| Literature DB >> 30857140 |
Jingjing Gu1, Ruicong Huang2, Li Jiang3, Gongzhe Qiao4, Xiaojiang Du5, Mohsen Guizani6.
Abstract
Intelligent medical service system integrates wireless internet of things (WIoT), including medical sensors, wireless communications, and middleware techniques, so as to collect and analyze patients' data to examine their physical conditions by many personal health devices (PHDs) in real time. However, large amount of malicious codes on the Android system can compromise consumers' privacy, and further threat the hospital management or even the patients' health. Furthermore, this sensor-rich system keeps generating large amounts of data and saturates the middleware system. To address these challenges, we propose a fog computing security and privacy protection solution. Specifically, first, we design the security and privacy protection framework based on the fog computing to improve tele-health and tele-medicine infrastructure. Then, we propose a context-based privacy leakage detection method based on the combination of dynamic and static information. Experimental results show that the proposed method can achieve higher detection accuracy and lower energy consumption compared with other state-of-art methods.Entities:
Keywords: Android; context information; fog computing; intelligent medical service; privacy leakage detection
Mesh:
Year: 2019 PMID: 30857140 PMCID: PMC6427819 DOI: 10.3390/s19051184
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Healthcare devices.
Figure 2Three-layer architecture.
Figure 3Logical architecture of fog computing for the healthcare network.
Figure 4Framework of privacy leakage detection.
Figure 5Frame of static privacy leakage analysis mechanism.
Some sensitive privacy-related API functions.
| Classification | Example | API |
|---|---|---|
| Device Resource | GPS | getLatitude, getLongitude |
| System Infomation | IMEI | getDeviceId |
| Login Data | Password | getPasswd |
| User Data | StepCount | stepListener |
| User Data | SleepStatus | sleepListener |
| User Data | Heartbeat | heartListener |
Figure 6Dynamic privacy leakage monitoring.
Figure 7Proportion of privacy leakage types.
Entry point statistics for privacy leakages.
| Entrypoint | Lifecycle Method | System Event | UI Event |
|---|---|---|---|
| Proportion | 84.5% | 9% | 6.5% |
Accuracy comparison.
| Platform | Total Leakage Count | Same Results |
|---|---|---|
| MyPrivacy(FogPrivacy) | 2876 | 1780 |
| DroidBox | 2431 |
System performance.
| Platform | Before | After | Phone Type | Extra Energy Consumption |
|---|---|---|---|---|
| AnTuTu | 56,333 | 53,629 | SamSung SM-N900 | 4.8% |
| 40,479 | 39,186 | Google Nexus 5 | 3.19% | |
| 55,186 | 52,923 | Xiaomi MI6 | 4.10% | |
| 68,357 | 65,212 | Huawei STF-AL10 | 4.60% | |
| Quadrant | 49430 | 47670 | Samsung SM-N900 | 3.56% |
| 36,320 | 34,849 | Google Nexus 5 | 4.05% | |
| 39,035 | 37,559 | Xiaomi MI6 | 3.78% | |
| 39,882 | 38,729 | Huawei STF-AL10 | 2.89% |
Comparison with other systems.
| System | Method Type | Feature | Customized System Is Needed | Modification of Application Is Needed | Able to Prevent Leakages |
|---|---|---|---|---|---|
| LeakMiner | Static Analysis | Function Call Graph | No | No | No |
| FlowDroid | Static Analysis | Static Taint Analysis, etc. | No | No | No |
| TaintDroid | Dynamic Analysis | Dynamic Analysis, etc. | Yes | No | No |
| Aurasium | Dynamic Analysis | App Repackaging | No | Yes | Yes |
| Our Method | Static and Dynamic Analysis | Function Call Graph, Dynamic Analysis, etc. | No | No | Yes |
Figure 8Example of a smart wristband. (a) The wristband. (b) App of clients.
Figure 9Malicious codes in Java form.
Figure 10Decoded information received from the malicious application.
Figure 11Interception to the malicious app.