4.6 Article

A Method of Signal Scrambling to Secure Data Storage for Healthcare Applications

Journal

IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
Volume 21, Issue 6, Pages 1487-1494

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JBHI.2017.2679979

Keywords

Cloud; data scrambling; healthcare data; security

Funding

  1. National Natural Science Foundation of China [61671260, 61102087]
  2. Zhejiang Provincial Natural Science Foundation of China [LY14F010005]
  3. Ningbo Natural Science Foundation [2016A610111]
  4. Key Lab of Health Informatics of Chinese Academy of Sciences
  5. EPSRC
  6. EPSRC [EP/N027132/1, EP/H009744/1] Funding Source: UKRI
  7. Engineering and Physical Sciences Research Council [EP/H009744/1, EP/N027132/1, EP/M012522/1, EP/L014149/1] Funding Source: researchfish

Ask authors/readers for more resources

A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet-based applications and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally and the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available