IEEE Access (Jan 2023)

Secure Medical Data Against Unauthorized Access Using Decoy Technology in Distributed Edge Computing Networks

  • Imran Khan,
  • Anwar Ghani,
  • Syed Muhammad Saqlain,
  • Muhammad Usman Ashraf,
  • Abdulrahman Alzahrani,
  • Do-Hyeun Kim

DOI
https://doi.org/10.1109/ACCESS.2023.3344168
Journal volume & issue
Vol. 11
pp. 144560 – 144573

Abstract

Read online

The recent advancements in cyber technology have facilitated the global electronic sharing of healthcare data among various healthcare professionals, including clinicians, researchers, business administrators, and others. Fog computing is gaining popularity as a means of disseminating information across industries, especially in medicine and healthcare, due to its capability to manage vast amounts of information and data. The evolution of fog computing now allows it to be adaptable to various budget constraints within healthcare organizations, thanks to technological progress. This adaptation includes features like real-time data breach alerts and automated surveillance. As new communication and computing models emerge, fresh security and privacy concerns arise within medical and health-related data. Existing data privacy and security protocols have proven inadequate in preventing data leaks and theft attacks, especially those orchestrated by malicious parties. While medical data is stored in the cloud, legitimate entities’ authorized access to medical documents remains a significant concern. Therefore, this article designs an authentication and authorization scheme that safeguards the privacy of users’ medical information documents. In response to this challenge, we propose an innovative approach that leverages Decoy information technology and User Behavior profiling. This methodology aims to enhance the security of authorized data access within the Fog environment, ensuring the confidentiality of medical data. The results show that the proposed protocol is more secure against unauthorized access and security attacks and more computationally efficient than its counterparts.

Keywords