Abstract
With the growing need for the remote caring at home and the everincreasing popularity of mobile devices, more and more applications are being developed to enable remote health monitoring. Combining cloud computing with mobile technologies has enabled the healthcare service provider to offer continuous health data collection and physicians to conveniently monitor and assess users’ health while they are at home. However, users’ health data contain highly confidential information, and servers in the cloud are out of users’ trusted domain. Therefore, users may be reluctant to take advantage of remote health monitoring systems before they make sure their data are properly protected. In this paper, we propose a secure continuous remote health monitoring system named SCRHM with the main component, a searchable encryption scheme supporting range searches for remote health monitoring system. With this scheme, remote health monitoring service provider is able to detect outliers over encrypted health parameters. Using analysis, we prove the correctness and security of the proposed scheme on privacy protection of users’ health data. Via simulation experiments, we validate the performance of the proposed scheme in terms of computation and communication overhead.
1. Introduction
Background. With the rising of life expectancy and declining birth rates, the proportion of the population above a certain age increases. This phenomenon, known as population aging, is occurring all over the world. The population report [1] indicates that the overall median age in the world rose from 23.5 in 1950 to 28.5 in 2010 and is projected to increase from 29 to 36 years between 2013 and 2050 and to 41 years in 2100. The global share of older people (aged 60 years or over) increased from 9.2% in 1990 to 11.7% in 2013 and will continue to grow as a proportion of the world population, reaching 21.1% by 2050. Globally, 40% of older persons aged 60 years or over live independently, that is, alone or with their spouse only, and this number is projected to increase in the future. These “empty-nest” seniors are vulnerable to helplessness at home when they suffer sudden health problems.
The health issues related to the aging population are complex and many health risks may lead serious sequelae and even death. One of the most serious health risks is injuries, particularly those caused by falls, which may lead to postfall syndrome, such as increased dependence, loss of autonomy, confusion, immobilization, and depression. According to [2], within the year following a hip fracture from a fall, 20% of the seniors will die. Nevertheless, if an inventive detection apparatus and compatible reporting system was used, almost 80% of the falls could be quickly determined and medical services would be provided quickly to the injured seniors. The sooner they get medical services, the better they would recover and thus the less likely they would suffer disabilities or death.
Chronic medical conditions, such as cardiovascular disease and Parkinson's disease, are another health killer to seniors. They are responsible for 60% of all deaths worldwide with almost half of chronic disease deaths occurring in people under the age of 70. According to [2], 133 million people live with chronic medical conditions. That number is projected to increase by more than 1% per year by 2030 and reaches 171 million then. It is impossible to completely cure or eliminate chronic diseases and lengthy, expensive treatments involving complex, ongoing care are often required. The global epidemic of chronic disease is an underappreciated cause of poverty and hinders the economic development of many countries (source: World Health Organization (as defined in Wikipedia, the World Health Organization (WHO) is a specialized agency of the United Nations (UN) that is concerned with international public health)). If some vital signs of chronic disease sufferers can be continuously monitored and abnormal medical conditions can be alerted once they occur so that the patients can obtain timely treatment, then some serious sequelae can be avoided. For example, according to American Heart Association [3], $16 billion can be saved per year and 42% rehospitalization could be prevented if adequate patient monitoring, instruction, and education outside hospital could be provided.
