Journal
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
Volume 22, Issue -, Pages 65-75Publisher
SPRINGER
DOI: 10.1007/s10586-018-1706-1
Keywords
Public key cryptosystem; The Paillier encryption; Internally compromised attacks; End-to-end data privacy
Ask authors/readers for more resources
Despite more privacy preservation techniques available in wireless sensor networks (WSN), no modest technique dealt with compromised nodes. Among several applications, healthcare applications fit into WSNs environment for patient monitoring from work place, hospital and home. More predictable security threats are in healthcare applications against both outside and inside attacks. For example, data breach, access control, eavesdropping, modification, and impersonation are vulnerable. On hand clarifications protect the user's personal information from the external attackers. But, they are unable to fight against compromised attacks internally by knowing all user data and security credentials. The existing premier cryptosystem is unable to protect the user's data against compromised attacks. Also, WSNs provide flexible data aggregation structures and routing protocols to maintain end-to-end data privacy. In this proposal, a sensible approach is proposed to put off the inside attacks by many data servers to store user data. In this proposal, the paillier cryptosystem is used for distributing data to many data servers in a secured manner exclusively maintaining privacy. This proposal continues to preserve the data privacy only if any one of the data server is not compromised. A thorough security analysis and extensive simulations show that our protocol can ensure end-to-end privacy with low overhead for communication, memory and computation.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available