Tokens Shuffling Approach for Privacy, Security, and Reliability in IoHT under a Pandemic
Abstract
:1. Introduction
- Proposing a new approach called TSA for preserving privacy in IoHT during the pandemic, especially for LBS. This approach (TSA) will not affect the accuracy of the main services such as health services.
- Enhancing the performance by depending on fog computing and users’ devices computing (Dew computing).
- Utilizing the blockchain to ensure the integrity of saved data.
- Presenting a case study for applying the proposed solution in Saudi Arabia.
- Providing a simulation and comparison to prove the superiority of the proposed approach over the current privacy ones.
2. Related Work
3. Proposed Approach (TSA)
3.1. Main Phases of TSA
- Collect the spatial data for the user and save them locally on the user’s phone by the proposed application to manage these data. The application will save the spatial data for the last 14 days (this period is related to the incubation period without symptoms). The application enables the user to determine a blind point (such as his house), and the data of this area will not be saved.
- 2.
- In the case in which the user is proven to have an infection, we will rely on an independent server “SP1” to verify the infection and manage the generation of tokens. SP1 will send tokens to a list of service providers such as SP2, regardless of whether the service is a medical or tracing one during the pandemic. Two unique tokens are generated (T1, T2) by SP1 for each infected person. The validity of the tokens is one day. T1 will be sent to the fog node, the manager for the user’s area, while T2 will be forwarded to the SP2, which can be a monitoring and tracking service for the places of the spread of the disease. SP1 does not send data about the user’s identity or his name to the fog node or SP2. Additionally, SP1 does not have data about the locations of the user.
- 3.
- After proving the infection and generating the tokens, the user must share his saved data with SP2. SP2 is interested in tracking the places of the spread of infection and some important statistics during pandemics. We have presented two different scenarios to ensure the security and privacy of these data and its users:
- 4.
- SP2 receives the incoming data with users’ tokens (T2) from a fog node. These data have been greatly confused among anonymous users. SP2 checks the validity of all of the received T2 after decrypting it and then decrypts, processes, and makes calculations and statistics on the data. SP2 will not be able to identify the data of a particular user or form a valid user profile. If the service provider is malicious, it will have misleading information about users. After the data processing is completed, SP2 adds the results and statistics within distributed databases based on Blockchain technology. It ensures that the data and results are not lost or tampered with, such as the areas or places most vulnerable to infection due to the presence of incubators of the virus in the previous period.
- 5.
- Non-infected users can download part of the data for a specific region through the application and match it with the data they have stored locally. In the event of intersections, this can give the user an indication of the need to conduct an examination, pay attention to symptoms, or reduce meeting people in the following days, thus enhancing the level of protection and safety. Additionally, the generated information is useful in discovering the places that one should avoid visiting or take greater precautions within.
3.2. Strengths and Limitations of TSA
- TSA did not use fake data protection techniques such as the Dummy approach or data obfuscation, thus maintaining the quality of service and not affecting the accuracy of its results.
- The user in TSA does not need to completely trust any of the cooperating parties, such as the service providers, the fog nodes, or even the cooperating users.
- By saving the data locally for people who have not been proven to be infected, the load on service providers has been reduced, and the privacy and security of users’ data have been enhanced.
- The real data sent by each user to SP are not related to him (they are data for another user). This will enhance his privacy and encourage him to cooperate with others.
- The fog node reduces the load on the user in communicating with service providers, on the one hand, and the other hand, it enhances the privacy of users because they do not have to communicate directly with service providers.
- The use of the token greatly reduces the chances of fake users who want to tamper with the results and statistics of medical centers and service providers.
- The use of blockchain enhances data security, integrity, and reliability.
- Damage to the user’s device causes the loss of data that are saved locally, but this is rare.
- In the case of cooperation between a malicious fog and a malicious SP2, user data can be exposed in the first scenario. However, the problem has been resolved in the second scenario.