A 2012 eHealth patient survey by the public relations agency Ruder Finn found that 40% of elder patients want access to technology that can alert physicians and other caregivers if they are having a health emergency [4]. This trend demands an increased focus on preparing a continuous Remote Health Monitoring (RHM for short) system capable of caring for seniors and improving their health and independence for their late life. The recent advances in wireless sensor networks and cloud computing have made it possible to provide remote health monitoring to patients. Patients’ vital signs are collected by the sensors and then forwarded to the RHM service provider. These parameters are checked by the RHM service provider to find odd conditions, deliver medication reminders, and trigger alerts. They may also be stored by the service provider for future long-term analysis or for the physicians to examine them. A fully operable prototype of PERFORM [5], which constantly measures the patient's symptoms and alerts physicians in case of any outlier based on a system of “wearable” sensors, has been tested in three European hospitals [6]. This tool is really helpful to improve the monitoring of patients with Parkinson disease and allows the physician to be constantly informed about the patient's clinical state and readjust appropriately the treatment plan. An evidence of the long-term impacts of RHM systems is that IT giant Apple and IT giant Google have participated in the battle. Not only do we have Android Wear up against the Apple Watch in the hardware and sensor stakes, but also there is now the small matter of the underlying platforms powering them: Google Fit versus Apple HealthKit [7].
Although RHM services minimize the need for physicians and caregivers and help the chronically ill and the elderly to survive an independent life, users may worry about how the providers make use of the collected data and protection that user data enjoy. In [8], four popular health monitoring services, Fitbit, JawBone, Nike+, and BASIS, were investigated. These service providers offer their service free for buyers of their hardware monitors and require users to register an online account in order to use the wearable devices. All data collected by the devices are uploaded to the provider's online service. When logging into the account, the users can obtain analysis of the data via a website or smartphone application. All of the four health monitoring services leave user data privacy to serious privacy threats. Health data of users using Fitbit and BASIS may be sold to advertisers or other companies. In which way and by whom the health data are used are out of users’ control. This threatens users privacy very much, since the health data are highly sensitive, especially when they are combined with information from other sources. Even if the service providers claim not to sell users’ data or collect information from other sources, the malicious inside staff or outside attackers may have the root right to the system and thus to the health data.
A trivial approach to protecting users data privacy is encryption-before-outsourcing; that is, the users encrypt their health data before uploading them onto the untrusted servers. Encryption reduces security and privacy risks by hiding all information about the plaintext data, but it brings a new problem at the same time; it removes search capabilities from the service providers, resulting in loss of functionality of finding odd conditions. Nevertheless, if the RHM services do not support real-time monitoring and emergency alert, their functional value will be greatly reduced. The elder patients who suffer sudden medical conditions cannot get help at the first moment and RHM seems to turn into simply a data recorder. To address this problem, in this paper, we propose a secure continuous RHM system (SCRHM), which is capable of finding odd health parameters over encrypted user health data uploaded continuously from users’ gateway. After investigating a sample table from [9], we find that almost all the parameters are numerical values and the remaining such as “normal” or “bad” could be encoded into numerical values as well. Therefore, without loss of generality, we assume that all the health parameters are numerical, and the normal values are within given range(s). We design a searchable encryption scheme supporting numerical range searches for remote health monitoring system, in particular, encrypted health data vectors consisting of several numerical fields.
Related Works. In what follows, we introduce some related works. Firstly, we introduce secure healthcare services where encryption is utilized to protect health data privacy. Then we introduce searchable encryption used as the tool to enable secure continuous remote health monitoring.
Secure Healthcare Services. Combining healthcare with cloud computing draws more and more attentions because of the following three factors: firstly, the growing interest in transforming from paper-based health records to electronic health records (EHRs) [10]; secondly, large storage capacities and heavy burden on storing and managing EHRs [11] (the currently emerging pervasive computing technologies in healthcare [12, 13] will greatly intensify this trend); thirdly, the increasing importance of interorganizational sharing and collaborative use of health data [14]. Narayan et al. [15] propose the use of ciphertext-policy attribute-based encryption (CP-ABE) [16] to ensure that the cloud provider cannot see or copy EHR data. Löhr et al. [17] present a security architecture for establishing privacy domains in e-health infrastructures. Li et al. [18] propose utilizing multiauthority attribute-based encryption to encrypt EHRs so that only authorized users are able to decrypt the ciphertexts. One of the most similar researches as ours is by Li et al. [19]. They establish a scalable framework for authorized private keyword search over encrypted personal health records and propose two novel solutions. Different from ours, their solutions only support keywords searches but not range searches. Thus it is not applicable in continuous remote health monitoring with numerical health parameters. The other similar work is [20]. The authors propose encrypting patients’ health parameters homomorphically and outsourcing to healthcare service provider to compute statistical functions over these data and determine patients’ health risks. Their scheme is capable of finding odd conditions by calculating risk values. It is a two-round protocol since the service provider cannot obtain the result but have to send it back to the patients for decryption. However, homomorphic encryption scheme is not suitable for mobile devices with power and storage constrains in most applications [21]. In continuous remote health monitoring, many encryption and decryption operations are needed, thus leading to heavy computation and communication overhead. Another deficiency of this work is that patients are not allowed to pinpoint which health parameters need monitoring but have to wear all the devices and get all necessary values, or else the collected parameters would be invalid inputs to the evaluation function.
