Keywords

1 Introduction

The evolution of healthcare Internet of things (IoT) introduce an interconnection between patient, medical professionals, medical sensors and trusted servers [1]. A healthcare IoT improve the quality and efficiency of patient medical treatment [2, 3]. Smart sensing devices and medical instruments and wearable medical devices are helpful for remotely monitoring healthcare data in smart healthcare IoT network [4]. Medical cyber physical system composed of a network of medical sensing devices and provides high quality of healthcare services [5]. In IoT enable smart healthcare based WSNs are helpful in monitoring patient health. Sensing devices are used for measuring patient health like temperature, blood pressure, glucose and heartbeat [6]. Patient sensitive data aggregated through smart wearable sensing devices and this aggregated after processing received to doctor or medical consultant to observe the present health condition of patient. Sensing devices are broadly appropriate in physical world scenarios [7, 8].

In IoT based healthcare system, FoG node basically a device with capability of temporarily data storage, data computation and network connectivity. FoG layer provide low latency and high response time in this way increasing the capability of healthcare systems [9]. In FoG based healthcare architecture sensing nodes aggregate patient data and transmit this collected data on FoG server and after some processing on locally store data. FoG server upload this locally store and processed data on cloud server [10]. FoG computing provides local data analysis on aggregated data from smart sensing devices. In smart healthcare architectures implementation of FoG node reduce computation overhead at cloud server [11]. Middleware between cloud and IoT devices known as FoG is a right choice when services require fast response, data filtration, pre-processing, security and privacy [12].

In smart healthcare technology provides mechanism to remotely monitor healthcare data from wearable sensors. In this way security and privacy are backbone of the smart healthcare so security threads and privacy requirements are the primary challenges in smart healthcare [13]. Technologies like smart phones and wearable devices turned healthcare into smart personal healthcare [14, 15]. In IoT based WSNs mobile phones gain a lot of attention worldwide. Mobile phones used sensor node and collector node but mobile phone as a sensor node is a challenging due to mobility of sensor nodes. On the other-hand mobile phone is a right choice to use as a collector node that helps to easily communicate with medical consultants and doctors [16]. IoT smart healthcare applications provide benefit for personal human healthcare. On the other-side security and privacy are still challenging issue in smart personal healthcare [17]. In healthcare scenario secure data aggregation and data transition to the trusted server are still challenging issue. In wireless body area network sensing devices are attached to the body of the patient and these devices aggregate secure data and transfer over the server and medical professional access this data in this scenario remotely secure data transmission and privacy of the patient and medical professional are the main challenges in remote healthcare [18].

The main problem is secure data aggregation from smart devices (SDs) to FoG node. In aggregation scenario, collection and transmission of data are challenging issues and security of data in healthcare also a challenging task because while aggregating and sharing data high risk of security threads. This paper introduces a FoG based secure healthcare based data aggregation scheme. In our work, peer to peer communication involves wearable SDs that exchange data to collector nodes (CNs). Next, the CNs share data to FoG server efficiently to reduce communication cost. Moreover, FoG node sends query request through CNs and the SDs that have responded to fulfill query scenario.

This paper presents a proposed scheme on privacy preserved and secure healthcare data aggregation FoG based scheme. Our proposed work is simulated using NS2.35 in Fedora Core 16. TCL and C languages are used for node deployment and message sharing. We formulated AWK script to get the results of simulations from trace files. Our main contributions in this work are as follow.

  1. (1)

    We have explored an extensive amount of literature to discuss different schemes for data aggregation. Schemes are categorized into secure aggregation schemes and secure healthcare based schemes.

  2. (2)

    Next, we present the secure healthcare based data aggregation scheme (SHDA). It formulates a system model where sensing devices and FoG nodes are shown.

  3. (3)

    Next, we propose Message Receiving Algorithm (MRA) for collector node and Message Extraction Algorithm (MEA) for FoG node.

  4. (4)

    Finally, simulation scenario is explored to extract results.

Rest of the paper is organized as follows; Sect. 2 explores the literature review for various secure healthcare data aggregation schemes. In Sect. 3, we present our proposed model for SHDA along with message receiving and extraction algorithms. Section 4 explores results and analysis whereas Sect. 5 concludes our work.

2 Literature Review

In this section, we discuss various privacy preserved secure aggregation schemes and also healthcare based secure aggregation scheme. In this way, we further divided this section into two sections first section contain secure aggregation schemes and second section contain healthcare base secure data aggregation schemes.