- TSA is based on more than one user existing in the same area, which makes sense in pandemic situations, but if there is only one user, TSA in the worst case achieves what the Blind Third Party (BTP) approach achieves, where the user encrypts their data with an SP2 key and sends them via the fog node.
- TSA cannot cover the privacy issue in all types of LBS applications.
3.3. Algorithm of TSA
Alogrithm 1. Function Bool AddNewData (Location1, PoI1, Date1, Time1) |
Begin For (i = 0; i < LocalCache.Items.Count; i++) TimeSpan = Date1—LocalCache.Items[i].Date; If (TimeSpan.Days > 14 ) LocalCache.Items[i].Remove(); else Break; End If End For LocalCache.Items.Add(Location1, PoI1, Date1, Time1); Return true; End Function Function Tokens CheckStatus (UserID) Begin Tokens = null; If (ServerProvider1.check(UserID) == True) // infected T1 = GenerateToken1 (UserID, CurrentDateTime); // Random and Unique Token T2 = GenerateToken1 (UserID, CurrentDateTime); // Random and Unique Token Send (T1, ServerProvider2); Broadcast (T2, FogNodes); Tokens.Add(T1); Tokens.Add(T2); End If Return Tokens; // Note tokens will be valid for 1 day only. End Function Function Void ProtectAndShareData () Begin X = FogAuthentication( UserA.T1 ); If (X) ListPeers = FogGetPeers (); For (i = 0; i < ListPeers.Count; i++) Res = AskCooperation (ListPeers[i]); If (Res == Ack) Break; End If End For EncryptData = Encrypt (ServerProvider2.PublicKey, UserA.LocalCache.Items ) If (Scenario1.IsActive()) B_T1 = SwapTokens (UserA.T1, UserB); Send (ServerPorvider2, EncryptData, B_T1) // Error Token Else // Scenario2.Active B_EncryptData = EnUserA.SwapData (EncryptData, UserB); Send (ServerPorvider2, B_EncryptData, UserA.T1) // Error Data End If End If End Function Function bool CheckPath () Begin List1 = GetAllPoI (CellID); Num = FindMatch (LocalCache.Items, List1); Percentage = 100*Num/(List1.Count + LocalCacheItems.Count); If (Percentage > Threshold) Return true; // There is large potential to be infected … Do test Else Return false; End Function |
4. Simulation and Results
4.1. Metrics and Hypotheses
- K-Anonymity: it refers to the percentage of queries that belong to the user out of all the queries he sent to the service provider. Whenever this value approaches zero, this means better protection.
- Entropy (E): it refers to the amount of valid data that an attacker can collect about a user, i.e., that the attacker is sure that queries belong to a particular user. Usually, the value of E is between 0 and 1, where, in our example, 1 represents absolute uncertainty (the highest privacy protection) and 0 represents no protection, and the following equation calculates the entropy:
- Estimate Error (EE): it indicates the percentage of false guesses that an attacker can fall on about user data and is usually calculated after calculating the entropy with the following equation:
- The performance rate is related to the number of queries sent and is represented by the total number in Nq.
- The performance rate relates to the amount of data sent, the total is represented by S, and the data volume for a single query will be represented by Sq.
- The performance rate relating to the total time T is given by calculating the time of sending the user’s queries to the SP and the time of processing.
- The performance rate relating to the cache is usually given by the expected hit ratio in the cache H.
- The study is carried out on a specific area divided into sectors (cells) of almost equal size, and we symbolize the cell with the C.
- In each C cell, there is a Fog Node, standing for FN, which is responsible for managing the operations of Queries, Peers, and Cache.
- There are 100 different Points of Interest (PoIs) that are randomly distributed over cells, knowing that the same type can be repeated in more than one cell.
- There are 1000 U-users scattered and moving randomly within the region during the study.
- The study period will be 2 h, but we will consider that the system has been working since the pandemic’s beginning.
- The size of the data for one query is Sq, and we will assume that Sq = 1 kb and, therefore, the total volume S can be calculated by:
- In the case of using obfuscation, the size of the obfuscated area will be denoted by the symbol SO, and, therefore, the size of the query will be SOq, which is greater than Sq.