Searchable Encryption. Searchable encryption is developed to enable searches over encrypted cloud data [22–24]. There exist several researches on searchable encryption supporting range searches over encrypted data. Boneh and Waters [25] design a predicate encryption, called Hidden Vector Encryption, which can be utilized to construct searchable encryption scheme supporting multidimensional range queries over encrypted data. Shi et al. [26] also propose an encryption scheme to handle multidimensional range queries. Both schemes are in the public-key setting, that is, multiple senders and a single search entity, and are computationally costly for real-world applications. Considering deficiencies of these two schemes, following works mainly focus on efficiency improvement. Lu [27] designs a single dimensional range search scheme (named LSED) on encrypted data in the symmetric-key setting. The author also mentions a direct extension, named LSED+, in the multidimensional setting. However the proposed scheme supporting multidimensional range searches has privacy leakage in single dimension. The recent work [28] proposed by Wang et al. also has the same privacy leakage in single dimension as LSED+. Although the scheme proposed by Wang et al. [29] is secure and more efficient, it is still too computationally costly and only supports small number of dimensions; for example, the maximal dimension size set in the simulation experiments is 6, whereas the health parameters which need monitoring may be few hundreds or more. The time costs of this scheme will be too high to use in practice. In this paper, we construct a searchable encryption scheme for remote health monitoring system.
Our Contributions. Our contributions are threefold:
To enable secure monitoring of users’ health conditions, we propose a secure continuous remote health monitoring system, SCRHM. With SCRHM, users encrypt their monitored health parameters and upload the encrypted data to the remote health monitoring service provider without worrying about private information leakage. We design a searchable encryption scheme for the RHM system, so that the RHM service provider can perform numerical range searches over the encrypted data without knowing users’ private health data. Using analysis, we prove the correctness and security of the proposed searchable encryption scheme and validate the performance of this scheme via simulation experiments.
Paper Organization. The rest of the paper is organized as follows. Section 2 describes the problem and the main component of SCRHM system, that is, a searchable encryption scheme supporting range searches for remote health monitoring system. Section 3 provides correctness and security analysis and evaluates the performance of the proposed scheme. Finally, Section 4 concludes the paper.
2. Problem Statement and Solution
2.1. Problem Statement
In this section, we introduce the system model, system workflow, and adversarial model as well as our design goals. In the part of System Model and System Workflow, we describe how sensitive health data are collected and processed in SCRHM. The remote health monitoring service provider and malicious users may collude to pry into the uploaded sensitive data. Their malicious activities and interested sensitive information are presented in the part of Adversarial Model. To prevent data leakage, as discussed in Section 1, sensitive health data should be encrypted before outsourcing. Traditional encryption schemes such as 3DES (Triple Data Encryption Standard) (http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf) or AES (Advanced Encryption Standard) (http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf) and existing searchable encryption schemes ([22–24], to name a few) are not suitable for secure continuous remote health monitoring. To address this problem, we propose a new searchable encryption scheme supporting range searches in the remote health monitoring system. By incorporating this searchable encryption scheme into the system, SCRHM should achieve the design goals described in Design Goals. In particular, to protect sensitive health data, SCRHM should prevent service provider and malicious users from getting known of the solutions to the questions shown in Adversarial Model.
