Skip to main content

Advertisement

Log in

Security algorithms for distributed storage system for E-health application over wireless body area network

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Wireless body area networks (WBANs) are an upcoming technology for achieving effective healthcare. The security and privacy of patient-related data are two essential aspects of WBAN system security. Storing data on a single server is simple but may lead to a single point of failure (whether a typical failure or a failure due to security attacks). In this paper, enhanced security and privacy of patient information and E-health systems based on distributed storage systems (DSSs) are developed using public-key cryptography to store patient information. The storage of data and the security requirements (such as confidentiality, reliability, authentication, and dynamic integrity) are simultaneously distributed among individual nodes throughout the network. The patient data are encrypted using the redundant residue number system (RRNS) technique, which depends on a library of moduli in the encrypting process to generate residues. Three algorithms were implemented to decode the RRNS: the Chinese Remainder Theorem (CRT), Base Extension (BEX) with mixed radix conversion, and the new Chinese Remainder Theorem I (CRT I). The results of a system prototype implementation showed that whenever the value of the moduli was a big prime number, the coding efficiency became large, and the time to send a message decreased by 2 s. The performance of the algorithms was expressed in terms of execution time and cyclomatic complexity (CC). The results showed that the CRT I was 1 s faster than the other decoding algorithms and took around 2.5 s to decode the RRNS. The CRT had a low CC of 15, whereas the MRC and CRT I had a CC of 45 and 40, respectively. The main operation phases of the proposed system are described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  • Ahmed HA, Zolkipli MF, Ahmad M (2019) A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map. Neural Comput Appl. https://doi.org/10.1007/s00521-018-3557-3

    Article  Google Scholar 

  • Al-Janabi S, Dawood AJ, Salman AD (2015) Enhancing the security and privacy of WBAN-based distributed storage systems. J UHD J 1:288–294

    Google Scholar 

  • Amusa K, Nwoye E (2012) Novel algorithm for decoding redundant residue number systems (RRNS) codes. Integers 1:7

    Google Scholar 

  • Arora N, Gupta SH, Kumar B (2020) An approach to investigate the best location for the central node placement for energy efficient WBAN. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01847-w

  • Bajaj S, Sion R (2014) Trusteddb: a trusted hardware-based database with privacy and data confidentiality. IEEE Trans Knowl Data Eng 26:752–765

    Article  Google Scholar 

  • Bouazizi A, Zaibi G, Samet M, Kachouri A (2017) Wireless body area network for e-health applications: overview. In: Smart, monitored and controlled cities (SM2C), 2017 international conference on IEEE, pp 64–68

  • Dailey M (2013) Cryptology. Inf Secur Fundam Second Ed. https://doi.org/10.1201/b15573

    Article  Google Scholar 

  • Darwish A, Hassanien AE, Elhoseny M et al (2019) The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems. J Ambient Intell Humaniz Comput 10:4151–4166. https://doi.org/10.1007/s12652-017-0659-1

    Article  Google Scholar 

  • Deepa N, Pandiaraja P (2020) E-health care data privacy preserving efficient file retrieval from the cloud service provider using attribute based file encryption. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01911-5

  • Dikaliotis TK, Dimakis AG, Ho T (2010) Security in distributed storage systems by communicating a logarithmic number of bits. In: Information theory proceedings (ISIT), 2010 IEEE international symposium on IEEE, pp 1948–1952

  • El Dayem SSA, Rizk MRM, Mokhtar MA (2016) Security for wireless sensor network. In: Information communication and management (ICICM), international conference on IEEE, pp 173–177

  • Elhoseny M, Ramírez-González G, Abu-Elnasr OM et al (2018) Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6:20596–20608. https://doi.org/10.1109/ACCESS.2018.2817615

    Article  Google Scholar 

  • Fang B, Guo X, Wang Z et al (2019) Collaborative task assignment of interconnected, affective robots towards autonomous healthcare assistant. Future Gener Comput Syst 92:241–251. https://doi.org/10.1016/j.future.2018.09.069

    Article  Google Scholar 

  • Farahat IS, Tolba AS, Elhoseny M, Eladrosy W (2018) A secure real-time internet of medical smart things (IOMST). Comput Electr Eng 72:455–467. https://doi.org/10.1016/j.compeleceng.2018.10.009

