Abstract
Modern healthcare services are serving patients needs by using new technologies such as wearable devices or cloud of things. The new technology provides more facilities and enhancements to the existing healthcare services as it allows more flexibility in terms of monitoring patients records and remotely connecting with the patients via cloud of things. However, there are many security issues such as privacy and security of healthcare data which need to be considered once we introduce wearable devices to the healthcare service. Although some of the security issues were addressed by some researchers in the literature, they mainly addressed cloud of things security or healthcare security separately and their work still suffers from limited security protection and vulnerabilities to some security attacks. The proposed new healthcare system combines security of both healthcare and cloud of things technologies. It also addresses most of the security challenges that might face the healthcare services such as the man in the middle (MITM), eavesdropping, replay, repudiation, and modification attacks. Scyther verification tool was also used to verify the robustness and correctness of the proposed system.
Similar content being viewed by others
References
Abbas, A., Khan, S.U.: A review on the state-of-the-art privacy-preserving approaches in the e-health clouds. IEEE J. Biomed. Health Inf. 18(4), 1431–1441 (2014). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6714376
Ahmed, M., Vu, Q.H., Asal, R., Al Muhairi, H., Yeun, C.Y.: Lightweight secure storage model with fault-tolerance in cloud environment. Electron. Commerce Res. 14(3), 271–291 (2014)
Al Alkeem, E., Yeun, C.Y., Zemerly, M.J.: Security and privacy framework for ubiquitous healthcare IoT devices. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp. 70–75. IEEE (2015). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7412059
Al Ameen, M., Liu, J., Kwak, K.: Security and privacy issues in wireless sensor networks for healthcare applications. J. Med. Syst. 36(1), 93–101 (2012). doi:10.1007/s10916-010-9449-4
Al-Qutayri, M., Yeun, C.Y., Belghuzooz, K.: Framework for secure wireless health monitoring and remote access system. Int. J. Internet Technol. Secur. Trans. 2(3-4), 380–398 (2010). doi:10.1504/IJITST.2010.03741
Alkeem, E.A., Yeun, C.Y., Baek, J.: Secure nfc authentication protocol based on lte network. In: Ubiquitous Information Technologies and Applications, pp. 363–371. Springer (2014)
Almulla, S.A., Yeun, C.Y.: New secure storage architecture for cloud computing. In: Park, J.J., Yang, L.T., Lee, C. (eds.) Future Information Technology. Communications in Computer and Information Science, vol. 184. Springer, Berlin, Heidelberg (2011)
Appari, A., Johnson, M.E.: Information security and privacy in healthcare: current state of research. Int. J. Internet Enterp. Manage. 6(4), 279–314 (2010). doi:10.1504/IJIEM.2010.035624
Azfar, A., Choo, K.K.R., Liu, L.: Forensic taxonomy of popular android mhealth apps. arXiv:1505.02905 (2015). Preprint
Azfar, A., Choo, K.K.R., Liu, L.: An android social app forensics adversary model. In: System Sciences (HICSS), 2016 49th Hawaii International Conference on, pp. 5597–5606. IEEE (2016)
Bahga, A., Madisetti, V.K.: A cloud-based approach for interoperable electronic health records (EHRs). Biomed Heal Informatics, IEEE J. 17(5), 894–906 (2013)
