C-NEST: Cloudlet Based Privacy Preserving Multidimensional Data Stream Approach for Healthcare Electronics

G Srivastava, MS Mekala, MS Hajar… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
IEEE Transactions on Consumer Electronics, 2023ieeexplore.ieee.org
The Medical Internet of Things (MIoT) facilitates extensive connections between cyber and
physical “things” allowing for effective data fusion and remote patient diagnosis and
monitoring. However, there is a risk of incorrect diagnosis when data is tampered with from
the cloud or a hospital due to third-party storage services. Most of the existing systems use
an owner-centric data integrity verification mechanism, which is not computationally feasible
for lightweight wearable-sensor systems because of limited computing capacity and privacy …
The Medical Internet of Things (MIoT) facilitates extensive connections between cyber and physical “things” allowing for effective data fusion and remote patient diagnosis and monitoring. However, there is a risk of incorrect diagnosis when data is tampered with from the cloud or a hospital due to third-party storage services. Most of the existing systems use an owner-centric data integrity verification mechanism, which is not computationally feasible for lightweight wearable-sensor systems because of limited computing capacity and privacy leakage issues. In this regard, we design a 2-step Privacy-Preserving Multidimensional Data Stream (PPMDS) approach based on a cloudlet framework with an Uncertain Data-integrity Optimization (UDO) model and Sparse-Centric SVM (SCS) model. The UDO model enhances health data security with an adaptive cryptosystem called Cloudlet- Nonsquare Encryption Secret Transmission (C-NEST) strategy by avoiding medical disputes during data streaming based on novel signature and key generation strategies. The SCS model effectively classifies incoming queries for easy access to data by solving scalability issues. The cloudlet server measures data integrity and authentication factors to optimize third-party verification burden and computational cost. The simulation outcomes show that the proposed system optimizes average data leakage error rate by 27%, query response time and average data transmission time are reduced by 31%, and average communication-computation cost are reduced by 61% when measured against state-of-the-art approaches.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果