Abstract
Significant improvement in eHealth services in both quality and financial points of view are possible if public cloud infrastructures could be utilized in storing and processing personal health information (PHI) from IoT devices monitoring and collecting data from persons. The challenge is that personal health records are highly sensitive and health related organization are not willing to trust the cybersecurity of public clouds. Another challenge is that strict regulation is in place regarding the physical location of PHI. This paper addresses these issues by proposing tokenization architecture and crypto-implementation for personal identity number (PIN). This will allow the storage and processing of the personal health information (PII) in the public cloud as the data cannot be identified to a specific person. The proposal follows the general data protection regulation (GDPR) by offering secure and highly resilient architecture for the separation of health data and person identity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Industrial Internet Consortium. http://www.iiconsortium.org/
Microsoft. https://www.microsoft.com/en-us/internet-of-things/healthcare
Botta, A., de Donato, W., Persico, V., Pescapé, A.: On the integration of cloud computing and Internet of Things. In: 2014 International Conference on Future Internet of Things and Cloud (FiCloud), pp. 23–30. IEEE Press, New York (2014)
General Data Protection Regulation (EU) 2016/679. http://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A32016R0679
Ida, I.B., Jemai, A., Loukil, A.: A survey on security of IoT in the context of eHealth and clouds. In: 11th International Design & Test Symposium (IDT), pp. 25–30. IEEE Press, New York (2016)
Supriya, S., Padaki, S.: Data security and privacy challenges in adopting solutions for IOT. In: 2016 IEEE International Conference on Internet of Things (iThings), pp. 410–415. IEEE Press, New York (2016)
Sawand, A., Djahel, S., Zhang, Z., Naït-Abdesselam, F.: Multidisciplinary approaches to achieving efficient and trustworthy eHealth monitoring systems. In: IEEE/CIC ICCC 2014 Symposium on Privacy and Security in Communications, pp. 187–192. IEEE Press, New York (2014)
Henkilötietolaki 523/1999. http://www.finlex.fi/fi/laki/ajantasa/1999/19990523
Valtioneuvoston asetus väestötietojärjestelmästä 25.2.2010/128. http://www.finlex.fi/fi/laki/ajantasa/2010/20100128
PCI Data Security Standard Information Supplement: PCI DSS Tokenization Guidelines. https://www.pcisecuritystandards.org/documents/Tokenization_Guidelines_Info_Supplement.pdf
ISO/IEC PRF 20922. https://www.iso.org/standard/69466.html
Cloud Security Alliance, Security Guidance for Critical Areas of Focus in Cloud Computing. https://downloads.cloudsecurityalliance.org/assets/research/security-guidance/csaguide.v3.0.pdf
ENISA: Recommended cryptographic measures – securing personal data. https://www.enisa.europa.eu/publications/recommended-cryptographic-measures-securing-personal-data
NIST: Special Publication 800-175B: Guideline for Using Cryptographic Standards in Federal Government: Cryptographic Mechanisms. https://www.nist.gov/publications/guideline-using-cryptographic-standards-federal-government-cryptographic-mechanisms
Tao, B., Wu, H.: Improving the biclique cryptanalysis of AES. In: Foo, E., Stebila, D. (eds.) ACISP 2015. LNCS, vol. 9144, pp. 39–56. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-19962-7_3
Khovratovich, D., Rechberger, C., Savelieva, A.: Bicliques for preimages: attacks on Skein-512 and the SHA-2 family. In: Canteaut, A. (ed.) FSE 2012. LNCS, vol. 7549, pp. 244–263. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34047-5_15
Acknowledgement
This work was supported in part by the Finnish Funding Agency for Innovation (TEKES) under the project “Industrial Internet Reference Architecture for Medical Platforms” (RAMP). The project is partly funded by industry partners Wallac Ltd/PerkinElmer Inc, Etteplan Oyj, Atostek Ltd, and Nextfour Group Ltd.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Paavola, J., Ekqvist, J. (2018). Privacy Preserving and Resilient Cloudified IoT Architecture to Support eHealth Systems. In: Fortino, G., et al. Interoperability, Safety and Security in IoT. InterIoT SaSeIoT 2017 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 242. Springer, Cham. https://doi.org/10.1007/978-3-319-93797-7_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-93797-7_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93796-0
Online ISBN: 978-3-319-93797-7
eBook Packages: Computer ScienceComputer Science (R0)