Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks
- 1 July 2012
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
There has been a host of research works on wireless sensor networks for medical applications. However, the major shortcoming of these efforts is a lack of consideration of data management. Indeed, the huge amount of high sensitive data generated and collected by medical sensor networks introduces several challenges that existing architectures cannot solve. These challenges include scalability, availability and security. In this paper, we propose an innovative architecture for collecting and accessing large amount of data generated by medical sensor networks. Our architecture resolves all the aforementioned challenges and makes easy information sharing between healthcare professionals. Furthermore, we propose an effective and flexible security mechanism that guarantees confidentiality, integrity as well as fine grained access control to outsourced medical data. This mechanism combines several cryptographic schemes to achieve high flexibility and performance.Keywords
This publication has 16 references indexed in Scilit:
- ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computingInternational Journal of Security and Networks, 2011
- Wireless sensor networks for healthcare: A surveyComputer Networks, 2010
- Data security and privacy in wireless body area networksIEEE Wireless Communications, 2010
- Secure and efficient access to outsourced dataPublished by Association for Computing Machinery (ACM) ,2009
- Patient controlled encryptionPublished by Association for Computing Machinery (ACM) ,2009
- Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utilityFuture Generation Computer Systems, 2009
- Secure management of personal health records by applying attribute-based encryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Ciphertext-Policy Attribute-Based EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006
- Fuzzy Identity-Based EncryptionLecture Notes in Computer Science, 2005