An Enhanced Approach of Intrusion Avoidance and Privacy Pre-serving for Sharing Healthcare Data on Cloudlet

  • Authors

    • Syed. Karimunnisa
    • K Suma Anusha
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15395
  • Privacy protection, data sharing, collaborative intrusion detection system (IDS), healthcare
  • With the development of clouds and cloudlet technology along with wearable devices, the need for providing security to medical data can be increased. Medical data includes data collection, data storage and data sharing, etc. Traditional healthcare system transmits the medical data to the cloud using sensitive information which causes communication energy consumption. Practically, sharing medical data is a challenging task. Thus in this paper, we propose a novel healthcare system by using the flexibility of cloudlet. The operations of cloudlet include privacy protection, data sharing and intrusion detection. In data collection stage, First, the data collected by wearable devices is encrypted using Number Theory Research Unit (NTRU) method and that encrypted data can be transfered to nearby cloudlet. Secondly, we develop a new trust model to help users to select trustable similar patients who want to share stored data in the cloudlet and to communicate with each other about their diseases. Thirdly, we divide users’ medical data into three parts and give them security which is stored in remote cloud of hospital. Finally, to protect the healthcare system from malicious attacks, we implement a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh, Our experiments proves the effectiveness of the proposed scheme.

     

     

  • References

    1. [1] H. Mohamed, L. Adil, T. Saida, and M. Hicham “A collaborative intrusion detection and prevention system based on distributed systemsâ€2014 IEEE conference.

      [2] K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for telehomehealthcare,â€inEngineeringinMedicineandBiologySociety,2004. IEMBS’04. 26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387.

      [3] M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,†2015.

      [4] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, and D. Georgakopoulos, “A security framework in g-hadoop for big data computing across distributed cloud data centres,†Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.

      [5] M. S. Hossain and G. Muhammad, “Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring,†Computer Networks, vol. 101, pp. 192–202, 2016.

      [6] R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,†in Cloud Computing (CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010, pp. 268–275.

      [7] K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, “Deypos: Deduplicatable dynamic proof of storage for multi-user environments,†2016.

      [8] L.Grifï¬nandE.DeLeastar,“Socialnetworkinghealthcare,â€inWearable Micro and Nano Technologies for Personalized Health (pHealth), 2009 6th International Workshop on. IEEE, 2009, pp. 75–78.

      [9] W. Xiang, G. Wang, M. Pickering, and Y. Zhang, “Big video data for light-ï¬eld-based 3d telemedicine,†IEEE Network, vol. 30, no. 3, pp. 30– 38, 2016.

      [10] https://www.patientslikeme.com/.

      [11] C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: challenges and opportunities,†Network, IEEE, vol. 24, no. 4, pp. 13–18, 2010.

      [12]N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,†Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.

      [13] K. T. Pickard and M. Swan, “Big desire to share big health data: A shift in consumer attitudes toward personal health information,†in 2014 AAAI Spring Symposium Series, 2014.

      [14]Y. Shi, S. Abhilash, and K. Hwang, “Cloudlet mesh for securing mobile clouds from intrusions and network attacks,†in The Third IEEE International Conference on Mobile Cloud Computing, Services, and Engineering,(Mobile Cloud 2015). IEEE, 2015.

      [15] E. Vasilomanolakis, S. Karuppayah, M. M¨uhlh¨auser, and M. Fischer, “Taxonomy and survey of collaborative intrusion detection,†ACM Computing Surveys (CSUR), vol. 47, no. 4, p. 55, 2015.

      [16]P. K. Rajendran, B. Muthukumar, and G. Nagarajan, “Hybrid intrusion detection system for private cloud: a systematic approach,†Procedia Computer Science, vol. 48, pp. 325–329, 2015.

      [17]I.-R. Chen and R. Mitchell “Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems,†Dependable and Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 16–30, 2015.

      [18]Hsiang-Cheh Huang, Wai-Chi Fang, “Integrity Preservation and Privacy Protection for Medical Images with HistogramBased Reversible Data Hidingâ€, IEEE, 2011.

      [19] Tohari Ahmad, HudanStudiawan, HafidhSholihuddin Ahmad, Royyana M. Ijtihadie, WaskithoWibisono, “Shared Secretbased Steganography for Protecting Medical Data†IEEE 2014 International Conference on Computer, Control, Informatics and its Applications, July 2014.

      [20] Lingjia Liu, RachadAtat and Yang Yi, “Privacy Protection Scheme for eHealth Systems: A Stochastic Geometry Approachâ€, IEEE, September 2016.

      [21] Zhong Han, Yuqing Sun, Yuan Wang, “Audit Recommendation for Privacy Protection in Personal Health Record Systemsâ€, Proceedings of the 2013.

  • Downloads

  • How to Cite

    Karimunnisa, S., & Suma Anusha, K. (2018). An Enhanced Approach of Intrusion Avoidance and Privacy Pre-serving for Sharing Healthcare Data on Cloudlet. International Journal of Engineering & Technology, 7(2.32), 164-166. https://doi.org/10.14419/ijet.v7i2.32.15395