Advertisement

Security and Privacy Issues in Fog Computing for Healthcare 4.0

  • Shivani DesaiEmail author
  • Tarjni Vyas
  • Vishakha Jambekar
Chapter
  • 1 Downloads
Part of the Signals and Communication Technology book series (SCT)

Abstract

Fog computing is a new trending technology which adds on the capability and efficiency to cloud computing network as it is interposed between cloud and device. Fog devices are able to compute large quantity of data locally, portable, and may be installed on heterogeneous system. It is significantly suitable for healthcare due to its real-time processing and event responses. Such huge variety of traits emerges new security and privacy issues. In the field of healthcare, security poses additional challenges due to the secure transfer, arrival and access, availability of medical device. Ultimately human well-being is the superior necessity. It has become more vulnerable due to its features like mobility, heterogeneity, decentralized and additional challenges sensitive health information records, interoperability of medical IoT device. Therefore, Fog computing demands exclusive way for security and privacy measurements rather than existing measures for cloud computing. Also, as the number of access point increases it is open for more vulnerability. Implanted devices are more critical as if it is not properly secured, then they may put patient in a critical situation. This chapter discusses about basic security and privacy issues which state the need for security in Fog-based medical devices. Different possible attacks and threats are covered with the scenario of implanted medical device. Security challenges for different segments of Fog computing like device, network, and data have been discussed with in-depth analysis for security challenges, privacy, and trust issues in the relation of healthcare 4.0.