Bar-On, R., Tranel, D., Denburg, N.L., Bechara, A.: Exploring the neurological substrate of emotional and social intelligence. Brain 126(8), 1790–1800 (2003). http://brain.oxfordjournals.org/content/126/8/1790.short
Bui, N., Zorzi, M.: Health care applications: a solution based on the internet of things, Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, pp. 1–5. Barcelona, Spain (2011)
Butt, S., Phillips, J.G.: Personality and self reported mobile phone use. Comput. Hum. Behav. 24(2), 346–360 (2008). http://www.sciencedirect.com/science/article/pii/S0747563207000295
Castillejo, P., Martinez, J.F., Lopez, L., Rubio, G.: An internet of things approach for managing smart services provided by wearable devices. Int. J. Distrib. Sens. Netw. 2013 (2013). http://www.hindawi.com/journals/ijdsn/2013/190813/abs/
Chiuchisan, I., Costin, H.N., Geman, O.: Adopting the internet of things technologies in health care systems. In: Electrical and Power Engineering (EPE), 2014 International Conference and Exposition on, pp. 532–535. IEEE (2014). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6969965
Choi, Y.B., Capitan, K.E., Krause, J.S., Streeper, M.M.: Challenges associated with privacy in health care industry: implementation of HIPAA and the security rules. J. Med. Syst. 30(1), 57–64 (2006). doi:10.1007/s10916-006-7405-0
Choo, K.K.R.: New payment methods: a review of 2010–2012 fatf mutual evaluation reports. Comput. Secur. 36, 12–26 (2013)
Choo, K.K.R.: Cryptocurrency and virtual currency: corruption and money laundering/terrorism financing risks? Handbook of Digital Currency: Bitcoin, Innovation, Financial Instruments, and Big Data, p. 283 (2015)
Choo, K.K.R., Nam, J., Won, D.: A mechanical approach to derive identity-based protocols from Diffie–Hellman-based protocols. Inf. Sci. 281, 182–200 (2014)
Chown, P.: Advanced encryption standard (AES) ciphersuites for transport layer security (TLS). Tech. Rep. (2002). https://www.rfc-editor.org/info/rfc3268
Dierks, M.M., Christian, C.K., Roth, E.M., Sheridan, T.B.: Healthcare safety: the impact of Disabling“ safety” protocols. IEEE Trans. Syst. Man Cybern. Part A: Syst. Hum. 34(6), 693–698 (2004). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1344117
Do, Q., Martini, B., Choo, K.K.R.: Exfiltrating data from android devices. Comput. Secur. 48, 74–91 (2015)
Do, Q., Martini, B., Choo, K.K.R.: A forensically sound adversary model for mobile devices. PloS ONE 10(9), e0138–e0449 (2015)
Do, Q., Martini, B., Choo, K.K.R.: Is the data on your wearable device secure? An android wear smartwatch case study. Softw. Pract. Exp. 47(3), 391–403 (2017)
D’Orazio, C., Choo, K.K.R.: A generic process to identify vulnerabilities and design weaknesses in ios healthcare apps. In: System Sciences (HICSS), 2015 48th Hawaii International Conference on, pp. 5175–5184. IEEE (2015)
D’Orazio, C., Choo, K.K.R.: An adversary model to evaluate drm protection of video contents on ios devices. Comput. Secur. 56, 94–110 (2016)
D’Orazio, C.J., Choo, K.K.R.: A technique to circumvent SSL/TLS validations on IOS devices. Future Generation Computer Systems (2016). doi:10.1016/j.future.2016.08.019
D’Orazio, C.J., Lu, R., Choo, K.K.R., Vasilakos, A.V.: A markov adversary model to detect vulnerable ios devices and vulnerabilities in ios apps. Appl. Math. Comput. 293, 523–544 (2017)
