136
Views
1
CrossRef citations to date
0
Altmetric
Medical Electronics

A Public Key Authentication and Privacy Preserving Model for Securing Healthcare System

ORCID Icon & ORCID Icon

References

  • A. Alabdulkarim, M. Al-Rodhaan, T. Ma, and Y. Tian, “PPSDT: A novel privacy-preserving single decision tree algorithm for clinical decision-support systems using IoT devices,” Sensors, Vol. 19, no. 1, p. 142, 2019.
  • S. M. R. Islam, D. Kwak, M. D. H. Kabir, M. Hossain, and K.-S. Kwak, “The internet of things for health care: a comprehensive survey,” IEEE. Access., Vol. 3, pp. 678–708, 2015.
  • R. Hamza, Z. Yan, K. Muhammad, P. Bellavista, and F. Titouna, “A privacy-preserving cryptosystem for IoT E-healthcare,” Inf. Sci. (Ny.), Vol. 527, pp. 493–510, 2020.
  • P. P. Ray, “A survey on Internet of Things architectures,” J. King Saud Univ. Inf. Sci., Vol. 30, no. 3, pp. 291–319, 2018.
  • P. P. Jayaraman, X. Yang, A. Yavari, D. Georgakopoulos, and X. Yi, “Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation,” Futur. Gener. Comput. Syst., Vol. 76, pp. 540–9, 2017.
  • S. Yattinahalli, and R. M. Savithramma, “A personal healthcare IoT system model using raspberry Pi 3,” in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018, pp. 569–73.
  • L. Jiang, L. Chen, T. Giannetsos, B. Luo, K. Liang, and J. Han, “Toward practical privacy-preserving processing over encrypted data in IoT: An assistive healthcare use case,” IEEE Internet Things J., Vol. 6, no. 6, pp. 10177–90, 2019.
  • S. Vitabile, et al., “Medical data processing and analysis for remote health and activities monitoring,” in High-Performance Modelling and Simulation for Big Data Applications, Cham: Springer, 2019, pp. 186–220.
  • J. J. Hathaliya, and S. Tanwar, “An exhaustive survey on security and privacy issues in Healthcare 4.0,” Comput. Commun., Vol. 153, pp. 311–35, 2020.
  • C. Camara, P. Peris-Lopez, and J. E. Tapiador, “Security and privacy issues in implantable medical devices: A comprehensive survey,” J. Biomed. Inform., Vol. 55, pp. 272–89, 2015.
  • J. Hou, L. Qu, and W. Shi, “A survey on internet of things security from data perspectives,” Comput. Networks, Vol. 148, pp. 295–306, 2019.
  • W. Sun, Z. Cai, Y. Li, F. Liu, S. Fang, and G. Wang, “Security and privacy in the medical internet of things: A review,” Secur. Commun. Networks Vol. 2018, pp. 1–9, 2018.
  • S. Chenthara, K. Ahmed, H. Wang, and F. Whittaker, “Security and privacy-preserving challenges of e-health solutions in cloud computing,” IEEE. Access., Vol. 7, pp. 74361–82, 2019. doi:10.1109/ACCESS.2019.2919982.
  • S. Soman, P. Ranjan, and P. K. Srivastava, “A distributed architecture for hospital management systems with synchronized EHR,” CSI Trans. ICT, Vol. 8, no. 3, pp. 355–65, 2020.
  • M. M. M. Pai, R. Ganiga, R. M. Pai, and R. K. Sinha, “Standard electronic health record (EHR) framework for Indian healthcare system,” Heal. Serv. Outcomes Res. Methodol., Vol. 21, pp. 339–62, 2021. doi:10.1007/s10742-020-00238-0.
  • S. Srivastava, S. Soman, A. Rai, A. Cheema, and P. K. Srivastava, “Continuity of care document for hospital management systems: An implementation perspective,” in Proceedings of the 10th International Conference on Theory and Practice of Electronic Governance, 2017, pp. 339–45. doi:10.1145/3047273.3047362.
  • N. Bajpai, and M. Wadhwa. “India’s National Digital Health Mission,” 2020.