    Article  Google Scholar 

  • Hai T, Bhuiyan MZA, Wang J et al (2020) DependData: data collection dependability through three-layer decision-making in BSNs for healthcare monitoring. Inf Fusion. https://doi.org/10.1016/j.inffus.2020.03.004

    Article  Google Scholar 

  • He M, Guan Z, Wu Z et al (2019) A polling access control with exhaustive service in wireless body area networks for mobile healthcare using the sleeping schema. J Ambient Intell Humaniz Comput 10:3761–3774

    Article  Google Scholar 

  • Jakubski A (2016) Selected application of the Chinese Remainder Theorem in multiparty computation. J Appl Math Comput Mech 15:39–47. https://doi.org/10.17512/jamcm.2016.1.04

    Article  MathSciNet  Google Scholar 

  • Jayaraman I, Stanislaus Panneerselvam A (2020) A novel privacy preserving digital forensic readiness provable data possession technique for health care data in cloud. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01931-1

  • Jiang H, Wang Y, Gong L, Zhu Z (2015) Availability-aware survivable virtual network embedding in optical datacenter networks. J Opt Commun Netw 7:1160–1171

    Article  Google Scholar 

  • Karuppiah SV, Gurunathan G (2020) Secured storage and disease prediction of E-health data in cloud. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02205-6

  • Li J, Tao H, Shuhong L et al (2020) Internet of things assisted condition-based support for smart manufacturing industry using learning technique. Comput Intell. https://doi.org/10.1111/coin.12319

  • Liu J, Kwak KS (2010) Hybrid security mechanisms for wireless body area networks. In: Ubiquitous and future networks (ICUFN), 2010 second international conference on IEEE, pp 98–103

  • Malasinghe LP, Ramzan N, Dahal K (2019) Remote patient monitoring: a comprehensive study. J Ambient Intell Humaniz Comput 10(1):57–76

    Article  Google Scholar 

  • Pawar S, El Rouayheb S, Ramchandran K (2011) Securing dynamic distributed storage systems against eavesdropping and adversarial attacks. IEEE Trans Inf Theory 57:6734–6753

    Article  MathSciNet  Google Scholar 

  • Sciences M (2017) New Chinese remainder theorem and moduli sets. Department Mathematics, St Joseph Engineering College, Vamanjoor, Mangalore, Karnataka, India

  • Sengupta A, Natarajan B (2014) Redundant residue number system based space-time block codes. Phys Commun 12:1–15

    Article  Google Scholar 

  • Tao H, Bhuiyan MZA, Rahman MA et al (2020) TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system. IEEE Trans Ind Inform. https://doi.org/10.1109/TII.2019.2950192

    Article  Google Scholar 

  • Tay TF, Chang C-H (2014) A new algorithm for single residue digit error correction in Redundant Residue Number System. In: 2014 IEEE international symposium on circuits and systems (ISCAS). IEEE, pp 1748–1751

  • Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multimed Tools Appl 78:3457–3470. https://doi.org/10.1007/s11042-018-6263-3

    Article  Google Scholar 

  • Ullah S, Higgins H, Braem B et al (2012) A comprehensive survey of wireless body area networks. J Med Syst 36:1065–1094

    Article  Google Scholar 

  • Ullah F, Ullah Z, Ahmad S et al (2019) Traffic priority based delay-aware and energy efficient path allocation routing protocol for wireless body area network. J Ambient Intell Humaniz Comput 10:3775–3794

    Article  Google Scholar 

  • Wang H, Fang H, Xing L, Chen M (2011) An integrated biometric-based security framework using wavelet-domain hmm in wireless body area networks (wban). In: Communications (ICC), 2011 IEEE international conference on IEEE, pp 1–5

  • Zhang R, Liu L (2010) Security models and requirements for healthcare application clouds. In: Cloud computing (CLOUD), 2010 IEEE 3rd international conference on IEEE, pp 268–275

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Majeed Alkhabet.

Ethics declarations

Conflict of interest

Authors declare no conflict of interest to any party.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Alkhabet, M.M., Ismail, M. Security algorithms for distributed storage system for E-health application over wireless body area network. J Ambient Intell Human Comput 14, 15781–15792 (2023). https://doi.org/10.1007/s12652-020-02733-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-020-02733-1

Keywords

Navigation