z-logo
open-access-imgOpen Access
Algebraic secret sharing using privacy homomorphisms for IoT-basedhealthcare systems
Author(s) -
Ching-Chun Chang,
Chang-Tsun Li
Publication year - 2019
Publication title -
mathematical biosciences and engineering
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.451
H-Index - 45
eISSN - 1551-0018
pISSN - 1547-1063
DOI - 10.3934/mbe.2019168
Subject(s) - computer science , secret sharing , collusion , computer security , encryption , cloud computing , health care , data sharing , server , verifiable secret sharing , information privacy , internet privacy , cryptography , world wide web , business , set (abstract data type) , law , medicine , alternative medicine , pathology , industrial organization , political science , programming language , operating system
Healthcare industry is one of the promising fields adopting the Internet of Things (IoT) solutions. In this paper, we study secret sharing mechanisms towards resolving privacy and security issues in IoT-based healthcare applications. In particular, we show how multiple sources are possible to share their data amongst a group of participants without revealing their own data to one another as well as the dealer. Only an authorised subset of participants is able to reconstruct the data. A collusion of fewer participants has no better chance of guessing the private data than a non-participant who has no shares at all. To realise this system, we introduce a novel research upon secret sharing in the encrypted domain. In modern healthcare industry, a patient's health Article often contains data acquired from various sensor nodes. In order to protect information privacy, the data from sensor nodes is encrypted at once and shared among a number of cloud servers of medical institutions via a gateway device. The complete health Article will be retrieved for diagnosis only if the number of presented shares meets the access policy. The retrieval procedure does not involve decryption and therefore the scheme is favourable in some time-sensitive circumstances such as a surgical emergency. We analyse the pros and cons of several possible solutions and develop practical secret sharing schemes for IoT- based healthcare systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here