Keywords

Fog computing Threats Attacks Intrusion detection system Blockchain Privacy 

References

  1. 1.
    Sangita, D., Ankita, C., & Reshamlal, P. (2015). A review on issues and challenges of cloud computing. International Journal of Innovations and Advancement in Computer Science, 4(1), 81–88.Google Scholar
  2. 2.
    Top Threats Working Group. (2016). The treacherous 12: cloud computing top threats in 2016. Seattle: Cloud Security Alliance.Google Scholar
  3. 3.
    Mishra, A. K., Tripathy, A. K., Puthal, D., & Yang, L. T. (2018). Analytical model for Sybil attack phases in internet of things. IEEE Internet of Things Journal, 6(1), 379–387.Google Scholar
  4. 4.
    Fadele, A. A., Othman, M., Hashem, I. A. T., Yaqoob, I., Imran, M., & Shoaib, M. (2019). A novel countermeasure technique for reactive jamming attack in internet of things. Multimedia Tools and Applications, 78(21), 29899–29920.Google Scholar
  5. 5.
    Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2018). Fog computing for Healthcare 4.0 environment: Opportunities and challenges. Computers & Electrical Engineering, 72, 1–13.Google Scholar
  6. 6.
    Lin, X, Ni, J., & Shen, X. (2018). Privacy-enhancing fog computing and its applications. Basel: Springer International Publishing.Google Scholar
  7. 7.
    Kumar, P., Zaidi, N., & Choudhury, T. (2016). Fog computing: Common security issues and proposed countermeasures. In 2016 International Conference System Modeling & Advancement in Research Trends (SMART) (pp. 311–315). Piscataway: IEEE.Google Scholar
  8. 8.
    Huang, C., Liu, D., Ni, J., Lu, R., & Shen, X. (2018). Reliable and privacy-preserving selective data aggregation for fog-based IoT. In 2018 IEEE International Conference on Communications (ICC) (pp. 1–6). Piscataway: IEEE.Google Scholar
  9. 9.
    Tanwar, S., Thakkar, K., Thakor, R., & Singh, P. K. (2018). M-Tesla-based security assessment in wireless sensor network. Procedia Computer Science, 132, 1154–1162.Google Scholar
  10. 10.
    Sametinger, J., Rozenblit, J., Lysecky, R., & Ott, P. (2015). Security challenges for medical devices. Communications of the ACM, 58(4), 74–82.Google Scholar
  11. 11.
    Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. (2017). Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), 34–42.Google Scholar
  12. 12.
    Mukherjee, M., Matam, R., Shu, L., Maglaras, L., Ferrag, M. A., Choudhury, N., et al. (2017). Security and privacy in fog computing: Challenges. IEEE Access, 5, 19293–19304.Google Scholar
  13. 13.
    Khan, S., Parkinson, S., & Qin, Y. (2017). Fog computing security: a review of current applications and security solutions. Journal of Cloud Computing, 6(1), 19.Google Scholar
  14. 14.
    Atlam, H., Walters, R., Wills, G. (2018). Fog computing and the internet of things: a review. Big Data and Cognitive Computing, 2(2), 10.Google Scholar
  15. 15.
    Stallings, W. (2006) Cryptography and network security, 4/E. Pearson Education India.Google Scholar
  16. 16.
    Shi, Y., Ding, G., Wang, H., Eduardo Roman, H., & Lu, S. (2015). The fog computing service for healthcare. In 2015 2nd International Symposium on Future Information and Communication Technologies for Ubiquitous HealthCare (Ubi-HealthTech) (pp. 1–5). Piscataway: IEEE.Google Scholar
  17. 17.
    Lee, K., Kim, D., Ha, D., Rajput, U., & Oh, H. (2015). On security and privacy issues of fog computing supported Internet of Things environment. In 2015 6th International Conference on the Network of the Future (NOF) (pp. 1–3). Piscataway: IEEE.Google Scholar
  18. 18.
    Li, C., Qin, Z., Novak, E., & Li, Q. (2017). Securing SDN infrastructure of IoT–fog networks from MitM attacks. IEEE Internet of Things Journal, 4(5), 1156–1164.Google Scholar
  19. 19.
    Salonikias, S., Mavridis, I., & Gritzalis, D. (2015). Access control issues in utilizing fog computing for transport infrastructure. In International Conference on Critical Information Infrastructures Security (pp. 15–26). Cham: Springer.Google Scholar
  20. 20.
    Lewko, A., & Waters, B. (2011). Decentralizing attribute-based encryption. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 568–588). Berlin: Springer.Google Scholar
  21. 21.
    Steiner, P. (2014). Going beyond mobile device management. Computer Fraud & Security, 2014(4), 19–20.Google Scholar
  22. 22.
    Ni, J., Lin, X., Zhang, K., Yu, Y., & Shen, X. S. (2016). Device-invisible two-factor authenticated key agreement protocol for BYOD. In 2016 IEEE/CIC International Conference on Communications in China (ICCC) (pp. 1–6). Piscataway: IEEE.Google Scholar
  23. 23.
    Vora, J., Italiya, P., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., et al. (2018). Ensuring privacy and security in E-health records. In 2018 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1–5). Piscataway: IEEE.Google Scholar
  24. 24.
    Tanwar, S., Vora, J., Kaneriya, S., Tyagi, S., Kumar, N., Sharma, V., et al. (2019). Human arthritis analysis in fog computing environment using Bayesian network classifier and thread protocol. IEEE Consumer Electronics Magazine, 9(1), 88–94.Google Scholar
