Abstract
Wireless body area networks (WBANs) are an upcoming technology for achieving effective healthcare. The security and privacy of patient-related data are two essential aspects of WBAN system security. Storing data on a single server is simple but may lead to a single point of failure (whether a typical failure or a failure due to security attacks). In this paper, enhanced security and privacy of patient information and E-health systems based on distributed storage systems (DSSs) are developed using public-key cryptography to store patient information. The storage of data and the security requirements (such as confidentiality, reliability, authentication, and dynamic integrity) are simultaneously distributed among individual nodes throughout the network. The patient data are encrypted using the redundant residue number system (RRNS) technique, which depends on a library of moduli in the encrypting process to generate residues. Three algorithms were implemented to decode the RRNS: the Chinese Remainder Theorem (CRT), Base Extension (BEX) with mixed radix conversion, and the new Chinese Remainder Theorem I (CRT I). The results of a system prototype implementation showed that whenever the value of the moduli was a big prime number, the coding efficiency became large, and the time to send a message decreased by 2 s. The performance of the algorithms was expressed in terms of execution time and cyclomatic complexity (CC). The results showed that the CRT I was 1 s faster than the other decoding algorithms and took around 2.5 s to decode the RRNS. The CRT had a low CC of 15, whereas the MRC and CRT I had a CC of 45 and 40, respectively. The main operation phases of the proposed system are described.
Similar content being viewed by others
References
Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3557-3
Al-Janabi S, Dawood AJ, Salman AD (2015) Enhancing the security and privacy of WBAN-based distributed storage systems. J UHD J 1:288–294
Amusa K, Nwoye E (2012) Novel algorithm for decoding redundant residue number systems (RRNS) codes. Integers 1:7
Arora N, Gupta SH, Kumar B (2020) An approach to investigate the best location for the central node placement for energy efficient WBAN. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01847-w
Bajaj S, Sion R (2014) Trusteddb: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans Knowl Data Eng 26:752–765
Bouazizi A, Zaibi G, Samet M, Kachouri A (2017) Wireless body area network for e-health applications: overview. In: Smart, monitored and controlled cities (SM2C), 2017 international conference on IEEE, pp 64–68
Dailey M (2013) Cryptology. Inf Secur Fundam Second Ed. https://doi.org/10.1201/b15573
Darwish A, Hassanien AE, Elhoseny M et al (2019) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput 10:4151–4166. https://doi.org/10.1007/s12652-017-0659-1
Deepa N, Pandiaraja P (2020) E-health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01911-5
Dikaliotis TK, Dimakis AG, Ho T (2010) Security in distributed storage systems by communicating a logarithmic number of bits. In: Information theory proceedings (ISIT), 2010 IEEE international symposium on IEEE, pp 1948–1952
El Dayem SSA, Rizk MRM, Mokhtar MA (2016) Security for wireless sensor network. In: Information communication and management (ICICM), international conference on IEEE, pp 173–177
Elhoseny M, Ramírez-González G, Abu-Elnasr OM et al (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615
Fang B, Guo X, Wang Z et al (2019) Collaborative task assignment of interconnected, affective robots towards autonomous healthcare assistant. Future Gener Comput Syst 92:241–251. https://doi.org/10.1016/j.future.2018.09.069
Farahat IS, Tolba AS, Elhoseny M, Eladrosy W (2018) A secure real-time internet of medical smart things (IOMST). Comput Electr Eng 72:455–467. https://doi.org/10.1016/j.compeleceng.2018.10.009
Hai T, Bhuiyan MZA, Wang J et al (2020) DependData: data collection dependability through three-layer decision-making in BSNs for healthcare monitoring. Inf Fusion. https://doi.org/10.1016/j.inffus.2020.03.004
He M, Guan Z, Wu Z et al (2019) A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema. J Ambient Intell Humaniz Comput 10:3761–3774
Jakubski A (2016) Selected application of the Chinese Remainder Theorem in multiparty computation. J Appl Math Comput Mech 15:39–47. https://doi.org/10.17512/jamcm.2016.1.04
Jayaraman I, Stanislaus Panneerselvam A (2020) A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01931-1
Jiang H, Wang Y, Gong L, Zhu Z (2015) Availability-aware survivable virtual network embedding in optical datacenter networks. J Opt Commun Netw 7:1160–1171
Karuppiah SV, Gurunathan G (2020) Secured storage and disease prediction of E-health data in cloud. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02205-6
Li J, Tao H, Shuhong L et al (2020) Internet of things assisted condition-based support for smart manufacturing industry using learning technique. Comput Intell. https://doi.org/10.1111/coin.12319
Liu J, Kwak KS (2010) Hybrid security mechanisms for wireless body area networks. In: Ubiquitous and future networks (ICUFN), 2010 second international conference on IEEE, pp 98–103
Malasinghe LP, Ramzan N, Dahal K (2019) Remote patient monitoring: a comprehensive study. J Ambient Intell Humaniz Comput 10(1):57–76
Pawar S, El Rouayheb S, Ramchandran K (2011) Securing dynamic distributed storage systems against eavesdropping and adversarial attacks. IEEE Trans Inf Theory 57:6734–6753
Sciences M (2017) New Chinese remainder theorem and moduli sets. Department Mathematics, St Joseph Engineering College, Vamanjoor, Mangalore, Karnataka, India
Sengupta A, Natarajan B (2014) Redundant residue number system based space-time block codes. Phys Commun 12:1–15
Tao H, Bhuiyan MZA, Rahman MA et al (2020) TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2019.2950192
Tay TF, Chang C-H (2014) A new algorithm for single residue digit error correction in Redundant Residue Number System. In: 2014 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1748–1751
Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78:3457–3470. https://doi.org/10.1007/s11042-018-6263-3
Ullah S, Higgins H, Braem B et al (2012) A comprehensive survey of wireless body area networks. J Med Syst 36:1065–1094
Ullah F, Ullah Z, Ahmad S et al (2019) Traffic priority based delay-aware and energy efficient path allocation routing protocol for wireless body area network. J Ambient Intell Humaniz Comput 10:3775–3794
Wang H, Fang H, Xing L, Chen M (2011) An integrated biometric-based security framework using wavelet-domain hmm in wireless body area networks (wban). In: Communications (ICC), 2011 IEEE international conference on IEEE, pp 1–5
Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: Cloud computing (CLOUD), 2010 IEEE 3rd international conference on IEEE, pp 268–275
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors declare no conflict of interest to any party.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Alkhabet, M.M., Ismail, M. Security algorithms for distributed storage system for E-health application over wireless body area network. J Ambient Intell Human Comput 14, 15781–15792 (2023). https://doi.org/10.1007/s12652-020-02733-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-020-02733-1