Doukas, C., Maglogiannis, I.: Bringing IoT and cloud computing towards pervasive healthcare. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on, pp. 922–926. IEEE (2012). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6296978
Duquette, A., Michaud, F., Mercier, H.: Exploring the use of a mobile robot as an imitation agent with children with low-functioning autism. Auton. Robots 24(2), 147–157 (2008). doi:10.1007/s10514-007-9056-5
Elmisery, A.M., Fu, H.: Privacy preserving distributed learning clustering of healthcare data using cryptography protocols. In: Computer Software and Applications Conference Workshops (COMPSACW), 2010 IEEE 34th Annual, pp. 140–145. IEEE (2010). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5615770
Ge, M., Choo, K.K.R.: A novel hybrid key revocation scheme for wireless sensor networks. In: International Conference on Network and System Security, pp. 462–475. Springer, Berlin (2014)
Ge, M., Choo, K.K.R., Wu, H., Yu, Y.: Survey on key revocation mechanisms in wireless sensor networks. J. Netw. Comput. Appl. 63, 24–38 (2016)
Gope, P., Hwang, T.: BSN-care: a secure IoT-based modern healthcare system using body sensor network. IEEE Sens. J. 16(5), 1368–1376 (2016). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7332745
Gostin, L.O., Turek-Brezina, J., Powers, M., Kozloff, R.: Privacy and security of health information in the emerging health care system. Health Matrix 5, 1 (1995). http://heinonline.org/hol-cgi-bin/get_pdf.cgi?handle=hein.journals/hmax5§ion=8
Guan, S., Zhang, Y., Ji, Y.: Privacy-preserving health data collection for preschool children. Comput. Math. Methods Med. 2013 (2013). doi:10.1155/2013/501607. http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3830827/
Gul, O., Al-Qutayri, M., Yeun, C.Y., Vu, Q.H.: Framework of a national level electronic health record system. In: Cloud Computing Technologies, Applications and Management (ICCCTAM), 2012 International Conference on, pp. 60–65. IEEE (2012). http://ieeexplore.ieee.org/xpls/ab_all.jsp?arnumber=6488072
Guo, C., Zhuang, R., Jie, Y., Ren, Y., Wu, T., Choo, K.K.R.: Fine-grained database field search using attribute-based encryption for e-healthcare clouds. J. Med. Syst. 40(11), 235 (2016)
Han, K., Mun, H., Shon, T., Yeun, C.Y., Park, J.J.J.H.: Secure and efficient public key management in next generation mobile networks. Pers. Ubiquitous Comput. 16(6), 677–685 (2012)
Harding, K., Cutting, K., Price, P.: The cost-effectiveness of wound management protocols of care. Br. J. Nurs. 9(Sup3), S6–S24 (2000). doi:10.12968/bjon.2000.9.Sup3.12483
He, D., Kumar, N., Wang, H., Wang, L., Choo, K.K.R., Vinel, A.: A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network. IEEE Trans. Depend. Secure Comput. (2016). doi:10.1109/TDSC.2016.2596286
He, D., Zeadally, S.: An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography. IEEE Internet Things J. 2(1), 72–83 (2015). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6907930
Hiremath, S., Yang, G., Mankodiya, K.: Wearable Internet of Things: concept, architectural components and promises for person-centered healthcare. In: Wireless Mobile Communication and Healthcare (Mobihealth), 2014 EAI 4th International Conference on, pp. 304–307. IEEE (2014). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7015971