System Model. The system architecture of SCRHM is depicted as in Figure 1. Note that the authors of [9] propose a novel remote health monitoring system with a similar three-tier architecture as ours; however they do not take secure data processing into consideration. In what follows, we show the functionality of each component in our system.
Health Data Collection. The body area network subsystem consists of body sensors, which are placed in, on, or around a user's body for continuous monitoring of the user's physiological conditions such as heart rate, SpO2, and body temperature. The personal area network subsystem is optional and is composed of ambient sensors. These sensors are deployed in the surrounding of a user, so that the environmental conditions of the user's body such as air temperature, humidity, and brightness can be monitored. Multihop wireless links interconnect the body sensors and the ambient sensors. The gateway, which can be a mobile phone or personal digital assistant, collects the sensory data transmitted from the sensors. In our system, the gateway not only is responsible for collecting sensory data but also generates trapdoors and encrypts the collected health data. All these sensors and the gateway, connected by the multihop wireless links, constitute the health data collection module of the SCRHM system. Communication and Networking. The advanced wireless communication technologies, for example, 3G/4G/GSM/GPRS/WiFi, link the gateway to the Internet. In this way, various types of sensory data collected by the health data collection module can be sent to the remote health monitoring service provider. Remote Health Monitoring Service Provider (RHMSP). The RHM service provider is responsible for recording and analyzing user health data, which are in the encrypted form in our system. Once health deterioration of a user is detected by the RHM server, it may alert the caregiver or the physician. If a user is identified to be in an emergency, the RHM service provider may trigger an immediate procedure (e.g., informing the emergency contact and/or hospital, or dispatching ambulance directly) to save the user's life. Medical Service Provider. The medical service provider is responsible for providing timely medical assistance when a user is in a health emergency and also performs routine checks of users’ physical conditions to recommend long-time medical treatment.

Architecture of the secure continuous RHM system.
System Workflow. In what follows, we describe the workflow of the SCRHM system as depicted in Figure 2.
In the system setup phase, each user generates user specific secret key and sends the key to authorized medical service providers. Besides uploading searchable health data ciphertexts, in step Each user creates trapdoor, encrypts the health parameters, and then uploads the trapdoor, encrypted indexes, and encrypted records to RHM service provider. Trapdoor generation is implemented only once when the user registers the RHM service. The indexes are encrypted with our searchable encryption scheme and the records are encrypted with symmetric key encryption scheme, for example, AES or 3DES. RHMSP stores the uploaded health data records and analyzes whether they are abnormal by implementing the Search algorithm of our searchable encryption scheme over the encrypted data. According to the search results, RHMSP notifies the medical service providers, including calling ambulance, notifying caregivers, and physicians. The medical service providers may also want to search interested health records. They generate the corresponding trapdoors and send them to the RHM service provider. RHMSP runs the Search2 algorithm of our searchable encryption scheme. The encrypted records satisfying search requirements corresponding to the trapdoors are sent to the medical service providers, who decrypt the ciphertexts with the secret key obtained from the users.

Workflow of the secure continuous RHM system.
Note that, in this paper, we focus on how to enable the remote health monitoring system to search outliers or data records designated by the medical service provider over encrypted user health data. Access control of the health data records, which is a perpendicular problem of ours in this paper, could be implemented by applying other mechanisms, such as attribute based encryption. We refer interested readers to [15, 16, 18, 30–32] for further information.
Adversarial Model. In our system, authorized medical service providers are fully trusted. The RHM service provider is considered as semihonest; that is, it will honestly follow the designated protocol but curiously infer additional private information based on the data available to it. Specifically, the RHM service provider may be interested in the following questions. What is the value of the monitored parameter? Which health parameter of a user is abnormal? And is it below the lower bound or above the upper bound? Do user1 and user2 suffer from the same abnormal health parameters? The above-mentioned information about a user can be sold by the RHM service provider to advertisement companies for profits or other commercial purposes. Some of the RHM service users may be malicious and they may collude with RHMSP to get private information about other users. Therefore our system aims to protect honest users from being attacked by the RHM service provider and malicious users.
