Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 2, April 2019
43
Block Chain Technology for Privacy Protection for
Cloudlet-based Medical Data Sharing
M. Divya and Dr.G. Singaravel
Abstract--- With the popularity of wearable devices, along
with the development of clouds and cloudlet technology, there
has been increasing need to provide better medical care. The
processing block chain of medical data mainly includes data
collection, data storage and data sharing, etc. Traditional
healthcare system often requires the delivery of medical data
to the cloud, which involves users’ sensitive information and
causes communication energy consumption. Practically,
medical data sharing is a critical and challenging issue. Thus
in this paper, we build up a novel healthcare system by
utilizing the flexibility of cloudlet. The functions of cloudlet
include privacy protection, data sharing and intrusion
detection. In the stage of data collection, we first utilize
Number Theory Research Unit (NTRU) method to encrypt
user’s body data collected by wearable devices. Those data
will be transmitted to nearby cloudlet in an energy efficient
fashion. Secondly, we present a new trust model to help users
to select trustable partners who want to share stored data in
the cloudlet. The trust model also helps similar patients to
communicate with each other about their diseases. Thirdly, we
divide users’ medical data stored in remote cloud of hospital
into three parts, and give them proper protection. Finally, in
order to protect the healthcare system from malicious attacks,
we develop a novel collaborative intrusion detection system
(IDS) method based on cloudlet mesh, which can effectively
prevent the remote healthcare big data cloud from attacks.
Our experiments demonstrate the effectiveness of the proposed
scheme. Combines classical partitioning algorithms with
probabilistic models so as to form an efficient clustering
approach.
Keywords--- IDS, Cloudlets Mining, Number Theory,
Encrypt, Block Chain.
I.
INTRODUCTION
T
HE client’s physiological data are first collected by
wearable devices such as smart clothing. Then, those data
are delivered to cloudlet. The following two important
problems for healthcare data protection is considered. The first
problem is healthcare data privacy protection and sharing data.
The second problem is to develop effective countermeasures
to prevent the healthcare database from being intruded from
outside.
A. Block Chain
Blockchain, the technology behind Bitcoin, seems to
M. Divya, PG Scholar, Department of Information Technology, K.S.R.
College of Engineering, Tiruchengode, India.
Dr.G. Singaravel, Professor & Head, Department of Information
Technology, K.S.R. College of Engineering, Tiruchengode, India.
DOI:10.9756/BIJSESC.9021
be the driving technology behind the next generation of
Internet, also referred to as the Decentralized Web, or the
Web3. Blockchain is a novel solution to the age-old human
problem of trust. It provides an architecture for so-called
trustless trust. It allows us to trust the outputs of the system
without trusting any actor within it.
A Blockchain protocol operates on top of the Internet, on a
P2P Network of computers that all run the protocol and hold
an identical copy of the ledger of transactions, enabling P2P
value transactions without a middleman though machine
consensus. Blockchain itself a file – a shared and public ledger
of transactions that records all transactions from the genesis
block (first block) until today. Blockchain is a shared, trusted,
public ledger of transactions, that everyone can inspect but
which no single user controls. It is a distributed
database that maintains a continuously growing list of
transaction data records, cryptographically secured from
tampering and revision.
The ledger is built using a linked list, or chain of blocks,
where each block contains a certain number of transactions
that were validated by the network in a given timespan. The
crypto-economic rules sets of the blockchain protocol
(consensus layer) regulate the behavioural rules sets and
incentive mechanism of all stakeholders in the network.
•
Blockchain technology is like the internet in that it has
a built-in robustness. By storing blocks of information
that are identical across its network, the blockchain
cannot:
• Be controlled by any single entity.
• Has no single point of failure.
Bitcoin was invented in 2008. Since that time, the Bitcoin
blockchain has operated without significant disruption. (To
date, any of problems associated with Bitcoin have been due
to hacking or mismanagement. In other words, these problems
come from bad intention and human error, not flaws in the
underlying concepts.)