  25. 25.
    Cho, J.-H., Swami, A., & Chen, R. (2010). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.Google Scholar
  26. 26.
    Hou, J., Jiang, M., Guo, Y., & Song, W. (2019). Efficient identity-based multi-bit proxy re-encryption over lattice in the standard model. Journal of Information Security and Applications, 47, 329–334.Google Scholar
  27. 27.
    Vora, J., DevMurari, P., Tanwar, S., Tyagi, S., Kumar, N., & Obaidat, M. S. (2018). Blind signatures based secured e-healthcare system. In 2018 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1–5). Piscataway: IEEE.Google Scholar
  28. 28.
    Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Parizi, R. M., & Choo, K.-K. R. (2019). Fog data analytics: A taxonomy and process model. Journal of Network and Computer Applications, 128, 90–104.Google Scholar
  29. 29.
    Vora, J., Italiya, P., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., et al. (2018). Ensuring privacy and security in E-health records. In 2018 International Conference on Computer, Information and Telecommunication Systems (CITS) (pp. 1–5). Piscataway: IEEE.Google Scholar
  30. 30.
    Vora, J., Kaneriya, S., Tanwar, S., & Tyagi, S. (2018). Performance evaluation of SDN based virtualization for data center networks. In 2018 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU) (pp. 1–5). Piscataway: IEEE.Google Scholar
  31. 31.
    Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Maasberg, M., & Choo, K.-K. R. (2018). Multimedia big data computing and Internet of Things applications: A taxonomy and process model. Journal of Network and Computer Applications, 124, 169–195.Google Scholar
  32. 32.
    Tanwar, S., Ramani, T., & Tyagi, S. (2017). Dimensionality reduction using PCA and SVD in big data: A comparative case study. In International Conference on Future Internet Technologies and Trends (pp. 116–125). Cham: Springer.Google Scholar
  33. 33.
    Ghafir, I., & Prenosil, V. (2016). Malicious file hash detection and drive-by download attacks. In Proceedings of the Second International Conference on Computer and Communication Technologies (pp. 661–669). New Delhi: Springer.Google Scholar
  34. 34.
    Yu, Y., Au, M. H., Ateniese, G., Huang, X., Susilo, W., Dai, Y., et al. (2016). Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security, 12(4), 767–778.Google Scholar
  35. 35.
    Zhu, Y., Hu, H., Ahn, G.-J., & Yu, M. (2012). Cooperative provable data possession for integrity verification in multicloud storage. IEEE Transactions on Parallel and Distributed Systems, 23(12), 2231–2244.Google Scholar
  36. 36.
    Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 127–144). Berlin: Springer.zbMATHGoogle Scholar
  37. 37.
    Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89–98). New York: ACM.Google Scholar
  38. 38.
    Bethencourt, J., Sahai, A., & Waters. B. (2007). Ciphertext-policy attribute-based encryption. In 2007 IEEE symposium on security and privacy (SP’07) (pp. 321–334). Piscataway: IEEE.Google Scholar
  39. 39.
    Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2018). Verification and validation techniques for streaming big data analytics in internet of things environment. IET Networks, 8(2), 92–100.Google Scholar
  40. 40.
    Gennaro, R., Gentry, C., & Parno, B. (2010). Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In Annual Cryptology Conference (pp. 465–482). Berlin: Springer.Google Scholar
  41. 41.
    Chung, K.-M., Kalai, Y., & Vadhan, S. (2010). Improved delegation of computation using fully homomorphic encryption. In Annual Cryptology Conference (pp. 483–501). Berlin: Springer.Google Scholar
  42. 42.
    Kawamura, S.-i., & Shimbo, A. (1993). Fast server-aided secret computation protocols for modular exponentiation. IEEE Journal on Selected Areas in Communications, 11(5), 778–784.Google Scholar
  43. 43.
    Cavallo, B., Di Crescenzo, G., Kahrobaei, D., & Shpilrain, V. (2015). Efficient and secure delegation of group exponentiation to a single server. In International workshop on radio frequency identification: security and privacy issues (pp. 156–173). Cham: Springer.Google Scholar
  44. 44.
    Girault, M., & Lefranc, D. (2005). Server-aided verification: theory and practice. In International Conference on the Theory and Application of Cryptology and Information Security (pp. 605–623). Berlin: Springer.zbMATHGoogle Scholar
  45. 45.
    Wu, W., Mu, Y., Susilo, W., & Huang, X. (2008). Server-aided verification signatures: Definitions and new constructions. In International Conference on Provable Security (pp. 141–155). Berlin: Springer.Google Scholar
  46. 46.
    Rao, N. S., & Gopi Krishna, V. (2016). Data integrity auditing and secure deduplication on cloud using secure systems. International Journal of Scientific Research in Science, Engineering and Technology, 2(6), 175–187.Google Scholar
  47. 47.
