Please wait a minute...
Frontiers of Optoelectronics

ISSN 2095-2759

ISSN 2095-2767(Online)

CN 10-1029/TN

Postal Subscription Code 80-976

Front. Optoelectron.    2022, Vol. 15 Issue (3) : 29    https://doi.org/10.1007/s12200-022-00028-1
RESEARCH ARTICLE
Public auditing for real-time medical sensor data in cloud-assisted HealthIIoT system
Weiping Ye1,2,3,4, Jia Wang1,2,3,4, Hui Tian1,2,3,4(), Hanyu Quan1,3,4
1. College of Computer Science and Technology, Huaqiao University, Xiamen 361021, China
2. Wuhan National Laboratory for Optoelectronics, Wuhan 430074, China
3. Xiamen Key Laboratory of Data Security and Blockchain Technology, Xiamen 361021, China
4. Fujian Key Laboratory of Big Data Intelligence and Security, Xiamen 361021, China
 Download: PDF(1279 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

With the advancement of industrial internet of things (IIoT), wireless medical sensor networks (WMSNs) have been widely introduced in modern healthcare systems to collect real-time medical data from patients, which is known as HealthIIoT. Considering the limited computing and storage capabilities of lightweight HealthIIoT devices, it is necessary to upload these data to remote cloud servers for storage and maintenance. However, there are still some serious security issues within outsourcing medical sensor data to the cloud. One of the most significant challenges is how to ensure the integrity of these data, which is a prerequisite for providing precise medical diagnosis and treatment. To meet this challenge, we propose a novel and efficient public auditing scheme, which is suitable for cloud-assisted HealthIIoT system. Specifically, to address the contradiction between the high real-time requirement of medical sensor data and the limited computing power of HealthIIoT devices, a new online/offline tag generation algorithm is designed to improve preprocessing efficiency; to protect medical data privacy, a secure hash function is employed to blind the data proof. We formally prove the security of the presented scheme, and evaluate the performance through detailed experimental comparisons with the state-of-the-art ones. The results show that the presented scheme can greatly improve the efficiency of tag generation, while achieving better auditing performance than previous schemes.