The internet itself has proven to be durable for almost 30
years. It’s a track record that bodes well for blockchain
technology as it continues to be developed.
B. Content Sharing and Privacy Protection
Introduce the encryption process for users’ privacy data,
which prevents the leakage or malicious use of users’ private
data during transmissions. Next, we present the identity
management of users who want to access to the hospital’s
healthcare data. Thus, we can assign different users with
different levels of permissions for data access, while avoiding
data access beyond their permission levels. Finally, we give an
application of using users’ private data, which is beneficial to
ISSN 2277-5099 | © 2019 Bonfring
Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 2, April 2019
both users and doctors. Based on the healthcare big data stored
in the remote cloud, a disease prediction models built based on
decision tree. The predictions will be reported to the users and
doctors on demand.
C. Encryption at the User End
When using wearable devices to collect users’ data, the
procedure inevitably involves the user’s sensitive information.
Therefore, how to effectively collect and transmit users’ data
under efficient privacy protection is a critical problem. In a
data collection method, called PHDA, is proposed based on
data priority which can give proper cost and delay to different
priorities data. In, Li et al. discuss the process of data
collection and utilizes sum aggregation to obtain data to make
sure the security of users’ privacy in the presence of unreliable
sensors. In , Lu et al., study 3V data privacy protection issue
based on big data of healthcare. Based on the model presented
in, this paper utilizes the advantages of NTRU encryption
scheme. NTRU can protect the user’s physiological data, such
as heart rate, blood pressure and Electrocardiography (ECG),
etc. Before transmitted to a smartphone, NTRU encryption
scheme executed. The encrypted data will then be stored in the
cloudlet through a cellular network or WiFi. We hereby
describe the processes of encryption and deciphering in the
following.
In order to protect medical data, we also develop an
intrusion detection system in this paper. Once a malicious
attack is detected, the system will fire an alarm. This section
presents a novel scheme to build a collaborative IDS system to
deter intruders. In the following, we first consider what
happens if the system is suffering from different attacks, while
detection rates for individual IDS vary with the cloudlet
servers. We will plot the detection rate and false alarm rate as
the receiver operating characteristic (ROC) curves. Next, we
evaluate the collaborative detection rate and estimate the
expected cost of implementation in the cloudlet mesh. We
apply a decision tree to choose the optimal number of IDS’s to
be deployed on the mesh. The goal is to achieve prescribed
detection accuracy against the false alarm rate under the
premise of minimizing the system cost.
Collaborative IDS is designed among m IDS, S1, S2, Sm,
in order to get higher detection rate and lower false alarm rate.
The IDS assumed to be detect Independently. There exists a K
different type of intrusion. So according to deduce in the
following, we can get the detection rate and false alarm rate of
collaborative IDS. In order to evaluate it , we give the ROC
curve. Before transmitting data to the remote cloud, we
establish the collaborative IDS based on the cloudlet mesh to
44
complete the intrusion detection task. We use {S1, S2, . . . ,
Sm} to represent the set of IDS’s in the IDS (CIDS) .Suppose
that each IDS is able to detect intrusion independently. For the
sake of simplicity, we use I to indicate that there is intrusion
behaviour.
II. RELATED WORKS
M. S. Hossain et al., [1] the potential of cloud-supported
cyber-physical systems (CCPSs) has drawn a great deal of
interest from academia and industry. CCPSs facilitate the
seamless integration of devices in the physical world (e.g.,
sensors, cameras, microphones, speakers, and GPS devices)
with cyberspace. This enables a range of emerging
applications or systems such as patient or health monitoring,
which require patient locations to be tracked. These systems
integrate a large number of physical devices such as sensors
with localization technologies (e.g., GPS and wireless local
area networks) to generate, sense, analyse, and share huge
quantities of medical and user-location data for complex
processing. However, there are a number of challenges
regarding these systems in terms of the positioning of patients,
ubiquitous
access,
large-scale
computation,
and
communication. Hence, there is a need for an infrastructure or
system that can provide scalability and ubiquity in terms of
huge real-time data processing and communications in the
cyber or cloud space. To this end, this paper proposes a cloudsupported cyber-physical localization system for patient
monitoring using smartphones to acquire voice and
electroencephalogram signals in a scalable, real-time, and
efficient manner. The proposed approach uses Gaussian
mixture modelling for localization and is shown to outperform
other similar methods in terms of error estimation.