2.1 Secure Data Aggregation Schemes

In this section, we discussed data aggregation schemes. In discussion, we briefly describe the main key features of these schemes and their contributions in physical world. This portion includes only secure data aggregation schemes. We also discussed methods and techniques of secure data aggregation schemes.

Huang et al. [19] formulate a control and secure data access scheme. It depends upon ciphertext attribute based encryption and attribute based signature in IoT enabled FoG computing. In attribute based data encryption scenario, sensing nodes share ciphertext to FoG server. FoG server perform encryption and decryption data and further upload data to cloud server and in data receiving perspective a user can access data whose attribute satisfy the required polices. The system provides secure data access control and secure update ciphertext. Wang et al. [20] introduce a secure aggregation scheme (ASAS). This proposed architecture using pseudonyms and homomorphic encryption to preserved the privacy of aggregated data and protect the identity of sensing nodes. This scheme provides low computational overhead at cloud server and saves bandwidth between FoG and cloud servers. In contrast energy consumption and communication cost increased. End nodes anonymously share data to the FoG server and while preserving the integrity of received data from end nodes and share data to the cloud server.

Guan et al. [21] discussed a device oriented privacy preserved data aggregation scheme. This work provides pseudonym certificate autonomous update and privacy for aggregated data. In limited devices scenario, it provides high performance. In this formulated work, End nodes aggregate data from smart devices and share this data to the FoG node and it performs local processing on data and share this locally processed data to the cloud server. On Cloud server further processing and analysis are performed. Independent certificate services like trusted certification and local certification authority both of them provide secure and privacy preserved data collection. Lu et al. [22] proposed a lightweight and privacy preserved data aggregation scheme. In this system to aggregate data at one device combine homomorphic encryption and Chinese Remainder Theorem. At network edges one-way hash chain technique is used to filter aggregated data from false data injection attacks. In this way network filter data locally at the edge devices and send it to the control center. Sensing devices are subdivided according to their functionality. proposed scheme efficient because of low computational and communication cost.

2.2 Healthcare Based Secure Data Aggregation Schemes

In this section, we discussed data aggregation schemes. In discussion, we briefly describe the main key features of these schemes and their contributions in physical world. This portion includes only secure healthcare based data aggregation schemes. We also discussed methods and techniques of schemes as follows.

Ullah et al. [23] introduces an efficient healthcare data aggregation scheme. It uses secure heterogeneous IoT based compression mechanism. Secure data transfer from sensing node to collector node and message receiving algorithm used to receive data at collector node. Compression performed on received data at collector node in this way reduce data size and low energy consumption for communication. This work use peer to peer communication between sensing nodes and node to node between collector nodes. Data received from sensing nodes is transmit to the FoG node and at FoG node message extraction algorithm use to collect data from collector nodes and after collecting data at FoG node in specific time stamp perform some local processing on aggregated data and then share this processed data over the cloud server. Hamza et al. [24] presents a lightweight authentication scheme for smart healthcare system. Proposed work focus on the security of healthcare system and using HMAC to authenticate the collected data during data transmission. In system model wearable sensor nodes attached with the patient body and this aggregated data send on edge node and edge node further share this data with the base station or FoG server. In this way for secure data aggregation proposed scheme provide authentication for sensitive healthcare data both at sensing devices and FoG server. This scheme only applicable for devices security of healthcare system. Mahmood et al. [25] introduces secure authentication and prescription safety scheme. It ensures security and privacy of both patient and medical consultants while remotely conversation. It also provides anonymity and un-traceability of patient and doctor during session key generation and secure data transmission to the reliable server. Proposed work uses symmetric key to authenticate the participants and provide secure data transmission between patient and the medical consultant. Moosavi et al. [26] presents an efficient and secure authorization and authentication architecture for healthcare. Privacy and security plays a vital role while transmission of patient sensitive medical healthcare data. The aim of their work is the secure authentication and authorization of the remote patients and healthcare professionals. Proposed work used distributed smart healthcare gateway to authenticate and authorized the remote users in this way reduce the overhead of medical sensors so they are not performing these security protocols. Proposed architecture is more secure than the centralized delegated architecture because between smart healthcare gateway and medical sensor nodes it uses secure key management scheme and it depend upon the DTLS handshake protocol. Proposed solution provide scalable and reliable security for end-to-end healthcare systems.

