当前位置: X-MOL 学术Secur. Commun. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Preserving Data Privacy in the Internet of Medical Things Using Dual Signature ECDSA
Security and Communication Networks ( IF 1.968 ) Pub Date : 2020-06-10 , DOI: 10.1155/2020/4960964
Maria-Dolores Cano 1 , Antonio Cañavate-Sanchez 1
Affiliation  

The disclosure of personal and private information is one of the main challenges of the Internet of Medical Things (IoMT). Most IoMT-based services, applications, and platforms follow a common architecture where wearables or other medical devices capture data that are forwarded to the cloud. In this scenario, edge computing brings new opportunities to enhance the operation of IoMT. However, despite the benefits, the inherent characteristics of edge computing require countermeasures to address the security and privacy issues that IoMT gives rise to. The restrictions of IoT devices in terms of battery, memory, hardware resources, or computing capabilities have led to a common agreement for the use of elliptic curve cryptography (ECC) with hardware or software implementations. As an example, the elliptic curve digital signature algorithm (ECDSA) is widely used by IoT devices to compute digital signatures. On the other hand, it is well known that dual signature has been an effective method to provide consumer privacy in classic e-commerce services. This article joins both approaches. It presents a novel solution to enhanced security and the preservation of data privacy in communications between IoMT devices and the cloud via edge computing devices. While data source anonymity is achieved from the cloud perspective, integrity and origin authentication of the collected data is also provided. In addition, computational requirements and complexity are kept to a minimum.

中文翻译:

使用双重签名ECDSA保护医疗物联网中的数据隐私

个人和私人信息的披露是医疗物联网(IoMT)的主要挑战之一。大多数基于IoMT的服务,应用程序和平台都遵循通用架构,可穿戴设备或其他医疗设备会捕获转发到云的数据。在这种情况下,边缘计算带来了新的机会来增强IoMT的运行。但是,尽管有这些好处,边缘计算的固有特性仍需要采取对策来解决IoMT引起的安全性和隐私问题。物联网设备在电池,内存,硬件资源或计算能力方面的限制已导致在硬件或软件实现中使用椭圆曲线密码术(ECC)的通用协议。举个例子,椭圆曲线数字签名算法(ECDSA)被IoT设备广泛用于计算数字签名。另一方面,众所周知,双重签名已成为在传统电子商务服务中提供消费者隐私的有效方法。本文将两种方法结合在一起。它提出了一种新颖的解决方案,可通过边缘计算设备在IoMT设备与云之间的通信中提高安全性并保护数据隐私。从云的角度实现数据源匿名性的同时,还提供了所收集数据的完整性和原始身份验证。另外,将计算要求和复杂性保持在最低限度。众所周知,双重签名已成为在传统电子商务服务中提供消费者隐私的有效方法。本文将两种方法结合在一起。它提出了一种新颖的解决方案,可通过边缘计算设备在IoMT设备与云之间的通信中提高安全性并保护数据隐私。从云的角度实现数据源匿名性的同时,还提供了所收集数据的完整性和原始身份验证。另外,将计算要求和复杂性保持在最低限度。众所周知,双重签名已成为在传统电子商务服务中提供消费者隐私的有效方法。本文将两种方法结合在一起。它提出了一种新颖的解决方案,可通过边缘计算设备在IoMT设备与云之间的通信中提高安全性并保护数据隐私。从云的角度实现数据源匿名性的同时,还提供了所收集数据的完整性和原始身份验证。另外,将计算要求和复杂性保持在最低限度。还提供了所收集数据的完整性和原始身份验证。另外,将计算要求和复杂性保持在最低限度。还提供了所收集数据的完整性和原始身份验证。另外,将计算要求和复杂性保持在最低限度。
更新日期:2020-06-10
down
wechat
bug