Enhancing the Security and Privacy of WBAN-Based Distributed Storage Systems
DOI:
https://doi.org/10.21928/juhd.v1n2y2015.pp288-294Keywords:
distributed storage, privacy, security, sensors, WBAN, wireless networksAbstract
The sensors of a Wireless Body Area Network (WBAN) that are spread inside and outside of a human body collect medical information and transfer it into the back-end server that is managed by the hospital or medical center; where the professionals analyze this data. This server is considered a very critical device because it has sensitive information. Therefore, the security and privacy of that server must be defended. Networked storage systems have become an efficient way to use in WBAN. It can be divided into two types: Centralized storage systems and Distributed Storage Systems (DSSs). Storing data at a single server is simple way but it can lead to a single point of failure (whether being a normal failure or due to security attacks). On the other hand, the structure of DSS can tolerate the openness and failure. In this paper, enhanced security and privacy DSS system is developed using public key cryptography to store patient information. The storage of information is distributed among individual nodes spread in the network and simultaneously the security requirements (like confidentiality, reliability, authentication, and dynamic integrity) are achieved by utilizing more powerful algorithms. The main phases of operation of the proposed system are described. Also, the results of system prototype simulation are discussed at the end of the paper.
References
[2] Chessa and P. Maestrini, "Dependable and Secure Data Storage and Retrieval in Mobile, Wireless Networks", International Conference on Dependable Systems and Networks, 2003.
[3] Oliver Schneider, "Trust Aware Social Networking: A Distributed Storage System based on Social Trust and Geographical Proximity", Diplom Thesis, FU Berlin, Berlin, Germany, January 22, 2009.
[4] Salim El Rouayheb, Kannan Ramchandran," Fractional Repetition Codes for Repair in Distributed Storage Systems," arXiv:1010.2551v1 [cs.IT], 2010
[5] Sameer Pawar, Salim El Rouayheb, Kannan Ramchandran," Securing Dynamic Distributed Storage Systems against Eavesdropping and Adversarial Attacks", IEEE Transactions on Information Theory, pp. 6734-6753, 2011.
[6] Alexandros G. Dimakis, P. Brighten Godfrey, Martin J. Wainwright ,Kannan Ramchandran, "The Benefits of Network Coding for Peer-to-Peer Storage Systems", Third Workshop on Network Coding, Theory, and Applications, January 2007.
[7] Tanakorn Chareonvisal, "Implementing Distributed Storage System by Network Coding in Presence of Link Failure", Master Thesis, School of Electrical Engineering Kungliga Tekniska Högskolan Stockholm, Sweden, September 2012.
[8] Frederique Oggier, Anwitaman Datta" Self-repairing Homomorphic Codes for Distributed Storage Systems", Infocom 2011, The 30th IEEE International Conference on Computer Communications, July 2010.
[9] Rudi Ball, James Grant, Jonathan So, Victoria Spurrett, and Rogério de Lemos, "Dependable and Secure Distributed Storage System for Ad Hoc Networks", Lecture Notes in Computer Science, Volume 4686, pp. 142-152, Springer-Verlag, Berlin Heidelberg, 2007.
[10] Qian Wang, Kui Ren, Wenjing Lou, and Yanchao Zhang, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance", IEEE INFOCOM, 2009.
[11] Y. S. Han, S. Omiwade, and R. Zheng, "Progressive Data Retrieval for Distributed Networked Storage", IEEE Conference on Parallel and Distributed Systems, 2012.
[12] Lluis Pamies-Juarez, Frédérique Oggier, and Anwitaman Datta, "Decentralized Erasure Coding for Efficient Data Archival in Distributed Storage Systems", Proceedings of the 14th International Conference on Distributed Computing and Networking (ICDCN), 2013.
[13] William Stallings, Cryptography and Network Security Principles and Practices, Fifth Edition, Prentice-Hall, 2011.
[14] Avik Sengupta, "Redundant Residue Number System Based Space-Time Block Codes", Thesis, Kansas State University, Manhattan, Kansas, 2012.
[15] K. Amusa and E. Nwoye, "Novel Algorithm For Decoding Redundant Residue Number Systems (RRNS) Codes", IJRRAS, July 2012.
[16] Narendran Narayanaswamy, "Optimization of New Chinese Remainder Theorems Using Special Moduli Sets", Thesis, Louisiana State University, December 2010.