A secure biomedical data sharing framework based on mCloud

Document Type : Research Paper


Computer Center, University Of Anbar, Iraq.


Medical Clouds (mCloud) utilized various wearable devices and sensors for better care for patients by encouraging the perspective of the clouds. It gives a more versatile way to centrally and in real-time compare the patients’ profiles in the conventional health-offline system. However, due to the lack of appropriate security measures in low-power computers, there are obstacles to data protection. The limitation made the data vulnerable to hacking and tamper when it transfers from one device to another. In available solutions, the devices send unencrypted data to a central server where it encrypts and forwards, on-demand, to requesting devices. There are two primary challenges in the approach: first, the data link is still vulnerable between the source device and central server; second, the response time of the server gets slower with an increasing number of devices. This manuscript proposes a secure and faster-distributed method, which shares a patient’s data by various devices connected to the mCloud with health caregivers without the need for the centralized server. The research harnesses the power of other locally available mCloud and related devices that have more computational capability. Our experimental results demonstrate that with the number increasing of mCloud devices on the network, the percentage of encrypted data transmissions also increase since there are more chances to find a nearby secure device. Results further shows a decrease in the total response time from 0.6ms to 0.4ms utilizing the proposed distributed vs centralized system.


[1] A. S. Abdulbaqi, S. A. D. M. Najim, S. M. Al-barizinji and I. Y. Panessai, A Secured System for Tele Cardiovascular
Disease Monitoring. In Computational Vision and Bio-Inspired Computing, Springer, Singapore, 2021, pp. 209-222.
[2] A. S. Abdulbaqi, S. A. D. M. Najim and R. H. Mahdi, Robust multichannel EEG signals compression model based
on hybridization technique, International Journal of Engineering and Technology, 7(4) (2018) 3402-3405.
[3] A. S. Abdulbaqi, A. J. Obaid and S. A. H. Alazawi, A Smart System for Health Caregiver Based on IoMT: Toward
Tele-Health Caregiving, iJOE, 17(07) 71, 2021.
[4] A. S. Abdulbaqi, E. S. Yousif and S. Al-din, Virtual Environments Utilization for ECG Signals Analysis and
Evaluation: Towards Heart Condition Assessment, In IOP Conference Series: Materials Science and Engineering,
IOP Publishing, November, 928(3), 2020, p. 032031.
[5] M. Ahmad, M. B. Amin, S. Hussain, B. H. Kang, T. Cheong and S. Lee, Health Fog: a novel framework for health
and wellness applications, Journal of Supercomputing, 72(10) (2016) 3677-3695. https://doi.org/10.1007/s11227-
[6] S. Alam, M. M. R. Chowdhury and J. Noll, Interoperability of security-enabled internet of things, Wireless Personal
Communications, 61(3) (2011) 567-586.
[7] S. Alasmari, M. Anwar, Security and privacy challenges in IoT-based health cloud, International Conference on
Computational Science and Computational Intelligence (CSCI), (2016) 198-201.
[8] E. Alkeem, D. Shehada, C. Y. Yeun, M. J. Zemerly and J. Hu, New secure healthcare system using cloud of things,
Cluster Computing, 20(3) (2017) 2211-2229. https://doi.org/10.1007/s10586-017-0872-x.
[9] F. Alsubaee, A. Abuhussein and S. Shiva, Security and privacy in the internet of medical things: taxonomy and risk
assessment, IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops), (2017) 112-120.
[10] M. M. Alzghoul, Towards Nationwide Electronic Health Record System in Jordan, 2016, 650-655.
[11] A. N. Baccarini, K. N. Griggs, E. A. Howson, O. Ossipova, T. Hayajneh and C. P. Kohlios, Healthcare Blockchain
System Using Smart Contracts for Secure Automated Remote Patient Monitoring, Journal of Medical Systems,
42(7) (2018) 1-7, https://doi.org/10.1007/s10916-018-0982-x.
[12] C. Bradley, S. El-Tawab and M. H. Heydari, Security analysis of an IoT system used for indoor localization in
healthcare facilities, Systems and Information Engineering Design Symposium (SIEDS), (2018) 147-152.
[13] S. Chen, D. L. Chiang, C. Liu, T. Chen, F. Lai, H. Wang and W. Wei, Confidentiality Protection of Digital Health
Records in Cloud Computing, Journal of Medical Systems, 2016, https://doi.org/10.1007/s10916-016-0484-7.
[14] M. Chiang and T. Zhang, Fog and IoT: An overview of research opportunities, IEEE Internet of Things Journal,
3(6) (2016) 854-864.
[15] K. Chung and R. C. Park, PHR open platform based smart health service using distributed object group framework,
Cluster Computing, 19(1) (2016) 505-517.[16] A. Ekblaw, A. Azaria, J. D. Halamka and A. Lippman, A Case Study for Blockchain in Healthcare:”MedRec”
