Skip to main content

On the Implementation and Performance Evaluation of Security Algorithms for Healthcare

  • Conference paper
  • First Online:
Proceedings of the 2nd International Conference on Communication, Devices and Computing (ICCDC 2019)

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 602))

Included in the following conference series:

Abstract

With rapid and successful advancement in communication technology and semiconductor devices Internet of Things based smart healthcare is not a concept, but reality. Patients’ vital information sensed by sensing devices is transmitted through heterogeneous communication links to fog/cloud layer for processing, storage, and decision-making or knowledge extraction. Sensitive health data is vulnerable to various security attacks and threats of different levels and impact while getting sensed, are saved or getting transmitted. Off-the-shelf security techniques such as encryption, trust can be applied for privacy and security of data but application-specific demands such as latency/end to end delay in data transmission, additional overhead in terms of computation time, etc., must be taken care of, especially in time-critical healthcare application. This work implements encryption-decryption algorithms and hashing techniques on ECG signals of varying size for secure transmission through communication layer to cloud layer for performance evaluation based on computation time (as in healthcare maximum permissible end to end delay is 250 ms) to ensure Confidentiality, Integrity, and Authentication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zanella, A., Bui, N., Castellani, A., Vangelista, L., Zorzi, M.: Internet of things for smart cities. IEEE Internet Things J. 1(1), 22–32 (2014)

    Article  Google Scholar 

  2. Zhang, K., Ni, J., Yang, K., Liang, X., Ren, J., Shen, X.S.: Security and privacy in smart city applications: challenges and solutions. IEEE Commun. Mag. 55(1), 122–129 (2017)

    Article  Google Scholar 

  3. Singh, M.M., Singh, A., Mandal, J.K.: Preventing node replication attack in static wireless sensor netwroks. In: Proceedings of 3rd International Conference on Reliability, Infocom Technologies and Optimization, Noida, pp. 1–5 (2014)

    Google Scholar 

  4. Saif, S., Gupta, R., Biswas, S.: Implementation of cloud-assisted secure data transmission in WBAN for healthcare monitoring. In: Bhattacharyya, S., Chaki, N., Konar, D., Chakraborty, U., Singh, C. (eds.) Advanced Computational and Communication Paradigms. Advances in Intelligent Systems and Computing, vol. 706. Springer, Singapore (2018)

    Google Scholar 

  5. Patil, P., Narayankar, P., Narayan, D., Meena, S.: A comprehensive evaluation of cryptographic algorithms: DES, 3DES, AES, RSA and Blowfish. Procedia Comput. Sci. 78, 617–624 (2016)

    Article  Google Scholar 

  6. He, D., Ye, R., Chan, S., Guizani, M., Xu, Y.: Privacy in the internet of things for smart healthcare. IEEE Commun. Mag. (2018)

    Google Scholar 

  7. Ben Ida, I., Jemai, A., Loukil, A.: A survey on security of IoT in the context of eHealth and clouds. In: IEEE 2016 11th International Design and Test Symposium (IDT) (2016)

    Google Scholar 

  8. Baker, S.B., Xiang, W., Atkins, I.: Internet of things for smart healthcare: technologies, challenges, and opportunities. IEEE Access 5, 26521–26544 (2017). Electronic ISSN: 2169-3536

    Google Scholar 

  9. Elhoseny, M., Ramírez-González, G., Abu-Elnasr, O.M., Shawkat, S.A., Arunkumar, N., Farouk, A.: Secure medical data transmission model for IoT-based healthcare systems. IEEE Access 6, 20596–20608 (2018)

    Google Scholar 

  10. Yin, L., Zhang, A., Ye, X., Wang, L.: Security-aware attribute-based access control for fog-based eldercare system. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, pp. 2680–2684 (2017)

    Google Scholar 

  11. Al Hamid, H.A., Rahman, S.M.M., Hossain, M.S., Almogren, A., Alamri, A.: A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography. IEEE Access 5, 22313–22328 (2017)

    Google Scholar 

  12. Alrawais, A., Alhothaily, A., Hu, C., Xing, X., Cheng, X.: An attribute-based encryption scheme to secure fog communications. IEEE Access 5, 9131–9138 (2017)

    Article  Google Scholar 

  13. Diro, A.A., Chilamkurti, N., Nam, Y.: Analysis of lightweight encryption scheme for fog-to-things communication. IEEE Access 6, 26820–26830 (2018)

    Article  Google Scholar 

  14. Zheng, Q., Wang, X., Khurram Khan, M., Zhang, W., Gupta, B.B., Guo, W.: A lightweight authenticated encryption scheme based on chaotic SCML for railway cloud service. IEEE Access 6, 711–722 (2018)

    Google Scholar 

  15. Abdallah, E.G., Zulkernine, M., Gu, Y.X., Liem, C.: TRUST-CAP: a trust model for cloud-based applications. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), Turin, pp. 584–589 (2017)

    Google Scholar 

  16. Chen, R., Mu, Y., Yang, G., Gao, F., Huang, X., Wang, X., Wang, Y.: Server-aided public key encryption with keyword search. IEEE Trans. Inf. Forensics Secur. 11(12), 2833–2842 (2016)

    Article  Google Scholar 

  17. Kao, Y.W., Huang, K.Y., Gu, H.Z., Yuan, S.M.: uCloud: a user-centric key management scheme for cloud data protection. IET Inf. Secur. 7(2), 144–154 (2013)

    Article  Google Scholar 

  18. Shen, J., Liu, D., He, D., Huang, X., Xiang, Y.: Algebraic signatures-based data integrity auditing for efficient data dynamics in cloud computing. IEEE Trans. Sustain. Comput. (2017)

    Google Scholar 

  19. Kim, H., Lee, E.A.: Authentication and authorization for the internet of things. IT Professional 19(5), 27–33 (2017)

    Article  Google Scholar 

  20. Link: https://physionet.org/physiobank/database/ecgiddb/

  21. Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., Jamalipour, A.: Wireless body area networks: a survey. IEEE Commun. Surv. Tutor. 16(3), 1658–1686 (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sohail Saif .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saif, S., Biswas, S. (2020). On the Implementation and Performance Evaluation of Security Algorithms for Healthcare. In: Kundu, S., Acharya, U.S., De, C.K., Mukherjee, S. (eds) Proceedings of the 2nd International Conference on Communication, Devices and Computing. ICCDC 2019. Lecture Notes in Electrical Engineering, vol 602. Springer, Singapore. https://doi.org/10.1007/978-981-15-0829-5_59

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-0829-5_59

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-0828-8

  • Online ISBN: 978-981-15-0829-5

  • eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)

Publish with us

Policies and ethics