K. T. Pickard and M. Swan [2] Sharing personal health
information is essential to create next generation healthcare
services. To realize preventive and personalized medicine,
large numbers of consumers must pool health information to
create datasets that can be analysed for wellness and disease
trends. Incorporating this information will not only empower
consumers, but also enable health systems to improve patient
care. To date, consumers have been reluctant to share personal
health information for a variety of reasons, but attitudes are
shifting. Results from an online survey demonstrate a strong
willingness to share health information for research purposes.
Building on these results, the authors present a framework to
increase health information sharing based on trust, motivation,
community, and informed consent.
J. Yang, J. Li, J. Mulder, Y. Wang [3] The appropriate
collection and consumption of electronic health information
about an individual patient or population is the bedrock of
modern healthcare, where electronic medical records (EMR)
serve as the main carrier. This paper first introduces the main
goal of this special issue and gives a brief guideline. Then, the
present situation of the adoption of EMRs is reviewed. After
that, the emerging information technologies are presented
which have a great impact on the healthcare provision. These
include health sensing for medical data collection, medical
data analysis and utilization for accurate detection and
prediction. Next, cloud computing is discussed, as it may
ISSN 2277-5099 | © 2019 Bonfring
Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 2, April 2019
provide scalable and cost-effective delivery of healthcare
services. Accordingly, the current state of academic research
is documented on emerging information technologies for new
paradigms of healthcare service. At last, conclusions are made.
Y. Wu, M. Su, W. Zheng, K. Hwang [4] In a community
cloud, multiple user groups dynamically share a massive
number of data blocks. The authors present a new associative
data sharing method that uses virtual disks in the MeePo
cloud, a research storage cloud built at Tsinghua University.
Innovations in the MeePo cloud design include big data
metering, associative data sharing, data block prefetching,
privileged access control (PAC), and privacy preservation.
These features are improved or extended from competing
features implemented in DropBox, CloudViews, and
MySpace. The reported results support the effectiveness of the
MeePo cloud.
Kirti A. Dongre ; Roshan Singh Thakur [5] Cloud
computing is one of the upcoming technologies that will
upgrade generation of Internet. The data stored in the smart
phones is increased as more applications are deployed and
executed. If the phone is damaged or lost then the information
stored in it gets lost. If the cloud storage can be integrated for
regular data backup of a mobile user so that the risk of data
lost can be minimized. The user can stored data in the server
and retrieve them at anytime and from anywhere. The data
might be uncovered by attack during the retrieval or
transmission of data using wireless cloud storage without
proper authentication and protection. So to avoid this in this
paper we design a mechanism that provides a security
requirement for data storage of mobile phones.
X.Xue and W.B.Croft [6] propose a novel framework
where the original query is transformed into a distribution of
reformulated queries. A reformulated query is generated by
applying different operations including adding or replacing
query words, detecting phrase structures, and so on. Since the
reformulated query that involves a particular choice of words
and phrases is explicitly modelled, this framework captures
dependencies between those query components. On the other
hand, this framework naturally combines query segmentation,
query substitution and other possible reformulation operations,
where all these operations are considered as methods for
generating reformulated queries. In other words, a
reformulated query is the output of applying single or multiple
reformulation operations.