Keywords Healthcare industrial internet of things (HealthIIoT)      Medical sensor data      Online/offline signature      Public auditing     
Corresponding Author(s): Hui Tian   
About author: Tongcan Cui and Yizhe Hou contributed equally to this work.
Issue Date: 23 August 2022
 Cite this article:   
Weiping Ye,Jia Wang,Hui Tian, et al. Public auditing for real-time medical sensor data in cloud-assisted HealthIIoT system[J]. Front. Optoelectron., 2022, 15(3): 29.
 URL:  
https://academic.hep.com.cn/foe/EN/10.1007/s12200-022-00028-1
https://academic.hep.com.cn/foe/EN/Y2022/V15/I3/29
1 F. Al-Turjman, , S. Alturjman, : Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Ind. Inf. 14 (6), 2736- 2744 (2018)
2 Y. Miao, , Q. Tong, , K.K.R. Choo, , X. Liu, , R.H. Deng, , H. Li, : Secure online/offline data sharing framework for cloud-assisted industrial internet of things. IEEE Internet Things J. 6 (5), 8681- 8691 (2019)
3 H. Huang, , T. Gong, , N. Ye, , R. Wang, , Y. Dou, : Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Trans. Ind. Inf. 13 (3), 1227- 1237 (2017)
4 J. Sun, , D. Chen, , N. Zhang, , G. Xu, , M. Tang, , X. Nie, , M. Cao, : A privacy-aware and traceable fine-grained data delivery system in cloud-assisted healthcare IIoT. IEEE Internet Things J. 8 (12), 10034- 10046 (2021)
5 J. Hao, , M. Jayachandran, , P.L. Kng, , S.F. Foo, , P.W. Aung Aung, , Z. Cai, : FBG-based smart bed system for healthcare applications. Front. Optoelectron. 3 (1), 78- 83 (2010)
6 M.N. Zahid, , J. Jiang, , S. Rizvi, : Reffectometric and interferometric fiber optic sensor’s principles and applications. Front. Optoelectron. 12 (2), 215- 226 (2019)
7 T. Uddin, , M. Borhan Uddin, , A.K.M. Muzahidul Islam, , S. Islam, , S. Shatabda, : Application of internet of things for early detection of COVID-19 using wearables. In: Proceeding of 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM). pp. 405- 410 (2021)
8 M. Zhang, , R. Chu, , C. Dong, , J. Wei, , W. Lu, , N. Xiong, : Residual learning diagnosis detection: an advanced residual learning diagnosis detection system for COVID-19 in industrial internet of things. IEEE Trans. Ind. Inf. 17 (9), 6510- 6518 (2021)
9 C.C. Lee, , S.D. Chen, , C.T. Li, , C.L. Cheng, , Y.M. Lai, : Security enhancement on an RFID ownership transfer protocol based on cloud. Futur. Gener. Comput. Syst. 93, 266- 277 (2019)
10 A. Botta, , W. Donato, , V. Persico, , A. Pescapé, : Integration of cloud computing and internet of things: a survey. Futur. Gener. Comput. Syst. 56, 684- 700 (2016)
11 C. Doukas, , I. Maglogiannis, : Bringing IoT and cloud computing towards pervasive healthcare. In: Proceeding of 2012 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. pp. 922- 926 (2012)
12 A. Lounis, , A. Hadjidj, , A. Bouabdallah, , Y. Challal, : Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst. 55, 266- 277 (2016)
13 C.C. Lee, : Security and privacy in wireless sensor networks: advances and challenges. Sensors (Basel) 20 (3), 744 (2020)
14 X. Zhang, , J. Zhao, , C. Xu, , H. Li, , H. Wang, , Y. Zhang, : CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors. IEEE Trans. Cloud Comput. 9 (4), 1362- 1375 (2021)
15 M. Brandenburger, , C. Cachin, , N. Knežević, : Don’t trust the cloud, verify: integrity and consistency for cloud object stores. ACM Trans. Priv. Secur. 20 (3), 1- 30 (2017)
16 M.S. Hwang, , T.H. Sun, , C.C. Lee, : Achieving dynamic data guarantee and data confidentiality of public auditing in cloud storage service. J. Circuits Syst. Comput. 26 (5), 1750072 (2017)
17 H. Yan, , J. Li, , Y. Zhang, : Remote data checking with a designated verifier in cloud storage. IEEE Syst. J. 14 (2), 1788- 1797 (2020)
18 M. Thangavel, , P. Varalakshmi, , T. Preethi, , S. Renganayaki, , G.R. Subhapriya, , Banu A.Z.,: A review on public auditing in cloud environment. In: Proceeding of 2016 International Conference on Information Communication and Embedded Systems (ICICES). pp. 1- 6 (2016)
19 H. Tian, , Y. Chen, , H. Jiang, , Y. Huang, , F. Nan, , Y. Chen, : Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17 (1), 10- 22 (2019)
20 G. Jaya Rao, , S.K. Pasupuleti, , R. Kandukuri, : Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues. Proc. Int. J. Cloud Comput. 8 (1), 20- 49 (2019)
21 A. Juels, , B.S.Jr. Kaliski, : PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. pp. 584- 597 (2007)
22 G. Ateniese, , R. Burns, , R. Curtmola, , J. Herring, , L. Kissner, , Z. Peterson, , D. Song, : Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. pp. 598- 609 (2007)
23 C.C. Erway, , A. Küpçü, , C. Papamanthou, , R. Tamassia, : Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. pp. 213- 222 (2009)
24 Q. Wang, , C. Wang, , J. Li, , K. Ren, , W. Lou, : Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of European Symposium on Research in Computer Security. pp. 355- 370 (2009)
25 Y. Zhu, , G. Ahn, , H. Hu, , S.S. Yau, , H.G. An, , C.J. Hu, : Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6 (2), 227- 238 (2013)
26 H. Tian, , Y. Chen, , C.C. Chang, , H. Jiang, , Y. Huang, , Y. Chen, , J. Liu, : Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10 (5), 701- 714 (2017)
27 C. Wang, , S.S.M. Chow, , Q. Wang, , K. Ren, , W. Lou, : Privacy-preserving public auditing for secure cloud storage. IEEE Trans. Comput. 62 (2), 362- 375 (2013)
28 K. Yang, , X. Jia, : An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24 (9), 1717- 1726 (2013)
29 B. Wang, , B. Li, , H. Li, : Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2 (1), 43- 56 (2014)
30 G. Yang, , J. Yu, , W. Shen, , Q. Su, , Z. Fu, , R. Hao, : Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130- 139 (2016)
31 H. Tian, , F. Nan, , H. Jiang, , C.C. Chang, , J. Ning, , Y. Huang, : Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107- 125 (2019)
32 B. Wang, , B. Li, , H. Li, , F. Li, : Certificateless public auditing for data integrity in the cloud. In: Proceedings of 2013 IEEE Conference on Communications and Network Security (CNS). pp. 136- 144 (2013)
33 D. He, , S. Zeadally, , L. Wu, : Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12 (1), 64- 73 (2018)
34 J. Li, , H. Yan, , Y. Zhang, : Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans. Serv. Comput. 14 (1), 71- 81 (2021)
35 S. Even, , O. Goldreich, , S. Micali, : On-line/off-line digital signatures. J. Cryptol. 9 (1), 35- 67 (1996)
36 J. Li, , L. Zhang, , J.K. Liu, , H. Qian, , Z. Dong, : Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11 (11), 2572- 2583 (2016)
37 Y. Wang, , Q. Wu, , B. Qin, , S. Tang, , W. Susilo, : Online/offline provable data possession. IEEE Trans. Inf. Forensics Secur. 12 (5), 1182- 1194 (2017)
38 F. Zhang, , R. Safavi-Naini, , W. Susilo, : An efficient signature scheme from bilinear pairings and its applications. In: International Workshop on Public Key Cryptography. pp. 277- 290 (2004)
39 D. Boneh, , B. Lynn, , H. Shacham, : Short signatures from the Weil pairing. J. Cryptol. 17 (4), 297- 319 (2004)
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed