Journal
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS
Volume 21, Issue 6, Pages 1487-1494Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JBHI.2017.2679979
Keywords
Cloud; data scrambling; healthcare data; security
Categories
Funding
- National Natural Science Foundation of China [61671260, 61102087]
- Zhejiang Provincial Natural Science Foundation of China [LY14F010005]
- Ningbo Natural Science Foundation [2016A610111]
- Key Lab of Health Informatics of Chinese Academy of Sciences
- EPSRC
- EPSRC [EP/N027132/1, EP/H009744/1] Funding Source: UKRI
- Engineering and Physical Sciences Research Council [EP/H009744/1, EP/N027132/1, EP/M012522/1, EP/L014149/1] Funding Source: researchfish
Ask authors/readers for more resources
A body sensor network that consists of wearable and/or implantable biosensors has been an important front-end for collecting personal health records. It is expected that the full integration of outside-hospital personal health information and hospital electronic health records will further promote preventative health services as well as global health. However, the integration and sharing of health information is bound to bring with it security and privacy issues. With extensive development of healthcare applications, security and privacy issues are becoming increasingly important. This paper addresses the potential security risks of healthcare data in Internet-based applications and proposes a method of signal scrambling as an add-on security mechanism in the application layer for a variety of healthcare information, where a piece of tiny data is used to scramble healthcare records. The former is kept locally and the latter, along with security protection, is sent for cloud storage. The tiny data can be derived from a random number generator or even a piece of healthcare data, which makes the method more flexible. The computational complexity and security performance in terms of theoretical and experimental analysis has been investigated to demonstrate the efficiency and effectiveness of the proposed method. The proposed method is applicable to all kinds of data that require extra security protection within complex networks.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available