4.6 Article

Towards an optimized security approach to IoT devices with confidential healthcare data exchange

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume 80, Issue 20, Pages 31435-31449

Publisher

SPRINGER
DOI: 10.1007/s11042-021-10827-x

Keywords

Visual secret sharing; Confidentiality; Data exchange; Fragmentation; IoT internet of things; Encryption; Cloud computing

Funding

  1. project entitled 'Smart and Health Ageing through People Engaging in supporting Systems' - European Union's Horizon 2020 research and innovation programme [857159]
  2. SPHINX project through the European Union's Horizon 2020 Research and Innovation Programme (Digital Society, Trust & Cyber Security E-Health, Well-Being and Ageing) [826183]
  3. Research & Innovation Foundation in Cyprus under the AAL framework [vINCI/P2P/AAL/0217/0016]

Ask authors/readers for more resources

This paper introduces an encryption framework based on data fragmentation and a novel deterministic grey-scale optical encryption scheme to ensure the security of medical data through encryption and fragmentation, and the reconstruction of images using interpolation and personal data from the database management system. It also aims to ensure the secure acquisition of diagnostic images and medical imagery based on probabilistic approaches.
Reliable data exchange and efficient image transfer are currently significant research challenges in health care systems. To incentivize data exchange within the Internet of Things (IoT) framework, we need to ensure data sovereignty by facilitating secure data exchange between trusted parties. The security and reliability of data-sharing infrastructure require a community of trust. Therefore, this paper introduces an encryption frame based on data fragmentation. It also presents a novel, deterministic grey-scale optical encryption scheme based on fundamental mathematics. The objective is to use encryption as the underlying measure to make the data unintelligible while exploiting fragmentation to break down sensitive relationships between attributes. Thus, sensitive data distributed in separate data repositories for decryption and reconstruction using interpolation by knowing polynomial coefficients and personal values from the DBMS Database Management System. Aims also to ensure the secure acquisition of diagnostic images, micrography, and all types of medical imagery based on probabilistic approaches. Visual sharing of confidential medical imageries based on implementing a novel method, where transparencies <= k - 1 out of n cannot reveal the original image.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available