    Kamara, S., Mohassel, P., & Riva, B. (2012). Salus: A system for server-aided secure function evaluation. In Proceedings of the 2012 ACM Conference on Computer and Communications Security (pp. 797–808). New York: ACM.Google Scholar
  48. 48.
    Cliff, Y., Tin, Y. S. T., & Boyd, C. (2006). Password based server aided key exchange. In International Conference on Applied Cryptography and Network Security (pp. 146–161). Berlin: Springer.Google Scholar
  49. 49.
    Vora, J., Kaneriya, S., Tanwar, S., Tyagi, S., Kumar, N., & Obaidat, M. S. (2019). TILAA: Tactile internet-based ambient assistant living in fog environment. Future Generation Computer Systems, 98, 635–649.Google Scholar
  50. 50.
    Balfanz, D., Smetters, D. K., Stewart, P., & Chi Wong, H. (2002). Talking to strangers: authentication in ad-hoc wireless networks. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2002.Google Scholar
  51. 51.
    Tariq, N., Asim, M., Al-Obeidat, F., Farooqi, M. Z., Baker, T., Hammoudeh, M., et al. (2019). The security of big data in fog-enabled IoT applications including blockchain: A survey. Sensors, 19(8), 1788.Google Scholar
  52. 52.
    Hathaliya, J. J., Tanwar, S., Tyagi, S., & Kumar, N. (2019). Securing electronics healthcare records in Healthcare 4.0: A biometric-based approach. Computers & Electrical Engineering, 76, 398–410.Google Scholar
  53. 53.
    Hathaliya, J. J., Tanwar, S., Tyagi, S., & Kumar, N. (2019). Securing electronics healthcare records in Healthcare 4.0: a biometric-based approach. Computers & Electrical Engineering, 76, 398–410.Google Scholar
  54. 54.
    Sen, J. (2010). Privacy preservation technologies in Internet of Things. Preprint. arXiv:1012.2177.Google Scholar
  55. 55.
    Van Tilborg, H. C. A., & Jajodia, S. (Eds). (2014). Encyclopedia of cryptography and security. Berlin: Springer Science & Business Media.zbMATHGoogle Scholar
  56. 56.
    Wei, W., Xu, F., & Li, Q. (2012). MobiShare: Flexible privacy-preserving location sharing in mobile online social networks. In 2012 Proceedings IEEE INFOCOM (pp. 2616–2620). Piscataway: IEEE.Google Scholar
  57. 57.
    Gong, P., Chen, T. M., & Xu, Q. (2015). ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks. Journal of Sensors, 2015, 1–10.Google Scholar
  58. 58.
    Tanwar, S., Parekh, K., & Evans, R. (2020). Blockchain-based electronic healthcare record system for healthcare 4.0 applications. Journal of Information Security and Applications, 50, 102407.Google Scholar
  59. 59.
    Vora, J., Tanwar, S., Tyagi, S., Kumar, N., & Rodrigues, J. (2017). FAAL: Fog computing-based patient monitoring system for ambient assisted living. In 2017 IEEE 19th International Conference on E-Health Networking, Applications and Services (Healthcom). Piscataway: IEEE.Google Scholar
  60. 60.
    Li, M., Zhu, L., & Lin, X. (2018). Efficient and privacy-preserving carpooling using blockchain-assisted vehicular Fog computing. IEEE Internet of Things Journal, 6(3), 4573–4584.Google Scholar
  61. 61.
    Sharma, P. K., Singh, S., Jeong, Y.-S., & Park, J. H. (2017). DistBlockNet: A distributed blockchains-based secure SDN architecture for IoT networks. IEEE Communications Magazine, 55(9), 78–85.Google Scholar
  62. 62.
    Hammi, M. T., Hammi, B., Bellot, P., Serhrouchni, A. (2018). Bubbles of Trust: a decentralized blockchain-based authentication system for IoT. Computers & Security, 78, 126–142.Google Scholar
  63. 63.
    Vora, J., Nayyar, A., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S., et al. (2018). BHEEM: A blockchain-based framework for securing electronic health records. In 2018 IEEE GLOBECOM Workshops (GC Wkshps). Piscataway: IEEE.Google Scholar
  64. 64.
    Brambilla, G., Amoretti, M., & Zanichelli, F. (2016). Using blockchain for peer-to-peer proof-of-location. Preprint. arXiv:1607.00174.Google Scholar
  65. 65.
    Yue, X., Wang, H., Jin, D., Li, M., & Jiang, W. (2016). Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control. Journal of Medical Systems, 40(10): 218.Google Scholar
  66. 66.
    Bodkhe, U., Bhattacharya, P., Tanwar, S., Tyagi, S., Kumar, N., Obaidat, M. S. (2019). BloHost: Blockchain enabled smart tourism and hospitality management. In 2019 International Conference on Computer, Information and Telecommunication Systems (CITS). Piscataway: IEEE.Google Scholar
  67. 67.
    Mistry, I., Tanwar, S., Tyagi, S., & Kumar, N. (2020). Blockchain for 5G-enabled IoT for industrial automation: A systematic review, solutions, and challenges. Mechanical Systems and Signal Processing, 135, 106382.Google Scholar
  68. 68.
    Tanwar, S., Parekh, K., Evans, R. (2019). Blockchain-based electronic healthcare record system for Healthcare 4.0 applications. Journal of Information Security and Applications, 50, 1–14.Google Scholar

Copyright information

© Springer Nature Switzerland AG 2021

Authors and Affiliations

  1. 1.Institute of Technology, Computer Science and Engineering DepartmentNirma UniversityAhmedabadIndia

Personalised recommendations