prototype for electronic health records and medical research data, Proceedings of IEEE Open & Big Data Conference,
13, 13, August 2016.
[17] M. H. Ellewe, A. M. Sagheer and A. S. Abdulbaqi, A New Medical Images Encryption algorithm Based on Gold
Code: Futures Trends Towards Telemedicine, In IOP Conference Series: Materials Science and Engineering, IOP
Publishing, 928(3), November 2020, p. 032032.
[18] S. Ghanavati, J. H. Abawajy, D. Izadi and A. A. Alelaiwi, Cloud-assisted IoT-based health status monitoring
framework, Cluster Computing, 20(2) (2017) 1843-1853. https://doi.org/10.1007/s10586-017-0847-y.
[19] M. M. Hossain, M. Fotouhi and R. Hasan, Towards an analysis of security issues, challenges and open problems
in the internet of things, 2015 IEEE World Congress on Services, (2015) 21-28.
[20] M. S. Hossain and G. Muhammad, Cloud-assisted industrial internet of things (iiot)-enabled framework for health
monitoring, Computer Networks, 101 (2016) 192- 202.
[21] M. N. Jain, Security And Privacy Optimization And Service Provider Selection For Cloud Computing For Small
And Medium Educational Institutions, Turkish Journal of Computer and Mathematics Education, TURCOMAT,
12(10) (2021) 3753-3762.
[22] Z. Lie, X. Huang, Z. Hu, M. K. Khan, H. Seo and L. Zhou, On Emerging Family of Elliptic
Curves to Secure Internet of Things: Elliptic Curve Cryptography Comes of Age, XX(XX), (2016) 1-12,
https://doi.org/10.1109/TDSC.2016.257702 2.
[23] Y. Ma, Y. Wang, J. U. N. Yang and Y. Miao, Big Health Application System based on Health Internet of Things
and Big Data, (2017) 7885-7897.
[24] S. R. Oh and Y. G. Kim, Security requirements analysis for the IoT, International Conference on Platform
Technology and Service (PlatCon), (2017) 1-6.
[25] A. P. Oladeji and A. Olubunmi, Data Offloading Security Framework in MCLOUD, Journal of Computer Sciences
and Applications, 5(1) (2017) 25-28.
[26] Y. Rahulamathavan, R. C. W. Phan, M. Rajarajan, S. Misra and A. Kondoz, Privacy-preserving blockchain
based IoT ecosystem using attribute-based encryption, IEEE International Conference on Advanced Networks and
Telecommunications Systems (ANTS), 2017, 1-6.
[27] Y. B. Saied, A. Olivereau, D. Zeghlache and M. Laurent, Trust management system design for the Internet of
Things: A context-aware and multi-service approach, Computers & Security, 39 (2013) 351-365.
[28] D. S´anchez and A. Viejo, Personalized privacy in open data sharing scenarios, Online Information Review, 2017.
[29] S. Singh, P. K. Sharma, S. Y. Moon and J. H. Park, Advanced lightweight encryption algorithms for IoT devices:
survey, challenges and solutions, Journal of Ambient Intelligence and Humanized Computing, (2017) 1-18.
[30] G. S. Tamizharasi, IoT-Based E- Health System Security?: A Vision Archictecture Elements and Future Directions, (2017) 655-661.
[31] M. Vucinic, B. Tourancheau, F. Rousseau, A. Duda, L. Damon and R. Guizzetti, OSCAR: Object security
architecture for the Internet of Things, Proceeding of IEEE International Symposium on a World of Wireless,
Mobile and Multimedia Networks 2014, WoWMoM 2014. https://doi.org/10.1109/WoWMoM.2014.69 , 18975.
[32] P. A. H. Williams and V. McCauley, Always connected: The security challenges of the healthcare Internet of
Things, IEEE 3rd World Forum on Internet of Things (WF-IoT), (2016) 30-35.
[33] M.Wolfson, S. E. Wallace, N. Masca, G Rowe, N. A. Sheehan, V. Ferretti and P. R. Burton, DataSHIELD:
resolving a conflict in contemporary bioscience-performing a pooled analysis of individual-level data without sharing
the data, International journal of epidemiology, 39(5) (2010) 1372-1382.
[34] Y. Yang, X. Zheng and C. Tang, Lightweight distributed secure data management system for health internet of
things, Journal of Network and Computer Applications, 89 (2017) 26-37.
[35] E. S. Yousif, A. S. Abdulbaqi, A. Z. Hameed and S. Al-din, Electroencephalogram Signals Classification Based
on Feature Normalization, In IOP Conference Series: Materials Science and Engineering, IOP Publishing, 928(3),
November 2020, p. 032028.
[36] T. Zachariah, N. Klugman, B. Campbell, J. Adkins, N. Jackson and P. Dutta, The internet of things has a
gateway problem, HotMobile 2015 - 16th International Workshop on Mobile Computing Systems and Applications,
2015, 27- 32. https://doi.org/10.1145/2699343.2699344.
[37] J. Zeng, Z. Long, G. Shen, L. Wei and Y. Song, MCloud: Efficient Monitoring Framework for Cloud Computing
Platforms, In International Conference on Security, Privacy and Anonymity in Computation, Communication and
Storage, Springer, Cham, December 2017, pp. 409-419.
Volume 12, Issue 2
November 2021
Pages 1659-1671
  • Receive Date: 18 April 2021
  • Revise Date: 13 May 2021
  • Accept Date: 06 June 2021