Javascript must be enabled to continue!
Secure Multi-access in Fog-based IoMT leveraging Hybrid ZKPs and ABE
View through CrossRef
Abstract
The development of technology allows health monitoring devices to integrate multiple sensors, collect various measurement signals, and increase wireless communication time to data analysis centers. Additionally, the digitization of medical records in healthcare facilities, including patient records and personal health profiles, has transitioned to digital records stored in large data centers. However, ensuring security for data sharing between layers of healthcare data management is crucial to maintain data confidentiality, integrity, and availability. In this study, we address the primary challenges in data sharing within the network connecting smart medical devices and healthcare applications, commonly referred to as the Internet of Medical Things (IoMT). The IoMT network is layered, ranging from the physical layer of data-collecting devices to storage, through the fog layer, and the storage layer on cloud servers. In the proposed work, we evaluated and analyzed authentication risks and security attacks between IoMT layers. Subsequently, we proposed secure authentication solutions utilizing Attribute-Based Encryption (ABE) and zero-knowledge proof (ZKP). ABE ensures data protection and access control; therefore, we explored advanced ABE methods, such as Ciphertext-Policy ABE (CP-ABE), to construct access policies and effectively synchronize secret session keys. Moreover, to enhance privacy and security, we have integrated non-interactive zero-knowledge proof (NIZKP) techniques, which offer anonymous authentication and secret data verification without disclosing identities. NIZKP facilitates distributed authentication, reducing reliance on trusted third parties and broadening the scope of application in authenticating distributed systems. Experimental evaluations confirm that integrating ABE with NIZK proofs creates an efficient protocol for authentication and session key exchange in the communication and data-sharing layers of the IoMT network. The results demonstrate that the proposed scheme performs favorably in terms of computational cost and communication efficiency. Moreover, the security evaluation indicates that the system effectively mitigates distributed denial-of-service (DDoS) attacks and maintains resilience against both external and internal collusion security threats.
Springer Science and Business Media LLC
Title: Secure Multi-access in Fog-based IoMT leveraging Hybrid ZKPs and ABE
Description:
Abstract
The development of technology allows health monitoring devices to integrate multiple sensors, collect various measurement signals, and increase wireless communication time to data analysis centers.
Additionally, the digitization of medical records in healthcare facilities, including patient records and personal health profiles, has transitioned to digital records stored in large data centers.
However, ensuring security for data sharing between layers of healthcare data management is crucial to maintain data confidentiality, integrity, and availability.
In this study, we address the primary challenges in data sharing within the network connecting smart medical devices and healthcare applications, commonly referred to as the Internet of Medical Things (IoMT).
The IoMT network is layered, ranging from the physical layer of data-collecting devices to storage, through the fog layer, and the storage layer on cloud servers.
In the proposed work, we evaluated and analyzed authentication risks and security attacks between IoMT layers.
Subsequently, we proposed secure authentication solutions utilizing Attribute-Based Encryption (ABE) and zero-knowledge proof (ZKP).
ABE ensures data protection and access control; therefore, we explored advanced ABE methods, such as Ciphertext-Policy ABE (CP-ABE), to construct access policies and effectively synchronize secret session keys.
Moreover, to enhance privacy and security, we have integrated non-interactive zero-knowledge proof (NIZKP) techniques, which offer anonymous authentication and secret data verification without disclosing identities.
NIZKP facilitates distributed authentication, reducing reliance on trusted third parties and broadening the scope of application in authenticating distributed systems.
Experimental evaluations confirm that integrating ABE with NIZK proofs creates an efficient protocol for authentication and session key exchange in the communication and data-sharing layers of the IoMT network.
The results demonstrate that the proposed scheme performs favorably in terms of computational cost and communication efficiency.
Moreover, the security evaluation indicates that the system effectively mitigates distributed denial-of-service (DDoS) attacks and maintains resilience against both external and internal collusion security threats.
Related Results
Dense Fog Burst Reinforcement over Eastern China
Dense Fog Burst Reinforcement over Eastern China
<p>Fog can be hazardous weather. Dense and polluted fog is especially known to impact transportation, air quality, and public health. Low visibilities on fog days thr...
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
Fog dissipation through ground warming monitored by satellite image : an approach to support regional forecasting 
<p>By reducing the atmospheric visibility, fog events have strong impacts on several humans activities. Transport security, military operations, air quality forecast ...
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Fog in Sofia 2010–2019: Objective Circulation Classification and Fog Indices
Low visibility caused by fog events can lead to disruption of every type of public transportation, and even loss of life. The focus of this study is the synoptic conditions associa...
Fog climatology at Shanghai Pudong International Airport
Fog climatology at Shanghai Pudong International Airport
AbstractUsing 22‐year ground observations on meteorological variables, we conducted a statistical analysis to reveal fog characteristics at Shanghai Pudong International Airport (S...
Influence of nighttime radiation fog on the development of the daily boundary layer: An large eddy simulation study
Influence of nighttime radiation fog on the development of the daily boundary layer: An large eddy simulation study
<p>Apart from hazards associated with deep fog, its presence significantly alters the properties of the nocturnal boundary layer (NBL).&#160;<br>...
Fog Harvesting: An Effective Solution to The Water Scarcity Problem
Fog Harvesting: An Effective Solution to The Water Scarcity Problem
Fog harvesting, also known as fog collection, is a sustainable approach to addressing water scarcity which captures water droplets from fog, providing a renewable water source for ...
Load Balancing at Fog Nodes using Scheduling Algorithms
Load Balancing at Fog Nodes using Scheduling Algorithms
Cloud Computing proves to be most predominant innovative field in the area of Information technology. Cloud is best suited for small scale to large scale businesses and personal pu...
Research on the Fusion of FY4A Satellite Data and Station Observation Data for Heavy Fog Recognition
Research on the Fusion of FY4A Satellite Data and Station Observation Data for Heavy Fog Recognition
Abstract
Satellite observations of fog possess the technical advantages of wide coverage and high spatio-temporal resolution. However, the accuracy of fog identification is...