Jimeng Sun, Fei Wang, Jianying Hu, Shahram
Edabollahi[7] Patient similarity assessment is an important
task in the context of patient cohort identification for
comparative effectiveness studies and clinical decision support
applications. The goal is to derive clinically meaningful
distance metric to measure the similarity between patients
represented by their key clinical indicators. How to
incorporate physician feedback with regard to the retrieval
results? How to interactively update the underlying similarity
measure based on the feedback? Moreover, often different
physicians have different understandings of patient similarity
based on their patient cohorts. The distance metric learned for
each individual physician often leads to a limited view of the
true underlying distance metric. How to integrate the
45
individual distance metrics from each physician into a globally
consistent unified metric? We describe a suite of supervised
metric learning approaches that answer the above questions. In
particular, we present Locally Supervised Metric Learning
(LSML) to learn a generalized Mahalanobis distance that is
tailored toward physician feedback. Then we describe the
interactive metric learning (iMet) method that can
incrementally update an existing metric based on physician
feedback in an online fashion. To combine multiple similarity
measures from multiple physicians, we present Composite
Distance Integration (Comdi) method. In this approach we
first construct discriminative neighbourhoods from each
individual metrics, then combine them into a single optimal
distance metric. Finally, we present a clinical decision support
prototype system powered by the proposed patient similarity
methods, and evaluate the proposed methods using real EHR
data against several baselines.
A. Sajid and H. Abbas, [8] The widespread deployment
and utility of Wireless Body Area Networks (WBAN's) in
healthcare systems required new technologies like Internet of
Things (IoT) and cloud computing, that are able to deal with
the storage and processing limitations of WBAN's. This
amalgamation of WBAN-based healthcare systems to cloudbased healthcare systems gave rise to serious privacy concerns
to the sensitive healthcare data. Hence, there is a need for the
proactive identification and effective mitigation mechanisms
for these patient's data privacy concerns that pose continuous
threats to the integrity and stability of the healthcare
environment. For this purpose, a systematic literature review
has been conducted that presents a clear picture of the privacy
concerns of patient's data in cloud-assisted healthcare systems
and analysed the mechanisms that are recently proposed by the
research community. The methodology used for conducting
the review was based on Kitchenham guidelines. Results from
the review show that most of the patient's data privacy
techniques do not fully address the privacy concerns and
therefore require more efforts. The summary presented in this
paper would help in setting research directions for the
techniques and mechanisms that are needed to address the
patient's data privacy concerns in a balanced and light-weight
manner by considering all the aspects and limitations of the
cloud-assisted healthcare systems.
Sachchidanand Singh ; Nirmala Singh[8] Blockchain is
a decentralized ledger used to securely exchange digital
currency, perform deals and transactions. Each member of the
network has access to the latest copy of encrypted ledger so
that they can validate a new transaction. Blockchain ledger is a
collection of all Bitcoin transactions executed in the past.
Basically, it's a distributed database which maintains a
continuously growing tamper proof data structure blocks
which holds batches of individual transactions. The completed
blocks are added in a linear and chronological order. Each
block contains a timestamp and information link which points
to a previous block. Bitcoin is peer-to-peer permission-less
network which allows every user to connect to the network
and send new transaction to verify and create new blocks.
Satoshi Nakamoto described design of Bitcoin digital currency
in his research paper posted to cryptography listserv in 2008.
Nakamoto's suggestion has solved long pending problem of
ISSN 2277-5099 | © 2019 Bonfring
Bonfring International Journal of Software Engineering and Soft Computing, Vol. 9, No. 2, April 2019
cryptographers and laid the foundation stone for digital
currency. This paper explains the concept, characteristics,
need of Blockchain and how Bitcoin works. It attempts to
highlights role of Blockchain in shaping the future of banking,
financial institutions and adoption of Internet of Things(IoT).
III. METHODOLOGY
3.1 Client Data Encryption
We utilize the model presented in, and take the advantage
of NTRU to protect the client’s physiological data from being
leaked or abused. This scheme is to protect the user’s privacy
when transmitting the data from the smartphone to the
cloudlet.
3.2 Cloudlet based Data Sharing
Typically, users geographically close to each other connect
to the same cloudlet. It’s likely for them to share common
aspects, for example, patients suffer from similar kind of
disease exchange information of treatment and share related
data. For this purpose, we use users’ similarity and reputation
as input data. After we obtain users’ trust levels, a certain
threshold is set for the comparison. Once reaching or
exceeding the threshold, it is considered that the trust between
the users is enough for data sharing. Otherwise, the data will
not share with low trust level.