- The average transmission time of one query to the SP through a 4G connection is Tsp = 10 ms.
- Assume that the approximate average transmission time of a single query to a fog node and through a WiFi connection is Tfn = 2 ms.
- Assume that the approximate average transmission time of one query to another user Peer through a WiFi connection is Tpeer = 4 ms, including the period of obtaining the list of users in the same cell.
4.2. Comparison of TSA with Other Approaches
4.2.1. Dummy Approach—Results
- The level of privacy is related to the number of dummies used by the user K, where the privacy increases with the increase in the value of K, and this is clear for Equation (1), but according to Equation (2), the value of E will never reach the maximum value of 1 because the user sends his query within the fake queries; therefore, there is a real amount of information that will be formed by the attacker or the malicious SP after each transmission. Therefore, it is certain that the error rate will not be 100% for the attacker based on Equation (3).
- The level of performance will be adversely affected by the increase in the level of protection associated with K. The total number of queries Nq = 1 + K for each query. Thus, the total transmission time T will be greater, according to Equation (4), based on the new value of Nq.
- This approach will affect the accuracy of the results because of its effect on the total Nq and because the service provider stores the wrong data about all the users.
- The Dummy approach is not effective with the use of the cache, as the hit rate in cache H (Equation (5)) will inevitably be lower than that if only real queries are stored in the cache, based on the hypothesis proven in [31] that users in a particular region usually send similar queries.
- This approach does not require the user to trust any party, including Peer, Fog, or SP.
- This approach does not protect data security and is only concerned with data privacy.
4.2.2. Obfuscation Approach—Results
- The level of privacy is related to the size of the obfuscation zone SO, but it also will not reach Max (E) because the user is inside the zone, that is, there is a part of the zone data associated with the user, and this part will reach the attacker.
- The performance will be adversely affected by the increase in the level of specificity associated with SO, and since SOq > Sq, S will inevitably increase and will affect the transmission time and the total processing time T.
- It also affects the accuracy of the results because of its effect on Sq and increases the noise on the data sent to the service provider.
- It is not effective with the cache, as the hit rate in the cache will be lower due to the obfuscation of the real user’s location within a random area that is difficult to replicate.
- It does not require trusting a third party, including Peer, Fog, or SP.
- It does not protect data security but only its privacy.
4.2.3. Peer Cooperation Approach—Results
- The level of protection in the traditional approach to cooperation is related to the number of peers collaborating, and the value of E increases with the number of peers, but it will not reach the value of Max (E). In the case of the developed SPF approach, it uses the exchange method between users, and, therefore, each user sends someone else’s query, and then it will be E = 1 because the service provider will not have any real information about the user.
- The level of performance is also related to the number of cooperative peers, as it affects the size of the collecting area for them and the number of their different queries, meaning that both Sq and Nq will be affected by the increase, and this will affect T adversely with the increase as well. However, in the developed SPF, the situation will become better due to the cooperation with one peer and therefore the value of T.
- In systems that depend on non-correlated static queries, the SPF approach will not affect the accuracy of the queries. Still, in the case of dynamic queries requiring the service provider to collect all user queries in a certain period (such as medical systems), it adversely affects the accuracy of the results of this process.
- It is effective with the cache because only actual queries are stored in the cache.
- It requires the user to trust the peer and does not require the user to trust the fog or SP.
- It is concerned with protecting privacy, not security.
4.2.4. Blind Third-Party Approach—Results
- It provides a maximum protection level of E = 1 because the user does not communicate with the service provider directly but rather through the fog node. It hides the information from the fog node through encryption with the service provider’s public key.
- The performance will adversely affect the processing time of each query, as encoding and decoding time will be added at each Tenc_dec end, as well as an increase in transmission time to the fog node as an extra step. There is also a slight increase in query size due to the addition of a session key in each query to encrypt the returned results.
