Secret Sharing-based Personal Health Records Management for the Internet of Health Things

08/16/2021
by   Ali Asghar Heidari, et al.
0

The holistic concept of smart cities has been adopted to increase economic, environmental, and social sustainability. For the sustainable health of a smart city inhabitant, there is a requirement for innovations in implementing health solutions. Given the exponential growth of the Internet of Health Things (IoHT) in health infrastructures, bulk amounts of health-related data are accumulated in Personal Health Records (PHR) and processed in storage data centers. One of the major challenges in this scenario is the security of this enormous medical data. The conventional encryption schemes generate single cipher images making the cryptosystem vulnerable to single-point attacks. This paper evaluates a distributed security module for the clinical images that form 80% of the health data. We utilize the Rivest Cipher 6 (RC6) encryption algorithm with the Computational Secret Sharing Scheme (CSIS) scheme for distributed storage of clinical images. The key is shared using the Perfect Secret Sharing scheme (PSS). We show that (k-1) key-shares and the 'n' image shares can be made public because of the perfect security of the scheme. The rest of the key shares can be secured using the Deoxyribonucleic Acid substitution (DNA substitution) method. Analysis of the shares generated reveals the strength of the cryptosystem and gives an insight into the degree of security provided to the health-related data. The entropy of the generated shares is higher than 7.99, and structural similarity (SSIM) values are negligible. The Number of Pixels Change Rate (NPCR) values are greater than 99.55% for all the shares that show a high diffusion measure. Comparison with state-of-the-art schemes reveal and validate the robustness of the cryptosystem

READ FULL TEXT

page 2

page 5

page 8

research
07/29/2019

A Survey on Hardware-based Security Mechanisms for Internet of Things

The vast areas of applications for IoTs in future smart cities, industri...
research
07/03/2023

Patient-centric health data sovereignty: an approach using Proxy re-encryption

The exponential growth in the digitisation of services implies the handl...
research
06/11/2019

New dynamic and verifiable multi-secret sharing schemes based on LFSR public key cryptosystem

A verifiable multi-secret sharing (VMSS) scheme enables the dealer to sh...
research
12/06/2019

Advanced attribute-based protocol based on the modified secret sharing scheme

We construct a new protocol for attribute-based encryption with the use ...
research
01/22/2021

Short Secret Sharing Using Repeatable Random Sequence Generators

We present a new secret sharing algorithm that provides the storage effi...
research
02/25/2020

The Nordic Data Imagninary

The Nordic countries aim to have a unique place within the European and ...
research
01/11/2023

Order-Preserving Database Encryption with Secret Sharing

The order-preserving encryption (OPE) problem was initially formulated b...

Please sign up or login with your details

Forgot password? Click here to reset