  • N. Gudi, T. Lakiang, S. Pattanshetty, S. Sarbadhikari, and O. John, “Challenges and prospects in India’s digital health journey,” Indian J. Public Health, Vol. 65, no. 2, pp. 209–12, 2021. doi:10.4103/ijph.IJPH_1446_20.
  • S. Soman, P. Srivastava, and B. K. Murthy, “Unique health identifier for India: An algorithm and feasibility analysis on patient data,” in 2015 17th International Conference on E-health Networking, Application & Services (HealthCom), 2015, pp. 250–5.
  • A. Bashir, and A. H. Mir, “Secure framework for Internet of Things based e-Health system,” Int. J. E-Health Med. Commun., Vol. 10, no. 4, pp. 16–29, 2019.
  • P. Huang, L. Guo, M. Li, and Y. Fang, “Practical privacy-preserving ECG-based authentication for IoT-based healthcare,” IEEE Internet Things J., Vol. 6, no. 5, pp. 9200–10, 2019.
  • M. A. Sahi, et al., “Privacy preservation in e-healthcare environments: state of the art and future directions,” IEEE. Access., Vol. 6, pp. 464–78, 2017.
  • M. Malik, M. Dutta, and J. Granjal, “A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things,” IEEE. Access., Vol. 7, pp. 27443–64, 2019.
  • R. Boussada, B. Hamdane, M. E. Elhdhili, and L. A. Saidane, “Privacy-preserving aware data transmission for IoT-based e-health,” Comput. Networks, Vol. 162, p. 106866, 2019. doi:10.1016/j.comnet.2019.106866.
  • V. Lyubashevsky, D. Micciancio, C. Peikert, and A. Rosen, “SWIFFT: A modest proposal for FFT hashing,” Int. Workshop on Fast Software Encryption, Vol. 5086, 54–72, 2008.
  • B. D. Deebak, F. Al-Turjman, M. Aloqaily, and O. Alfandi, “An authentic-based privacy preservation protocol for smart e-healthcare systems in IoT,” IEEE. Access., Vol. 7, p. 135632–49, 2019.
  • Y. Zhou, T. Liu, F. Tang, F. Wang, and M. Tinashe, “A privacy-preserving authentication and key agreement scheme with deniability for IoT,” Electronics. (Basel), Vol. 8, no. 4, p. 450, 2019.
  • X. Guo, H. Lin, Y. Wu, and M. Peng, “A new data clustering strategy for enhancing mutual privacy in healthcare IoT systems,” Futur. Gener. Comput. Syst., Vol. 113, pp. 407–17, 2020.
  • A. D. Dwivedi, G. Srivastava, S. Dhar, and R. Singh, “A decentralized privacy-preserving healthcare blockchain for IoT,” Sensors, Vol. 19, no. 2, p. 326, 2019.
  • X. C. Yin, Z. G. Liu, B. Ndibanje, L. Nkenyereye, and S. M. Riazul Islam, “An IoT-based anonymous function for security and privacy in healthcare sensor networks,” Sensors, Vol. 19, no. 14, p. 3146, 2019.
  • R. Tso, A. Alelaiwi, S. M. M. Rahman, M.-E. Wu, and M. S. Hossain, “Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud,” J. Signal Process. Syst., Vol. 89, no. 1, pp. 51–9, 2017.
  • K. Riad, R. Hamza, and H. Yan, “Sensitive and energetic IoT access control for managing cloud electronic health records,” IEEE. Access., Vol. 7, p. 86384–93, 2019.
  • Y. Yang, X. Zheng, W. Guo, X. Liu, and V. Chang, “Privacy-preserving smart IoT-based healthcare big data storage and self-adaptive access control system,” Inf. Sci. (Ny)., Vol. 479, pp. 567–92, 2019.
  • M. Jain, A. Rani, and V. Singh, “An improved Crow Search Algorithm for high-dimensional problems,” J. Intell. Fuzzy Syst., Vol. 33, no. 6, pp. 3597–614, 2017.
  • M. D. Janosi, S. Andras, P. William, D. Matthias, and M. D. Robert, “Heart disease,” UCI Machine Learning Repository.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.