- It will not affect the accuracy of the queries.
- It is considered unsuitable for the cache in its basic form because the fog node cannot read the encrypted data.
- It does not require trust in the peer, fog, or SP, but the fog node may cooperate with the SP to breach privacy, and the fog node, in case it is malicious, can send a fake query to tamper with the accuracy of the data of the service provider.
- It provides data security and privacy.
4.2.5. TSA—Results
- It provides a maximum level of protection E = 1 because the user does not send his data to the service provider himself but rather through another user. It hides information from the cooperating user through encryption.
- The performance level will be greatly improved. Although encryption is used with more time to deal with the fog node and then the peer, this only happens once (N = 1) for an aggregated set of queries or data when there is a need to share it. In the normal case, all data are stored with the user himself and are not sent to the service provider, and this will save a lot of time and processing and improve performance and privacy.
- It will not affect the accuracy of the queries at all, even the dynamic ones, as he sends an aggregated set of queries at once.
- It perfectly employs the cache in the user’s device to improve performance and privacy.
- It does not require trust in any party (peer, fog, and SP), and it complicates the process of cooperation between more than one malicious party.
- It provides data security and privacy and ensures data integrity from tampering.
4.3. Summary of the Results
5. Case Study—Saudi Arabia
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bahbouh, N.M.; Compte, S.S.; Valdes, J.V.; Sen, A.A.A. An empirical investigation into the altering health perspectives in the internet of health things. Int. J. Inf. Technol. 2022, 1, 1–11. [Google Scholar] [CrossRef] [PubMed]
- Shahid, J.; Ahmad, R.; Kiani, A.K.; Ahmad, T.; Saeed, S.; Almuhaideb, A.M. Data protection and privacy of the internet of healthcare things (IoHTs). Appl. Sci. 2022, 12, 1927. [Google Scholar] [CrossRef]
- Aazam, M.; Zeadally, S.; Harras, K.A. Fog computing architecture, evaluation, and future research directions. IEEE Commun. Mag. 2018, 56, 46–52. [Google Scholar] [CrossRef]
- Abdali, T.A.N.; Hassan, R.; Aman, A.H.M.; Nguyen, Q.N. Fog computing advancement: Concept, architecture, applications, advantages, and open issues. IEEE Access 2021, 9, 75961–75980. [Google Scholar] [CrossRef]
- Bambra, C.; Riordan, R.; Ford, J.; Matthews, F. The COVID-19 pandemic and health inequalities. J. Epidemiol. Community Health 2020, 74, 964–968. [Google Scholar] [CrossRef]
- Zhang, H.; Wang, X.; Fu, Z.; Luo, M.; Zhang, Z.; Zhang, K.; He, Y.; Wan, D.; Zhang, L.; Wang, J. Potential Factors for Prediction of Disease Severity of COVID-19 Patients. MedRxiv 2020, v1, 1–8. [Google Scholar]
- Zhao, W.; Zhong, Z.; Xie, X.; Yu, Q.; Liu, J. Relation between chest CT findings and clinical conditions of COVID-19 disease (COVID-19) pneumonia: A multicenter study. Am. J. Roentgenol. 2020, 214, 1072–1077. [Google Scholar] [CrossRef]
- World Health Organization. COVID-19 Disease 2019 (COVID-19): Situation Report; World Health Organization: Geneva, Switzerland, 2020; Volume 61. [Google Scholar]
- Wu, Z.; McGoogan, J.M. Characteristics of and important lessons from the COVID-19 disease 2019 (COVID-19) outbreak in China: Summary of a report of 72,314 cases from the Chinese Center for Disease Control and Prevention. JAMA 2020, 323, 1239–1242. [Google Scholar] [CrossRef]
- Wang, Y.; Wang, Y.; Chen, Y.; Qin, Q. Unique epidemiological and clinical features of the emerging 2019 novel COVID-19 pneumonia (COVID-19) implicate special control measures. J. Med. Virol. 2020, 92, 568–576. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Luo, Q.; Chen, R.; Chen, T.; Li, J. Susceptibility Analysis of COVID-19 in Smokers Based on ACE2. Preprints 2020, 1–8. [Google Scholar] [CrossRef] [Green Version]
- Naudé, W. Artificial Intelligence against COVID-19: An Early Review, IZA Discussion Paper No. 13110. 2020. Available online: https://ssrn.com/abstract=3568314 (accessed on 21 November 2022).
