Skip to main content

Advertisement

Log in

Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications

  • Original Research
  • Published:
International Journal of Information Technology Aims and scope Submit manuscript

Abstract

The collection of pervasive data from e-healthcare system inherits potential medical significance through the mode of data exchange with the service providers of professional health care. The sensitive data exchange between the health care providers need to satisfy the requirements of user privacy, since the environment of fog computing is highly vulnerable due to the injection of false data from the hybrid IoT devices. However, sharing health data introduces a diversified number of security issues that include privacy leakage and access control with the further possibility of facing crucial challenges for attaining significant data investigation and services. In this paper, a contextual fully homomorphic encryption techniques-based privacy preserving framework (CFHET-PPF) for securing fog-assisted health data exchanging applications. This proposed CFHET-PPF framework integrates three significant fully homomorphic encryption approaches together in preventing false data injection. It is proposed for facilitating the fog nodes to categorize the shared data based on disease risks for indispensable health data analysis. It aids in achieving a maximum reduction in the number of encryptions by offloading a part of storage and computation burden at the side of the patients to the fog nodes. The security investigations of the proposed CFHET-PPF framework confirmed its superiority in fine grained access control, lightweight process and confidentiality with collusion resistance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Chen M, Qian Y, Chen J, Hwang K, Mao S, Hu L (2019) Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans Cloud Comput 2(3):1–11

    Google Scholar 

  2. Witti M, Konstantas D (2019) Secure and privacy-aware data collection architecture approach in fog node based distributed IoT environment. In: 6th international conference on computer science, engineering and information technology (CSEIT-2019)

  3. Akhundov H, Van der Sluis E, Hamdioui S, Taouil M (2019) Public-key based authentication architecture for IoT devices using PUF. In: 6th international conference on computer science, engineering and information technology (CSEIT-2019), 2(1):34–43

  4. Imine Y, Lounis A, Bouabdallah A (2019) An efficient accountable privacy-preserving scheme for public information sharing in fog computing. In: 2019 IEEE global communications conference (GLOBECOM), 2(1):34–43

  5. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Public Key Cryptogr PKC 2(1):53–70

    MathSciNet  MATH  Google Scholar 

  6. Nobles AL, Vilankar K, Wu H, Barnes LE (2015) Evaluation of data quality of multisite electronic health record data for secondary analysis. In: 2015 IEEE international conference on big data (big data). 1(1):23–41

  7. Xu C, Ren J, Zhang Y, Qin Z, Ren K (2017) DPPro: Differentially private high-dimensional data release via random projection. IEEE Trans Inf Forensics Secur 12(12):3081–3093

    Article  Google Scholar 

  8. Zhang K, Yang K, Liang X, Su Z, Shen X, Luo HH (2015) Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel Commun 22(4):104–112

    Article  Google Scholar 

  9. Balu A, Kuppusamy K (2014) An expressive and provably secure ciphertext-policy attribute-based encryption. Inf Sci 276(1):354–362

    Article  MathSciNet  Google Scholar 

  10. Tang W, Ren J, Zhang K, Zhang D, Zhang Y, Shen X (2019) Efficient and privacy-preserving fog-assisted health data sharing scheme. ACM Trans Intell Syst Technol 10(6):1–23

    Article  Google Scholar 

  11. Shen J, Zhou T, Chen X, Li J, Susilo W (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925

    Article  Google Scholar 

  12. Zhang S, Li X, Tan Z, Peng T, Wang G (2019) A caching and spatialk-anonymity driven privacy enhancement scheme in continuous location-based services. Futur Gener Comput Syst 94:40–50

    Article  Google Scholar 

  13. Huang C, Lu R, Zhu H, Shao J, Lin X (2016) FSSR: fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of the 11th ACM on Asia conference on computer and communications security, pp 95–106

  14. Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72(1):1–12

    Article  Google Scholar 

  15. Chen M, Qian Y, Chen J, Hwang K, Mao S, Hu L (2019) IEEE Trans Cloud Comput 2(2):1–16

    Google Scholar 

  16. FeyzaYildirim O, Ozdemir S, Xiao Y (2020) Fog computing-based privacy preserving data aggregation protocols. Trans Emerging Telecommun Technol 3(2):89–98

    Google Scholar 

  17. Hu P, Wang Y, Gong B, Wang Y, Li Y, Zhao R, Li H, Li B (2020) A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. Peer-to-Peer Netw Appl 2(1):45–58

    Google Scholar 

  18. Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X, Shu J (2018) Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8):2659

    Article  Google Scholar 

  19. Zhang Y, Zheng D, Zhao Q, Lai C, Ren F (2017) PADA: privacy-aware data aggregation with efficient communication for power injection in 5G smart grid Slice. In: 2017 international conference on networking and network applications (NaNA), 2(1):78–85

  20. Chen L, Lu R, Cao Z (2014) PDAFT: a privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Netw Appl 8(6):1122–1132

    Article  Google Scholar 

  21. Yang J, Li J, Niu Y (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur Gener Comput Syst 43–44:74–86

    Article  Google Scholar 

  22. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277

    Article  Google Scholar 

  23. Chu C-K, Chow SS, Tzeng W-G, Zhou J, Deng RH (2014) Key-aggregate Cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst 25(2):468–477

    Article  Google Scholar 

  24. Yang K, Liu Z, Jia X, Shen XS (2016) Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans Multimed 18(5):940–950

    Article  Google Scholar 

  25. Amuthan A, Sendhil R (2020) Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing. J Ambient Intell Humaniz Comput 2(1):45–58

    Google Scholar 

  26. El-Yahyaoui A, Kettani D-C, M. (2019) A verifiable fully homomorphic encryption scheme for cloud computing security. Technologies 7(1):21–34

    Article  Google Scholar 

  27. Chen Z, Wang J, Chen L, Song X (2014) A regev-type fully homomorphic encryption scheme using modulus switching. Sci World J 2014(1):1–12

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Sendhil.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sendhil, R., Amuthan, A. Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications. Int. j. inf. tecnol. 13, 1545–1553 (2021). https://doi.org/10.1007/s41870-021-00704-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41870-021-00704-z

Keywords

Navigation