Design Goals. Our system should satisfy the following requirements:
Functionality. Firstly, RHMSP should be capable of searching over the encrypted health data so that any outliers can be detected at the first moment. Secondly, authorized medical service providers could generate trapdoors to search health data satisfying designated requirements. Security. To protect private information about honest users’ health conditions, our system should prevent RHMSP from getting the solutions to the questions mentioned in the adversarial model. In particular, the following security requirements should be met. Efficiency. SCRHM is required to achieve both computation and communication efficiency. Specifically, trapdoor generation, data encryption, and search over the encrypted data should be efficient and the size of the trapdoors and the encrypted indexes should be suitable for applications in practice.
2.2. Preliminaries
The encryption scheme we adopt to construct searchable index and trapdoor is extended from the Asymmetric Scalar-Product Preserving Encryption (ASPE) scheme, which is proposed in [33] for efficient secure nearest neighbor search on the cloud. It is also utilized by the authors of [34] to enable searches over encrypted data.
Suppose that
In the query step, the product of
Fact 1
Fact 2
Therefore,
The notations we use in the remaining of this paper are listed as follows:
κ—it is an integer and denotes the security parameter.
2.3. The Proposed Searchable Encryption Scheme
By extending the kNN computation scheme, we propose a searchable encryption scheme for continuous health monitoring system consisting of the following algorithms.
(i) Setup
The gateway of user
(ii) GenIndex
Extend if if
The encrypted index for
(iii) GenTrapdoor
Let Q be an m-dimensional vector. Extend Q to if if
The encryption of Q is
The gateway randomly permutes the
(iv) GenTrapdoor2
when when
where s and
(v) Search
(vi) Search2
3. System Evaluation
In Section 2.3, we construct a searchable encryption scheme for continuous health monitoring system. In the following, we first prove that it achieves the functionality goal and the security goal. On the one hand, the service provider is able to find odd conditions over the encrypted data. In particular, on the other hand, the searchable encryption scheme ensures that curious service provider or malicious users would not get known of private information about honest users’ sensitive health data, thus protecting user privacy. Then, through simulation experiments, we evaluate system performance in terms of computation and communication overhead.
3.1. Correctness Analysis
In the following, we briefly discuss the correctness of the proposed searchable encryption scheme on the basis of the correctness proof of the ASPE scheme shown in Section 2.2. We prove the correctness of GenTrapdoor2
In vector
Therefore, SCRHM, which aims to perform range searches over the encrypted health data, can accomplish the claimed functionality correctly.
3.2. Security Analysis
In what follows, we prove that our system satisfies the three proposed security requirements, that is, confidentiality, single parameter privacy, and trapdoor uniqueness.