Hu, J., Chen, H.H., Hou, T.W.: A hybrid public key infrastructure solution (hpki) for HIPAA privacy/security regulations. Computer Standards & Interfaces 32(56), 274 – 280 (2010). 10.1016/j.csi.2009.04.005. http://www.sciencedirect.com/science/article/pii/S0920548909000324
Hu, J., Chen, H.H., Hou, T.W.: A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations. Comput. Stand. Interf. 32(5), 274–280 (2010)
Huang, J.H., Lin, Y.R., Chuang, S.T.: Elucidating user behavior of mobile learning: A perspective of the extended technology acceptance model. Electron. Libr. 25(5), 585–598 (2007). doi:10.1108/02640470710829569
Huang, L.C., Chu, H.C., Lien, C.Y., Hsiao, C.H., Kao, T.: Privacy preservation and information security protection for patients portable electronic health records. Comput. Biol. Med. 39(9), 743–750 (2009). http://www.sciencedirect.com/science/article/pii/S0010482509001085
Liu, X., Choo, R., Deng, R., Lu, R., Weng, J.: Efficient and privacy-preserving outsourced calculation of rational numbers. IEEE Trans. Depend. Secure Comput. (2016). doi:10.1109/TDSC.2016.2536601
Lo, N.W., Yeh, K.H., Yeun, C.Y.: New mutual agreement protocol to secure mobile RFID-enabled devices. Inf. Secur. Tech. Rep. 13(3), 151–157 (2008). http://www.sciencedirect.com/science/article/pii/S1363412708000423
Nepal, S., Ranjan, R., Choo, K.K.R.: Trustworthy processing of healthcare big data in hybrid clouds. IEEE Cloud Comput. 2(2), 78–84 (2015)
Rachuri, K.K., Efstratiou, C., Leontiadis, I., Mascolo, C., Rentfrow, P.J.: METIS: Exploring mobile phone sensing offloading for efficiently supporting social sensing applications. In: Pervasive Computing and Communications (PerCom), 2013 IEEE International Conference on, pp. 85–93. IEEE (2013). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6526718
Seo, W.J., Islam, R., Khan, M.K., Choo, K.K.R., et al.: A secure cross-domain sip solution for mobile ad hoc network using dynamic clustering. In: International Conference on Security and Privacy in Communication Systems, pp. 649–664. Springer, Heidelberg (2015)
Sepehri, M., Cimato, S., Damiani, E., Yeun, C.Y.: Data sharing on the cloud: A scalable proxy-based protocol for privacy-preserving queries. In: Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, pp. 1357–1362. IEEE (2015)
Shemaili, M., Yeun, C., Zemerly, M., Mubarak, K.: Enhancing the security of the shrinking generator based lightweight mutual authentication rfid protocol. Int. J. Adv. Logis. 1(1), 33–50 (2012)
Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J.: Lightweight mutual authentication protocol for securing RFID applications. Int. J. Internet Technol. Secur. Trans. 2(3–4), 205–221 (2010)
Shemaili, M.A.B., Yeun, C.Y., Zemerly, M.J., Mubarak, K.: A novel hybrid cellular automata based cipher system for internet of things. In: Future Information Technology, pp. 269–276. Springer, Heidelberg (2014). doi:10.1007/978-3-642-40861-8_40
Smith, E., Eloff, J.H.P.: Security in health-care information systemscurrent trends. Int. J. Med. Inf. 54(1), 39–54 (1999). http://www.sciencedirect.com/science/article/pii/S1386505698001683
Srivastava, L.: Mobile phones and the evolution of social behaviour. Behav. Inf. Technol. 24(2), 111–129 (2005). doi:10.1080/01449290512331321910
Swan, M.: Sensor mania! the internet of things, wearable computing, objective metrics, and the quantified self 2.0. J. Sens. Actuator Netw. 1(3), 217–253 (2012). http://www.mdpi.com/2224-2708/1/3/217