Haiping et al. [27] introduces healthcare system (HES) framework that collect data from the medical sensors of wireless body area network. This collected data transmit through the wireless sensor network and this medical data through gateway uploaded in the wireless personal area network. The main features of proposed work are easily deployed wireless sensor networks, direct communication between edge devices and medical devices and privacy preserving approach. HES framework involves the GSRM scheme for secure data transmission and key distribution and HEBM scheme expert system analyze medical data and formulate the results automatically and also provide privacy for medical data. Yang et al. [28] formulate a lightweight break glass access control (LiBAC) system this system provides to paths one for normal condition and other for emergency situation for accessing encrypted healthcare data. In normal condition attribute based access policy user use secret key access and decrypt the medical data. On the other-hand in emergency condition break glass access is a password based access and password set by a patient shared with the emergency contact persons (ECP) in this way these person decrypt secret key using password and timely decrypt the patient medical data. Proposed framework is lightweight so consume less space and low transmission overheads.

3 Proposed Solution

We present the system model and proposed secure data aggregation algorithm. We also present a smart healthcare based secure data aggregation scheme. In our case proposed work reduce storage cost and computation cost at cloud server comparing proposed schemes with those schemes discussed in literature review section.

3.1 System Model

In our proposed system model, we present a communication architecture for smart sensing devices in smart healthcare scenarios and elaborate it in Fig. 2. Proposed healthcare model consist of different types of wearable smart sensing devices (SD). Like peer to peer communication SD aggregate medical data and transmit sensitive data to an assigned collector nodes (CN). Suppose in our work all SD may not transmitting data in cyclic way and may be transmit data on request of FoG server or selected threshold delay. It helps to avoid sensing hindrance in case of large no of sensing devices exchange sensitive healthcare data. In this model, medical SD sending sensitive data to CN and collector nodes sending received data to the FoG server. In Fig. 1, we only show four CNs to elaborate basic concept of CN to SD data aggregation and CN to CN data aggregation. In physical world scenario large number of CN are present and some CN nodes directly send collected data to the FoG server. CN1 and CN3 are directly send data to the FoG server. On the other-hand, if CN cannot send data directly to the FoG server so aggregated data is send to the FoG server through neighboring CN. For example, we assume CN2 can exchange data with CN4 and CN4 used as an intermediate node and transfer this data to the FoG server in this way CN4 also directly get data from the SD and also exchange data with the neighboring CNs. In peer to peer communication scenario, if intermediate CNs are far away from the FoG server and size of data carrying by intermediate nodes increased after sending from any individual node in this way communication cost highly increased. On the other-side data mostly not compressed it increases the over-head at FoG and Cloud server. We assume if devices transmit the data in cyclic way and large amount of devices transmitting healthcare sensitive data it will cause hindrance in sensing procedure. It’s a challenging issue to formulate a green sensing mechanism to avoid sensing hindrance.

Fig. 1.
figure 1

System model for FoG-oriented smart data aggregation in IoT

In our proposed model, Collector nodes received the aggregated from other CNs and concatenate the received aggregated data and moves towards sensor nodes. FoG part in data aggregation. In this scenario, records are easily maintaining on the basis of device ID in FoG server.

3.2 Secure Healthcare Based Data Aggregation (SHDA) Scheme

In our proposed section, we formulate solution for identified problem by presenting secure healthcare data aggregation scheme. Our proposed work further divided into three phases SD sensing data and transfer to CNs, message receiving at CN and extraction at base station. We elaborated our proposed scenario with two algorithms first message receiving algorithm at CN and message extraction algorithm at FoG node. In this section Table 1, shows the list of notations.

Table 1. List of notations

FoG server formulate data according to the required format and upload to the cloud server after aggregating data from multiple regions in certain threshold time. In Phase-1 sensing devices share sensing data to the CN. In this way, SDs encrypting data using preloaded keys and share these keys with FoG node and start sharing data to CNs while doing this only those SDs share data which satisfied the required conditions. ANs directly share data with FoG server only when it is one-hop away from FoG server. otherwise CNs share data with intermediary CN to transmit data over FoG server. An intermediate CN collect data and use delimiter to differentiate with its own data and aggregated data from other CN.