- Jia, L.; Li, K.; Jiang, Y.; Guo, X. Prediction and analysis of COVID-19 Disease. arXiv 2019, arXiv:2003.05447. [Google Scholar]
- Warren, M.S.; Skillman, S.W. Mobility changes in response to COVID-19. arXiv 2020, arXiv:2003.14228. [Google Scholar]
- Atlam, H.F.; Wills, G.B. IoT Security, Privacy, Safety and Ethics. In Digital Twin Technologies and Smart Cities; Springer: Cham, Switzerland, 2020; pp. 123–149. [Google Scholar]
- Sowmiya, B.; Abhijith, V.S.; Sudersan, S.; Sakthi Jaya Sundar, R.; Thangavel, M.; Varalakshmi, P. A survey on security and privacy issues in contact tracing application of COVID-19. SN Comput. Sci. 2021, 2, 136. [Google Scholar] [CrossRef] [PubMed]
- Huang, H.; Gartner, G.; Krisp, J.M.; Raubal, M.; Van de Weghe, N. Location based services: Ongoing evolution and research agenda. J. Locat. Based Serv. 2018, 12, 63–93. [Google Scholar] [CrossRef] [Green Version]
- Jiang, H.; Li, J.; Zhao, P.; Zeng, F.; Xiao, Z.; Iyengar, A. Location privacy-preserving mechanisms in location-based services: A comprehensive survey. ACM Comput. Surv. CSUR 2021, 54, 1–36. [Google Scholar] [CrossRef]
- Aboelfotoh, R.M.A. Quality of Service and Privacy in Internet of Things Dedicated to Healthcare. Doctoral Dissertation, Université d’Avignon, Cairo, IL, USA, 2021. [Google Scholar]
- Oussous, A.; Benjelloun, F.Z.; Lahcen, A.A.; Belfkih, S. Big Data technologies: A survey. J. King Saud Univ. Comput. Inf. Sci. 2018, 30, 431–448. [Google Scholar] [CrossRef]
- Ribeiro-Navarrete, S.; Saura, J.R.; Palacios-Marqués, D. Towards a new era of mass data collection: Assessing pandemic surveillance technologies to preserve user privacy. Technol. Forecast. Soc. Chang. 2021, 167, 120681. [Google Scholar] [CrossRef]
- Wang, Z.; Hu, J.; Lv, R.; Wei, J.; Wang, Q.; Yang, D.; Qi, H. Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Trans. Mob. Comput. 2018, 18, 1330–1341. [Google Scholar] [CrossRef]
- Yang, P.; Xiong, N.; Ren, J. Data security and privacy protection for cloud storage: A survey. IEEE Access 2020, 8, 131723–131740. [Google Scholar] [CrossRef]
- Ogonji, M.M.; Okeyo, G.; Wafula, J.M. A survey on privacy and security of Internet of Things. Comput. Sci. Rev. 2020, 38, 100312. [Google Scholar] [CrossRef]
- Sen, A.; Ahmed, A.; Eassa, F.A.; Jambi, K.; Yamin, M. Preserving privacy in internet of things: A survey. Int. J. Inf. Technol. 2018, 10, 189–200. [Google Scholar]
- Davari, M.; Bertino, E. Access control model extensions to support data privacy protection based on GDPR. In Proceedings of the 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9–12 December 2019; pp. 4017–4024. [Google Scholar]
- Ma, J.; Naas, S.A.; Sigg, S.; Lyu, X. Privacy-preserving federated learning based on multi-key homomorphic encryption. Int. J. Intell. Syst. 2022, 37, 5880–5901. [Google Scholar] [CrossRef]
- Zhang, R.; Xue, R.; Liu, L. Security and privacy on blockchain. ACM Comput. Surv. CSUR 2019, 52, 1–34. [Google Scholar] [CrossRef] [Green Version]
