• Frontiers of Optoelectronics
  • Vol. 15, Issue 3, 12200 (2022)
Weiping Ye1、2、3、4, Jia Wang1、2、3、4, Hui Tian1、2、3、4、*, and Hanyu Quan1、3、4
Author Affiliations
  • 1College of Computer Science and Technology, Huaqiao University, Xiamen 361021, China
  • 2Wuhan National Laboratory for Optoelectronics, Wuhan 430074, China
  • 3Xiamen Key Laboratory of Data Security and Blockchain Technology, Xiamen 361021, China
  • 4Fujian Key Laboratory of Big Data Intelligence and Security, Xiamen 361021, China
  • show less
    DOI: 10.1007/s12200-022-00028-1 Cite this Article
    Weiping Ye, Jia Wang, Hui Tian, Hanyu Quan. Public auditing for real-time medical sensor data in cloud-assisted HealthIIoT system[J]. Frontiers of Optoelectronics, 2022, 15(3): 12200 Copy Citation Text show less
    References

    [1] Al-Turjman, F., Alturjman, S.: Context-sensitive access in industrial internet of things (IIoT) healthcare applications. IEEE Trans. Ind. Inf. 14(6), 2736–2744 (2018)

    [2] Miao, Y., Tong, Q., Choo, K.K.R., Liu, X., Deng, R.H., Li, H.: Secure online/offline data sharing framework for cloud-assisted industrial internet of things. IEEE Internet Things J. 6(5), 8681–8691 (2019)

    [3] Huang, H., Gong, T., Ye, N., Wang, R., Dou, Y.: Private and secured medical data transmission and analysis for wireless sensing healthcare system. IEEE Trans. Ind. Inf. 13(3), 1227–1237 (2017)

    [4] Sun, J., Chen, D., Zhang, N., Xu, G., Tang, M., Nie, X., Cao, M.: A privacy-aware and traceable fine-grained data delivery system in cloud-assisted healthcare IIoT. IEEE Internet Things J. 8(12), 10034–10046 (2021)

    [5] Hao, J., Jayachandran, M., Kng, P.L., Foo, S.F., Aung Aung, P.W., Cai, Z.: FBG-based smart bed system for healthcare applications. Front. Optoelectron. 3(1), 78–83 (2010)

    [6] Zahid, M.N., Jiang, J., Rizvi, S.: Reflectometric and interferometric fiber optic sensor’s principles and applications. Front. Optoelectron. 12(2), 215–226 (2019)

    [7] Uddin,T., Borhan Uddin, M., Muzahidul Islam, A.K.M., Islam, S., Shatabda, S.: Application of internet of things for early detection of COVID-19 using wearables. In: Proceeding of 2021 International Conference on Software Engineering & Computer Systems and 4th International Conference on Computational Science and Information Management (ICSECS-ICOCSIM). pp. 405–410 (2021)

    [8] Zhang, M., Chu, R., Dong, C., Wei, J., Lu, W., Xiong, N.: Residual learning diagnosis detection: an advanced residual learning diagnosis detection system for COVID-19 in industrial internet of things. IEEE Trans. Ind. Inf. 17(9), 6510–6518 (2021)

    [9] Lee, C.C., Chen, S.D., Li, C.T., Cheng, C.L., Lai, Y.M.: Security enhancement on an RFID ownership transfer protocol based on cloud. Futur. Gener. Comput. Syst. 93, 266–277 (2019)

    [10] Botta, A., Donato, W., Persico, V., Pescapé, A.: Integration of cloud computing and internet of things: a survey. Futur. Gener. Comput. Syst. 56, 684–700 (2016)

    [11] Doukas, C., Maglogiannis, I.: Bringing IoT and cloud computing towards pervasive healthcare. In: Proceeding of 2012 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. pp. 922–926 (2012)

    [12] Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Healing on the cloud: secure cloud architecture for medical wireless sensor networks. Futur. Gener. Comput. Syst. 55, 266–277 (2016)

    [13] Lee, C.C.: Security and privacy in wireless sensor networks: advances and challenges. Sensors (Basel) 20(3), 744 (2020)

    [14] Zhang, X., Zhao, J., Xu, C., Li, H., Wang, H., Zhang, Y.: CIPPPA: conditional identity privacy-preserving public auditing for cloud-based WBANs against malicious auditors. IEEE Trans. Cloud Comput. 9(4), 1362–1375 (2021)

    [15] Brandenburger, M., Cachin, C., Knezevic, N.: Don’t trust the cloud, verify: integrity and consistency for cloud object stores. ACM Trans. Priv. Secur. 20(3), 1–30 (2017)

    [16] Hwang, M.S., Sun, T.H., Lee, C.C.: Achieving dynamic data guarantee and data confidentiality of public auditing in cloud storage service. J. Circuits Syst. Comput. 26(5), 1750072 (2017)

