Abstract
The collection of pervasive data from e-healthcare system inherits potential medical significance through the mode of data exchange with the service providers of professional health care. The sensitive data exchange between the health care providers need to satisfy the requirements of user privacy, since the environment of fog computing is highly vulnerable due to the injection of false data from the hybrid IoT devices. However, sharing health data introduces a diversified number of security issues that include privacy leakage and access control with the further possibility of facing crucial challenges for attaining significant data investigation and services. In this paper, a contextual fully homomorphic encryption techniques-based privacy preserving framework (CFHET-PPF) for securing fog-assisted health data exchanging applications. This proposed CFHET-PPF framework integrates three significant fully homomorphic encryption approaches together in preventing false data injection. It is proposed for facilitating the fog nodes to categorize the shared data based on disease risks for indispensable health data analysis. It aids in achieving a maximum reduction in the number of encryptions by offloading a part of storage and computation burden at the side of the patients to the fog nodes. The security investigations of the proposed CFHET-PPF framework confirmed its superiority in fine grained access control, lightweight process and confidentiality with collusion resistance.
Similar content being viewed by others
References
Chen M, Qian Y, Chen J, Hwang K, Mao S, Hu L (2019) Privacy protection and intrusion avoidance for cloudlet-based medical data sharing. IEEE Trans Cloud Comput 2(3):1–11
Witti M, Konstantas D (2019) Secure and privacy-aware data collection architecture approach in fog node based distributed IoT environment. In: 6th international conference on computer science, engineering and information technology (CSEIT-2019)
Akhundov H, Van der Sluis E, Hamdioui S, Taouil M (2019) Public-key based authentication architecture for IoT devices using PUF. In: 6th international conference on computer science, engineering and information technology (CSEIT-2019), 2(1):34–43
Imine Y, Lounis A, Bouabdallah A (2019) An efficient accountable privacy-preserving scheme for public information sharing in fog computing. In: 2019 IEEE global communications conference (GLOBECOM), 2(1):34–43
Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. Public Key Cryptogr PKC 2(1):53–70
Nobles AL, Vilankar K, Wu H, Barnes LE (2015) Evaluation of data quality of multisite electronic health record data for secondary analysis. In: 2015 IEEE international conference on big data (big data). 1(1):23–41
Xu C, Ren J, Zhang Y, Qin Z, Ren K (2017) DPPro: Differentially private high-dimensional data release via random projection. IEEE Trans Inf Forensics Secur 12(12):3081–3093
Zhang K, Yang K, Liang X, Su Z, Shen X, Luo HH (2015) Security and privacy for mobile healthcare networks: from a quality of protection perspective. IEEE Wirel Commun 22(4):104–112
Balu A, Kuppusamy K (2014) An expressive and provably secure ciphertext-policy attribute-based encryption. Inf Sci 276(1):354–362
Tang W, Ren J, Zhang K, Zhang D, Zhang Y, Shen X (2019) Efficient and privacy-preserving fog-assisted health data sharing scheme. ACM Trans Intell Syst Technol 10(6):1–23
Shen J, Zhou T, Chen X, Li J, Susilo W (2018) Anonymous and traceable group data sharing in cloud computing. IEEE Trans Inf Forensics Secur 13(4):912–925
Zhang S, Li X, Tan Z, Peng T, Wang G (2019) A caching and spatialk-anonymity driven privacy enhancement scheme in continuous location-based services. Futur Gener Comput Syst 94:40–50
Huang C, Lu R, Zhu H, Shao J, Lin X (2016) FSSR: fine-grained ehrs sharing via similarity-based recommendation in cloud-assisted ehealthcare system. In: Proceedings of the 11th ACM on Asia conference on computer and communications security, pp 95–106
Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72(1):1–12
Chen M, Qian Y, Chen J, Hwang K, Mao S, Hu L (2019) IEEE Trans Cloud Comput 2(2):1–16
FeyzaYildirim O, Ozdemir S, Xiao Y (2020) Fog computing-based privacy preserving data aggregation protocols. Trans Emerging Telecommun Technol 3(2):89–98
Hu P, Wang Y, Gong B, Wang Y, Li Y, Zhao R, Li H, Li B (2020) A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. Peer-to-Peer Netw Appl 2(1):45–58
Zhang Y, Zhao J, Zheng D, Deng K, Ren F, Zheng X, Shu J (2018) Privacy-preserving data aggregation against false data injection attacks in fog computing. Sensors 18(8):2659
Zhang Y, Zheng D, Zhao Q, Lai C, Ren F (2017) PADA: privacy-aware data aggregation with efficient communication for power injection in 5G smart grid Slice. In: 2017 international conference on networking and network applications (NaNA), 2(1):78–85
Chen L, Lu R, Cao Z (2014) PDAFT: a privacy-preserving data aggregation scheme with fault tolerance for smart grid communications. Peer-to-Peer Netw Appl 8(6):1122–1132
Yang J, Li J, Niu Y (2015) A hybrid solution for privacy preserving medical data sharing in the cloud environment. Futur Gener Comput Syst 43–44:74–86
Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265–1277
Chu C-K, Chow SS, Tzeng W-G, Zhou J, Deng RH (2014) Key-aggregate Cryptosystem for scalable data sharing in cloud storage. IEEE Trans Parallel Distrib Syst 25(2):468–477
Yang K, Liu Z, Jia X, Shen XS (2016) Time-domain attribute-based access control for cloud-based video content sharing: a cryptographic approach. IEEE Trans Multimed 18(5):940–950
Amuthan A, Sendhil R (2020) Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing. J Ambient Intell Humaniz Comput 2(1):45–58
El-Yahyaoui A, Kettani D-C, M. (2019) A verifiable fully homomorphic encryption scheme for cloud computing security. Technologies 7(1):21–34
Chen Z, Wang J, Chen L, Song X (2014) A regev-type fully homomorphic encryption scheme using modulus switching. Sci World J 2014(1):1–12
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Sendhil, R., Amuthan, A. Contextual fully homomorphic encryption schemes-based privacy preserving framework for securing fog-assisted healthcare data exchanging applications. Int. j. inf. tecnol. 13, 1545–1553 (2021). https://doi.org/10.1007/s41870-021-00704-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41870-021-00704-z