- Ren, Y.; Zhu, F.; Sharma, P.K.; Wang, T.; Wang, J.; Alfarraj, O.; Tolba, A. Data query mechanism based on hash computing power of blockchain in internet of things. Sensors 2019, 20, 207. [Google Scholar] [CrossRef] [PubMed]
- Albouq, S.S.; Abi Sen, A.A.; Namoun, A.; Bahbouh, N.M.; Alkhodre, A.B.; Alshanqiti, A. A double obfuscation approach for protecting the privacy of IoT location based applications. IEEE Access 2020, 8, 129415–129431. [Google Scholar] [CrossRef]
- Niu, B.; Li, Q.; Zhu, X.; Cao, G.; Li, H. Enhancing privacy through caching in location-based services. In Proceedings of the 2015 IEEE Conference on Computer Communications (INFOCOM), Hong Kong, China, 26 April–1 May 2015; pp. 1017–1025. [Google Scholar]
- Babaghayou, M.; Labraoui, N.; Ari, A.A.A.; Lagraa, N.; Ferrag, M.A. Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey. J. Inf. Secur. Appl. 2020, 55, 102618. [Google Scholar] [CrossRef]
- Yamin, M.; Alsaawy, Y.; Alkhodre, A.B.; Abi Sen, A.A. An innovative method for preserving privacy in Internet of Things. Sensors 2019, 19, 3355. [Google Scholar] [CrossRef] [Green Version]
- Alamri, S. Anonymous Trajectory Method for Indoor Users for Privacy Protection. In International Conference on Computational Science and Its Applications; Springer: Cham, Switzerland, 2022; pp. 104–112. [Google Scholar]
- El-Ansari, A.; Beni-Hssane, A.; Saadi, M.; El Fissaoui, M. PAPIR: Privacy-aware personalized information retrieval. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 9891–9907. [Google Scholar] [CrossRef]
- Agrawal, R.; Faujdar, N.; Kumar, P.; Kumar, A. Security and Privacy of Blockchain-Based Single-Bit Cache Memory Architecture for IoT Systems. IEEE Access 2022, 10, 35273–35286. [Google Scholar] [CrossRef]
- Yamin, M.; Abi Sen, A.A. A new method with swapping of peers and fogs to protect user privacy in IoT applications. IEEE Access 2020, 8, 210206–210224. [Google Scholar] [CrossRef]
- Zhao, Y.; Chen, J. A survey on differential privacy for unstructured data content. ACM Comput. Surv. CSUR 2022, 54, 1–28. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Bahbouh, N.; Basahel, A.; Sendra, S.; Abi Sen, A.A. Tokens Shuffling Approach for Privacy, Security, and Reliability in IoHT under a Pandemic. Appl. Sci. 2023, 13, 114. https://doi.org/10.3390/app13010114
Bahbouh N, Basahel A, Sendra S, Abi Sen AA. Tokens Shuffling Approach for Privacy, Security, and Reliability in IoHT under a Pandemic. Applied Sciences. 2023; 13(1):114. https://doi.org/10.3390/app13010114
Chicago/Turabian StyleBahbouh, Nour, Abdullah Basahel, Sandra Sendra, and Adnan Ahmed Abi Sen. 2023. "Tokens Shuffling Approach for Privacy, Security, and Reliability in IoHT under a Pandemic" Applied Sciences 13, no. 1: 114. https://doi.org/10.3390/app13010114
APA StyleBahbouh, N., Basahel, A., Sendra, S., & Abi Sen, A. A. (2023). Tokens Shuffling Approach for Privacy, Security, and Reliability in IoHT under a Pandemic. Applied Sciences, 13(1), 114. https://doi.org/10.3390/app13010114