z-logo
open-access-imgOpen Access
Enhancing the Security and Privacy of WBAN-Based Distributed Storage Systems
Author(s) -
Sufyan Al-Janabi,
Ali Dawood,
A. Salman
Publication year - 2015
Publication title -
govarî zankoy geşepedanî miroyî
Language(s) - English
Resource type - Journals
eISSN - 2411-7765
pISSN - 2411-7757
DOI - 10.21928/juhd.v1n2y2015.pp288-294
Subject(s) - computer science , authentication (law) , computer network , body area network , computer security , reliability (semiconductor) , single point of failure , cryptography , confidentiality , cryptographic primitive , distributed data store , wireless sensor network , cryptographic protocol , power (physics) , physics , quantum mechanics
The sensors of a Wireless Body Area Network (WBAN) that are spread inside and outside of a human body collect medical information and transfer it into the back-end server that is managed by the hospital or medical center; where the professionals analyze this data. This server is considered a very critical device because it has sensitive information. Therefore, the security and privacy of that server must be defended. Networked storage systems have become an efficient way to use in WBAN. It can be divided into two types: Centralized storage systems and Distributed Storage Systems (DSSs). Storing data at a single server is simple way but it can lead to a single point of failure (whether being a normal failure or due to security attacks). On the other hand, the structure of DSS can tolerate the openness and failure. In this paper, enhanced security and privacy DSS system is developed using public key cryptography to store patient information. The storage of information is distributed among individual nodes spread in the network and simultaneously the security requirements (like confidentiality, reliability, authentication, and dynamic integrity) are achieved by utilizing more powerful algorithms. The main phases of operation of the proposed system are described. Also, the results of system prototype simulation are discussed at the end of the paper.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here