In our proposed SHDA scheme, sensor nodes collect healthcare parameter values (\( HP_{V} \)). Cipher text Ci = \( E_{{k_{SDi - CN} }} \) {\( ID_{{SD_{i } }} , HP_{V} , TS_{{SD_{i} }} , H( ID_{{SD_{i } }} || HP_{V} || TS_{{SD_{i} }} ) \) } is obtained by using symmetric key. It concatenates \( ID_{{SD_{i } }} || HP_{V} || TS_{{SD_{i} }} \) values and sensor nodes send data at CN. In phase-2, we introduce MRA at CN which shown in Algorithm 1. It received message from sensing nodes and also received from the other aggregated nodes. In Algorithm 1, CN receives the message from all sensor nodes. In message receiving algorithm decrypt the ciphertext (Ci) to get \( ID_{{SD_{i } }} , HP_{V} , TS_{{SD_{i} }} \) as Mi. It also concatenate values. After that calculate the time stamp of data (\( TS_{CN} \) - \( TS_{{SD_{i} }} \)) < Δt. If condition true so message is fresh otherwise discard it. In case, condition is true calculate the hash of the received parameters H′(\( C_{v} \)) equals H(\( C_{v} \)). In this way, if condition false so message discarded because of data integrity violation. On the other-hand, if condition true aggregated message concatenate with \( M_{i} \) to get aggregated message at collector node (\( A_{m} \)).

figure a

In phase-3, introduces proposed message extraction algorithm at FoG node shown in Algorithm 2. In this proposed algorithm, \( C_{CNq} \) = \( E_{{k_{CNi - FS} }} \) {\( ID_{{CN_{q} }} , A_{m} , TS_{{CN_{q} }} , H( ID_{{CN_{q } }} || A_{m} || TS_{{CN_{q} }} ) \)} Aggregated message received from the collector node at the FoG node. At FoG node while using (MEA) get \( M_{FS} \) by separating \( ID_{{SD_{i } }} , HP_{V} , TS_{{SD_{i} }} \) and also and also \( ID_{{SD_{i } }} || HP_{V} || TS_{{SD_{i} }} \) concatenate values. In next step of algorithm, we calculate the time stamp of data (\( TS_{FS} \) - \( TS_{{CN_{q} }} \)) < Δt. If condition true so message is fresh otherwise discard it. In case, condition is true calculate the hash of the received parameters H´(\( C_{b} \)) equals H(\( C_{b} \)). In this way, if condition false so message discarded because of data integrity violation. In next step, if condition true then loop count from 1 to n and q = 1 to n and \( List_{{M_{SDi} }} \) is a list of messages received from sensing nodes and split received data and using colon as a delimiter. In the end extract the health parameter values (\( HP_{V} \)) from list of messages received from sensing devices \( (List_{{M_{SDi} }} \)).

figure b

4 Results and Analysis

Our work validated through simulation by installing multiple sensors in a specific area and separately formulate each type of node by placing suitable class with functions for receiving, sending, encrypt and decrypt algorithms. We simulated our proposed scheme using NS2,35 on Fedora core and TCL files have configuration of nodes, deployment of nodes. Separate classes are created using C language for applying the sending and receiving functionality of SDs and CDs and also provide functions for applying encryption and decryption. Our proposed scheme used AWK script files to attain values of results from trace files. We compared our scheme with other schemes and this comparison shows the supremacy of our scheme.

In Fig. 2, we calculate the communication overhead at low power devices like SDs. shown the supremacy of SHDA scheme while comparing with ASAS and APPA schemes. Results prove that our proposed scheme has low communication overhead as compared with other two schemes at low power devices. Using simulated values presents the communication cost with no of packets. In Fig. 3, we calculate the computation cost in terms of data aggregation at CNs. Our proposed SHDA scheme shown supremacy in terms of computational cost while comparing with APPA and ASAS. Results of simulation show that our proposed scheme has less computation cost as compared with other two schemes. Presents the computation cost with number of smart devices. In Fig. 4, we compare energy consumption with time at CNs. Proposed scheme SHDA compare with APPA and ASAS schemes. Simulation results show the supremacy of our proposed scheme and provide less energy consumption.

Fig. 2.
figure 2

Communication cost

Fig. 3.
figure 3

Computation cost

Fig. 4.
figure 4

Energy consumption

5 Conclusion

Our proposed SHDA scheme ensures the security of data while transmitting from SDs to CN that further transmits to FoG server. MRA and MEA algorithms receive and extract the data at collector and FoG nodes, respectively. In this case, the collector node can directly transmit to FoG node when one-hope away, otherwise, intermediate nodes are involved. During extraction, delimiter is used to differentiate between data sending devices like SDs and CN, respectively. Our proposed work validates through simulation using NS 2.35 in Fedora Core 16. We use TCL for node deployment and for message handling we use C language. Results are extracted using AWK script from multiple trace files as per deployment scenarios. trace files using. Results prove the supremacy of proposed SHDA scheme in terms of less communication cost, less computation cost and less energy consumption.