Toninelli, A., Montanari, R., Corradi, A.: Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wireless Commun. 16(3), 24–32 (2009). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5109461
Wang, S., Cao, Z., Choo, K.K.R., Wang, L.: An improved identity-based key agreement protocol and its security proof. Inf. Sci. 179(3), 307–318 (2009)
Yeun, C.Y., Han, K., Vo, D.L., Kim, K.: Secure authenticated group key agreement protocol in the manet environment. Inf. Secur. Tech. Rep. 13(3), 158–164 (2008)
Yksel, B., Kp, A., Zkasap, Z.: Research issues for privacy and security of electronic health services. Future Gen. Comput. Syst. 68, 1–13 (2017). http://www.sciencedirect.com/science/article/pii/S0167739X16302667
Zhang, K., Yang, K., Liang, X., Su, Z., Shen, X., Luo, H.H.: Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wireless Commun. 22(4), 104–112 (2015). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=7224734
Zhang, M., Raghunathan, A., Jha, N.K.: MedMon: Securing medical devices through wireless monitoring and anomaly detection. IEEE Trans. Biomed. Circuits Syst. 7(6), 871–881 (2013). http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6507636
Author information
Authors and Affiliations
Corresponding author
Appendix A
Appendix A
usertype TimeStamp,Data,Request,Key,nonce,challenge,identity;
secret kDS,kSA,kDi;
protocol MEM(DPC ,DAS,SP)
{
role DPC
{
var Ri:challenge ;
fresh RD:challenge ;
fresh i:identity ;
var kDS:Key;
var D:identity ;
var KDi:Key;
var kSA:Key;
var kDS:Key;
fresh kDA:Key;
var kDS:Key;
recv_1(SP,DPC , {Ri,SP,DPC}kDS );
send_2(DPC ,DAS,{Ri,RD ,i,DAS,DPC}kDA );
recv_3(DAS ,DPC,{RD,kDS,i,DPC,DAS}kDA ,{Ri,KDi,D,DAS,DPC}kSA);
send_4(DPC, SP,{RD,Ri,i,SP,DPC,DAS}kDS ,{Ri,kDS,D,DAS,DAS}kSA);
recv_5 (SP,DPC, {RD,Ri,i,SP,DPC}kDS );
claim_DPC1(DPC,Nisynch);
claim_DPC2(DPC,Niagree);
claim_DPC3(DPC,Secret,Ri);
claim_DPC4(DPC,Secret,RD);
claim_DPC5(DPC,Secret,i);
claim_DPC6(DPC,Secret,SP);
claim_DPC7(DPC,Secret,DPC);
claim_DPC8(DPC,Secret,kDS);
claim_DPC9(DPC,Secret,kSA);
claim_DPC10(DPC,Secret,D);
}
role DAS
{
var Ri:challenge ;
var RD:challenge ;
var i:identity ;
fresh D:identity ;
fresh KDi:Key;
var kDA:Key;
fresh kSA:Key;
fresh kDS:Key;
recv_2(DPC ,DAS,{Ri,RD ,i,DAS,DPC}kDA);
send_3(DAS ,DPC,{RD,kDS,i,DPC,DAS}kDA ,{Ri,KDi,D,DAS,DPC}kSA);
claim_DAS2(DAS,Niagree);
claim_DAS3(DAS,Secret,Ri);
claim_DAS4(DAS,Secret,RD);
claim_DAS5(DAS,Secret,i);
claim_DAS6(DAS,Secret,SP);
claim_DAS7(DAS,Secret,DPC);
claim_DAS8(DAS,Secret,kDS);
claim_DAS9(DAS,Secret,kSA);
claim_DAS10(DAS,Secret,D);
claim_DAS11(DAS,Secret,D);
}
role SP
{
fresh Ri:challenge ;
fresh RD:challenge ;
var D:identity ;
var i:identity ;
fresh kDS:Key;
var kSA:Key;
send_1(SP,DPC , {Ri,SP,DPC}kDS );
recv_4(DPC, SP,{RD,Ri,i,SP,DPC,DAS}kDS ,{Ri,kDS,D,DAS,DAS}kSA);
send_5 (SP,DPC, {RD,Ri,i,SP,DPC}kDS );
claim_SP1(SP,Nisynch);
claim_SP2(SP,Niagree);
claim_SP3(SP,Secret,Ri);
claim_SP4(SP,Secret,RD);
claim_SP5(SP,Secret,i);
claim_SP6(SP,Secret,SP);
claim_SP7(SP,Secret,DPC);
claim_SP8(SP,Secret,kDS);
claim_SP9(SP,Secret,kSA);
claim_SP10(SP,Secret,D);
}
}
Rights and permissions
About this article
Cite this article
Alkeem, E.A., Shehada, D., Yeun, C.Y. et al. New secure healthcare system using cloud of things. Cluster Comput 20, 2211–2229 (2017). https://doi.org/10.1007/s10586-017-0872-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-0872-x