IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques

Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques
View Sample PDF
Author(s): Zhuolin Mei (Jiujiang University, China), Jing Yu (Jiujiang University, China), Jinzhou Huang (Hubei University of Arts and Science, China), Bin Wu (Jiujiang University, China), Zhiqiang Zhao (Ningxia Normal University, China), Caicai Zhang (Zhejiang Institute of Mechanical and Electrical Engineering, China), Jiaoli Shi (Jiujiang Key Laboratory of Network and Information Security, China), Xiancheng Wang (Jiujiang University, China)and Zongda Wu (Shaoxing University, China)
Copyright: 2023
Volume: 20
Issue: 1
Pages: 18
Source title: International Journal of Web Services Research (IJWSR)
Editor(s)-in-Chief: Liang-Jie Zhang (Kingdee International Software Group, China)and Chia-Wen Tsai (Ming Chuan University, Taiwan)
DOI: 10.4018/IJWSR.331388

Purchase


Abstract

With the increasing awareness of personal health, personal health data management has become an important part of people's lives. Smart wearable devices (SWDs) collect people's personal health data, and then store the data on cloud. Authorized entities access the data to provide personalized health services. However, these personal health data contain a large amount of sensitive information, which may pose a significant threat to people's lives and property. To address this, this paper proposes a privacy-preserving solution. SWD data is encrypted, and secure indexes are created using Bloom filter and 0-1 encoding. Encrypted data and indexes are stored in a semi-trusted cloud. Only authorized entities can access the ciphertexts, ensuring secure personalized health management. Extensive experiments validate the scheme's efficiency in index construction, query token generation, and ciphertext search. Security analysis confirms no external entity, including the cloud, gains additional information during retrieval.

Related Content

Jinping Zhang. © 2024. 17 pages.
Ahmad Radwan, Mohannad Amarneh, Hussam Alawneh, Huthaifa I. Ashqar, Anas AlSobeh, Aws Abed Al Raheem Magableh. © 2024. 22 pages.
Zhuolin Mei, Huilai Zou, Jinzhou Huang, Caicai Zhang, Bin Wu, Jiaoli Shi, Zhengxiang Cheng. © 2024. 17 pages.
Shouning Huang. © 2024. 18 pages.
Xiang Xie, Jianxun Liu, Buqing Cao, Mi Peng, Guosheng Kang, Yiping Wen, Kenneth K. Fletcher. © 2023. 17 pages.
Yunfei Li, Shichao Yin. © 2023. 17 pages.
Yong Lu, Ming Zhe Jin. © 2023. 14 pages.
Body Bottom