Visible to the public Environment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing

TitleEnvironment Aware Privacy-Preserving Authentication with Predictability for Medical Edge Computing
Publication TypeConference Paper
Year of Publication2019
AuthorsZhang, Shuaipeng, Liu, Hong
Conference Name2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)
Date Publishedoct
Keywordsauthorisation, biomedical communication, communication channel, Computing Theory and Privacy, cryptographic protocols, data privacy, Data security, distributed processing, edge computing, edge computing health monitoring system, edge computing unit, elliptic curve, Elliptic curve cryptography, environment aware privacy-preserving authentication protocol, environment equality, environmental assessment, environmental prediction, fuzzy extractor, fuzzy set theory, fuzzy synthetic evaluation model, Health monitoring system, Human Behavior, medical edge computing, mutual authentication, privacy preservation, privacy protection, pubcrawl, public key cryptography, Resiliency, resource-limited smart devices, Scalability, secure communication, security analysis, smart health monitoring system, temporal health index
AbstractWith the development of IoT, smart health has significantly improved the quality of people's life. A large amount of smart health monitoring system has been proposed, which provides an opportunity for timely and efficient diagnosis. Nevertheless, most of them ignored the impact of environment on patients' health. Due to the openness of the communication channel, data security and privacy preservation are crucial problems to be solved. In this work, an environment aware privacy-preserving authentication protocol based on the fuzzy extractor and elliptic curve cryptography (ecc) is designed for health monitoring system with mutual authentication and anonymity. Edge computing unit can authenticate all environmental sensors at one time. Fuzzy synthetic evaluation model is utilized to evaluate the environment equality with the patients' temporal health index (THI) as an assessment factor, which can help to predict the appropriate environment. The session key is established for secure communication based on the predicted result. Through security analysis, the proposed protocol can prevent common attacks. Moreover, performance analysis shows that the proposed protocol is applicable for resource-limited smart devices in edge computing health monitoring system.
DOI10.1109/CyberC.2019.00024
Citation Keyzhang_environment_2019