USA, 2001. [Google Scholar]
- Big-O Cheat Sheet. Available online: http://www.bigocheatsheet.com/ (accessed on 3 July 2019).
- Shamir, A. Identity-Based Cryptosystems and Signature Schemes. In Cryptology; Springer: Berlin/Heidelberg, Germany, 1985. [Google Scholar]
- Philippe, G.; Adrien, H.; Duong, H.P.; Tillich, J.P. Identity-based Encryption from Codes with RankMetric. In Cryptology—CRYPTO 2017; Lecture Notes in Computer Science; Katz, J., Shacham, H., Eds.; Springer: Berlin/Heidelberg, Germany, 2017; Volume 10403. [Google Scholar] [CrossRef]
- Francisco, J.V.P. Contributions to Design and Analysis of Fully Homomorphic Encryption Schemes. Ph.D. Thesis, Université Paris-Saclay préparée à l’ Université de Versailles, Versailles, France, July 2018. [Google Scholar]
Parameters | Description |
---|---|
HSys with P & PKG | Health care System with Public & Private Key Generator |
Sick Person <Sp>, Physician <Ph> | Users <U> in the HSys |
<ms, ns> | Secret Pair Key of each user |
HDS | Health Data-Set |
HTP | Health Third Party |
∨ | Or: Sp ∨ Ph |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yin, X.C.; Liu, Z.G.; Ndibanje, B.; Nkenyereye, L.; Riazul Islam, S.M. An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks. Sensors 2019, 19, 3146. https://doi.org/10.3390/s19143146
Yin XC, Liu ZG, Ndibanje B, Nkenyereye L, Riazul Islam SM. An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks. Sensors. 2019; 19(14):3146. https://doi.org/10.3390/s19143146
Chicago/Turabian StyleYin, Xiao Chun, Zeng Guang Liu, Bruce Ndibanje, Lewis Nkenyereye, and S. M. Riazul Islam. 2019. "An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks" Sensors 19, no. 14: 3146. https://doi.org/10.3390/s19143146
APA StyleYin, X. C., Liu, Z. G., Ndibanje, B., Nkenyereye, L., & Riazul Islam, S. M. (2019). An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks. Sensors, 19(14), 3146. https://doi.org/10.3390/s19143146