3.3 Remote Cloud Data Privacy Protection
Compared to user’s daily data in cloudlet, the data stored
in remote contain larger scale medical data, e.g., EMR, which
will be stored for a long term. We use the methods presented
to divide EMR into explicit identifier (EID), quasi-identifier
(QID) and medical information (MI). After classifying, proper
protection is given for the data containing users’ sensitive
information.
3.4 Collaborative Ids based on Cloudlet Mesh
There is a vast volume of medical data stored in the remote
cloud, it is critical to apply security mechanism to protect the
database from malicious intrusions. In this paper, we develop
specific countermeasures to establish a defence system for the
large medical database in the remote cloud storage.
Specifically, collaborative IDS based on the cloudlet mesh
structure is used to screen any visit to the database as a
protection border. If the detection shows a malicious intrusion
in advance, the collaborative IDS will fire an alarm and block
the visit, and vice-versa. The collaborative IDS, as a guard of
the cloud database, can protect a vast number of medical data
and make sure of the security of the database.
46
IV. CONCLUSION
In this paper, we investigated the problem of privacy
protection and sharing large medical data in cloudlets and the
remote cloud. We developed a system which does not allow
users to transmit data to the remote cloud in consideration of
secure collection of data, as well as low communication cost.
However, it does allow users to transmit data to a cloudlet,
which triggers the data sharing problem in the cloudlet.
Firstly, we can utilize wearable devices to collect users’ data,
and in order to protect users privacy, we use NTRU
mechanism to make sure the transmission of users’ data to
cloudlet in security. Secondly, for the purpose of sharing data
in the cloudlet, we use trust model to measure users trust level
to judge level to share data or not. Thirdly, for privacypreserving of remote cloud data, we partition the data stored in
the remote cloud and encrypt the data in different ways, so as
to not just ensure data protection but also accelerate the
efficacy of transmission. Finally, we propose collaborative
IDS based on cloudlet mesh to protect the whole system with
block chain technology. The proposed schemes are validated
with simulations and experiments.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
M.S. Hossain, “Cloud-supported cyber–physical localization framework
for patients monitoring”, IEEE Systems Journal, Vol. 11, No. 1, Pp. 118127, 2015.
K.T. Pickard and M. Swan, “Big desire to share big health data: A shift
in consumer attitudes toward personal health information”, In AAAI
Spring Symposium Series, 2014.
M.S. Hossain, G. Muhammad, M.F. Alhamid, B. Song and K. AlMutib,
“Audio-visual emotion recognition using big data towards 5g”, Mobile
Networks and Applications, Pp. 1–11, 2016.
J.J. Yang, J. Li, J. Mulder, Y. Wang, S. Chen, H. Wu, Q. Wang and H.
Pan, “Emerging information technologies for enhanced healthcare”,
Computers in Industry, Vol. 69, Pp. 3–11, 2015.
D. Nunez, I. Agudo and J. Lopez, “Ntrureencrypt: An efficient proxy ˜
re-encryption scheme based on ntru”, In Proceedings of the 10th ACM
Symposium on Information, Computer and Communications Security,
Pp. 179–189, 2015.
Y. Wu, M. Su, W. Zheng, K. Hwang and A. Y. Zomaya, “Associative
big data sharing in community clouds: The meepo approach”, IEEE
Cloud Computing, Vol. 2, No. 6, Pp. 64–73, 2015.
W. Xiang, G. Wang, M. Pickering and Y. Zhang, “Big video data for
light-field-based 3d telemedicine”, IEEE Network, Vol. 30, No. 3, Pp.
30– 38, 2016.
K. He, J. Chen, R. Du, Q. Wu, G. Xue and X. Zhang, “Deypos:
Deduplicatable dynamic proof of storage for multi-user environments”,
IEEE Transactions on Computers, Vol. 65, No. 12, Pp. 3631-3645,
2016.
ISSN 2277-5099 | © 2019 Bonfring