    [17] Yan, H., Li, J., Zhang, Y.: Remote data checking with a designated verifier in cloud storage. IEEE Syst. J. 14(2), 1788–1797 (2020)

    [18] Thangavel, M., Varalakshmi, P., Preethi, T., Renganayaki, S., Subhapriya, G.R., Banu A.Z.: A review on public auditing in cloud environment. In: Proceeding of 2016 International Conference on Information Communication and Embedded Systems (ICICES). pp. 1–6 (2016)

    [19] Tian, H., Chen, Y., Jiang, H., Huang, Y., Nan, F., Chen, Y.: Public auditing for trusted cloud storage services. IEEE Secur. Priv. 17(1), 10–22 (2019)

    [20] Jaya Rao, G., Pasupuleti, S.K., Kandukuri, R.: Review of remote data integrity auditing schemes in cloud computing: taxonomy, analysis, and open issues. Proc. Int. J. Cloud Comput. 8(1), 20–49 (2019)

    [21] Juels, A., Kaliski, B.S.Jr.: PORs: proofs of retrievability for large files. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. pp. 584–597 (2007)

    [22] Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. pp. 598–609 (2007)

    [23] Erway, C.C., Küpcü, A., Papamanthou, C., Tamassia, R.: Dynamic provable data possession. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. pp. 213–222 (2009)

    [24] Wang, Q., Wang, C., Li, J., Ren, K., Lou, W.: Enabling public verifiability and data dynamics for storage security in cloud computing. In: Proceedings of European Symposium on Research in Computer Security. pp. 355–370 (2009)

    [25] Zhu, Y., Ahn, G., Hu, H., Yau, S.S., An, H.G., Hu, C.J.: Dynamic audit services for outsourced storages in clouds. IEEE Trans. Serv. Comput. 6(2), 227–238 (2013)

    [26] Tian, H., Chen, Y., Chang, C.C., Jiang, H., Huang, Y., Chen, Y., Liu, J.: Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans. Serv. Comput. 10(5), 701–714 (2017)

    [27] Wang, C., Chow, S.S.M., Wang, Q., Ren, K., Lou, W.: Privacypreserving public auditing for secure cloud storage. IEEE Trans. Comput. 62(2), 362–375 (2013)

    [28] Yang, K., Jia, X.: An efficient and secure dynamic auditing protocol for data storage in cloud computing. IEEE Trans. Parallel Distrib. Syst. 24(9), 1717–1726 (2013)

    [29] Wang, B., Li, B., Li, H.: Oruta: privacy-preserving public auditing for shared data in the cloud. IEEE Trans. Cloud Comput. 2(1), 43–56 (2014)

    [30] Yang, G., Yu, J., Shen, W., Su, Q., Fu, Z., Hao, R.: Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability. J. Syst. Softw. 113, 130–139 (2016)

    [31] Tian, H., Nan, F., Jiang, H., Chang, C.C., Ning, J., Huang, Y.: Public auditing for shared cloud data with efficient and secure group management. Inf. Sci. 472, 107–125 (2019)

    [32] Wang, B., Li, B., Li, H., Li, F.: Certificateless public auditing for data integrity in the cloud. In: Proceedings of 2013 IEEE Conference on Communications and Network Security (CNS). pp. 136–144 (2013)

    [33] He, D., Zeadally, S., Wu, L.: Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst. J. 12(1), 64–73 (2018)

    [34] Li, J., Yan, H., Zhang, Y.: Certificateless public integrity checking of group shared data on cloud storage. IEEE Trans. Serv. Comput. 14(1), 71–81 (2021)

    [35] Even, S., Goldreich, O., Micali, S.: On-line/off-line digital signatures. J. Cryptol. 9(1), 35–67 (1996)

    [36] Li, J., Zhang, L., Liu, J.K., Qian, H., Dong, Z.: Privacy-preserving public auditing protocol for low-performance end devices in cloud. IEEE Trans. Inf. Forensics Secur. 11(11), 2572–2583 (2016)

    [37] Wang, Y., Wu, Q., Qin, B., Tang, S., Susilo, W.: Online/offline provable data possession. IEEE Trans. Inf. Forensics Secur. 12(5), 1182–1194 (2017)

    [38] Zhang, F., Safavi-Naini, R., Susilo, W.: An efficient signature scheme from bilinear pairings and its applications. In: International Workshop on Public Key Cryptography. pp. 277–290 (2004)

    [39] Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptol. 17(4), 297–319 (2004)

    Weiping Ye, Jia Wang, Hui Tian, Hanyu Quan. Public auditing for real-time medical sensor data in cloud-assisted HealthIIoT system[J]. Frontiers of Optoelectronics, 2022, 15(3): 12200
    Download Citation