Confidentiality. The privacy protection of searchable indexes and trapdoors is based on the security of the ASPE scheme. On the security of this scheme, Wong et al. claim that it can guard against any attacks based on the knowledge of a number of (plaintext, ciphertext) pairs, and their argument is as follows [33]. If the boolean vector S is known to the adversary, then he/she would be able to use the known (plaintext, ciphertext) pairs to construct linear equations about
However Yao et al. [35] propose a chosen plaintext attack that can recover the data point not by solving the aforementioned linear equations. Their attack is as follows [35]. Assume that the server obtains d query points and their corresponding ciphertexts (by asking the oracle in the chosen plaintext attack model). For each Q of those query points, the server would have two encrypted points
Fortunately, this attack will not affect the security of our proposed scheme. The most important part in the above mentioned attack is that the adversary knows the plaintext, whereas, in our scheme, even if the adversary is allowed to access the trapdoor generation oracle, he is unable to obtain the plaintext. For example, the adversary's query is denoted by Q, according to the trapdoor generation algorithm in our scheme; the adversary will get the ciphertexts
Single Parameter Privacy. Trapdoor generation is a randomized algorithm. For each value
Trapdoor Uniqueness. From the above confidentiality analysis, we know that even if the RHM service provider colludes with malicious users, the private information in the indexes and trapdoors cannot be recovered; however we omit some other possible approaches. That is, if the trapdoors generated by the honest users or medical service provider can be used to search the encrypted indexes by the malicious users or vise verse, then the malicious users can recover the values in a divide-and-conquer or brute-force way. For example, if the trapdoors generated by a malicious user A can be used to search a honest user B's encrypted indexes, then A generates trapdoors for all possible values of a specific health parameter with the algorithm GenTrapdoor2 and runs the search algorithm Search2 over the encrypted indexes; if the equation
From analysis above, we can conclude that our scheme is secure in terms of the three security requirements proposed in Section 2.1.
3.3. Performance Evaluation
In this section, we run simulation experiments to evaluate the performance of the proposed scheme in terms of computation and communication overhead. All the data vectors used in our experiments below are generated randomly.
Computation Overhead. The computations are performed on a 1.4 GHz MAC OS X Yosemite system. All the data reported below are averaged over 100 randomized runs. Time costs of the algorithms are evaluated with varied size of parameters and users. We set the number of parameters to be four different values: 80, 120, 160, and 200. On the one hand, the size is set to be greater than 80 for guaranteeing the security property of the ASPE scheme; on the other hand, 200 parameters are enough for remote health monitoring systems in practice. As for user numbers, we choose 10000, 50000, 100000, 150000, and 200000 to evaluate system performance. Algorithms running on the remote health monitoring server can be parallelized; therefore computation efficiency can be further improved.
Time for Generating Index and Trapdoors. In what follows, we consider the time cost for each RHM service user to generate indexes and trapdoors. To generate an index, firstly an m-dimensional data vector is created by the gateway. Each dimension of the vector represents a monitored parameter. This vector is encrypted by the ASPE encryption scheme; that is, it is split into two random vectors with a secret binary vector S as the splitting indicator and encrypted by two

Encrypted index generation.

Trapdoor generation.
Time for Searches. In each time interval, an encrypted health data is uploaded to the remote health monitoring service provider, who runs the search algorithm Search. We show the time cost in Figure 5. For each health data record, outliers detection can be accomplished very efficiently; for example, only about 5 μs is consumed when the parameter size is 200. When a medical service provider wants to search interested health data records, the search time is related with the size of the specific user's health data records. From Figure 6, when we set the health data record size to 200000, the time consumed is only about 450 ms, which is efficient for practical applications.

Outlier detection computation overhead.

Search2 computation overhead.
Communication Overhead. We mainly focus on the communication overhead of the index and trapdoor generation phase, since these phases may be executed on a mobile devices, which requires low communication costs. From Figures 7 and 8, when the size of the health parameters is set as

Size of index.

Size of trapdoor.
4. Conclusion
In this paper, considering the increasing need for remote health monitoring and confidential property of the health data, we introduce a secure continuous remote health monitoring system, named SCRHM. To enable remote health monitoring service provider to find odd conditions while preserving users’ data privacy, a searchable encryption scheme, which supports range searches for the remote health monitoring system, is proposed. We perform the correctness and security analysis of the proposed scheme and prove that our proposed scheme supports range searches over encrypted data correctly and achieves the security goals to protect user privacy. Through extensive simulation experiments, we validate the performance of our system. In particular, high performance in terms of computation and communication overhead can be achieved. In the future, we would like to extend our system to support more complex computation over encrypted health data, so that remote health monitoring service provider would be able to perform more versatile analyses and provide more plentiful services for users.
Footnotes
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
This work is partially supported by the National Natural Science Foundation of China under Grants nos. 61170263 and 60911140102.
