Abstract

The safety hazards of the monitoring platform must be solved to ensure the safety of health monitoring user terminals (HMUTs). To accurately measure the safety level of the safety management system, it is necessary to carry out effective trusted computing. However, the current trusted computing often ignores the subjectivity and personalization of trust, failing to consider the influence of privacy leak on trust. To solve these problems, this paper explores the safety management solution for HMUTs based on trusted computing. Specifically, the authors established a multidimensional trusted computing model for HMUTs, detailed the computing method for composite trust based on single-dimensional trust, and presented a trust management scheme for HMUTs. Experimental results demonstrate the feasibility and effectiveness of our model. Our research keeps up with the latest development trend of trusted computing and lives up to the trust and efficiency requirements of the collaborative processing mechanism for HMUT safety management.

1. Introduction

If health problems can be prewarned, passive treatment could be replaced with timely intervention before the problems occur. This would prevent tragedies like major personal accidents [16]. In recent years, intelligent products capable of actively monitoring health anywhere, anytime have attracted much attention [712]. These products collect various human health data via user terminals. The massive interactive data provide precise, timely, and complete feedback for hierarchical management of the life safety and physical health of people in a region [1315]. The safety management of user terminals, which aims to ensure the trustworthiness of user identity and the completeness of user computing platforms, faces some hidden hazards. However, the massive number of users and insane volume of interactive data bring safety problems to user behaviors. To solve the problems, it is necessary to overcome the complex safety hazards faced by health monitoring platforms [1620].

Kamble and Bhutad [21] proposed a health monitoring system for the elderly, which utilizes various sensors to monitor the physiological parameters of the patient, including temperature, heartbeat, and electrocardiogram. Upon detecting any abnormal sign or symptom, the system will notify the caregiver via short message service (SMS) or e-mail. Ray and Ray [22] relied on exponential moving average (EMA) to adjust the output signal of the sensor array, encrypted the adjusted signal, and transmitted the encrypted signal to the connected fog node. Then, an algorithm was designed to push the data to the cloud platform for monitoring human activities and diseases. Jiang and Liu [23] developed a health monitoring system with lightweight security and privacy protection. The location and health information are acquired by dual-band radiofrequency identification (RFID), virtual path positioning algorithm, and RFID-based diet and motion data acquisition technology. Ahmid et al. [24] presented an intelligent patient monitoring system for automatic monitoring of patient’s heart rate. The system operates more intelligently than the other systems: it keeps the confidentiality of authentication, authorization, and data sensing; after predicting the critical situation, it will send a message to the patient’s family members, doctors, nurses, and hospital leaders, and trip an alarm. To solve the transmission delay of monitored data on patient’s health to the cloud, Kesavan and Arumugam [25] put forward a four-stage approach, including data acquisition, fog-to-cloud, decision-making, and execution, and demonstrated the high precision, good efficiency, quick response, and low computing cost of the approach in medical care. According to the structure and energy features of the medical objects, Somaya and Tomadar [26] studied the possibility of safe communication between medical tools within the hospital and devised a safe structure for their interfaces, using the safe mechanism provided by communication technologies, networks, and protocols. Wearing and Dragoni [27] comprehensively considered the key safety and privacy issues in family health monitoring systems and constructed a real-world sensor network for healthcare in the network environment.

After reviewing the relevant literature, it was discovered that the current trusted computing often ignores the subjectivity and personalization of trust, failing to consider the influence of privacy leak on trust. Besides, the untrusted probability is confused with uncertain probability in the result of traditional trusted computing. To solve the above problems, this paper updates the trusted computing method for HMUT safety management. The main contents are reported in Sections 2 and 3. Section 2 establishes a multidimensional trusted computing model for HMUTs and details the computing method for composite trust based on single-dimensional trust. Section 3 presents a trust management scheme for HMUTs and provides a trust management service capable of managing the trust of multiple HMUTs. Experimental results demonstrate the feasibility and effectiveness of our model.

2. Multidimensional Trusted Computing Model

The proposed trusted computing model for HMUTs was introduced from multiple dimensions. Figure 1 shows the framework of our multidimensional trusted computing model. As shown in that figure, the model consists of user terminals, an access network, platform servers, and a safety management layer. The user terminals refer to HMUTs like intelligent wearable devices.

To evaluate the ability of HUMTs to collaboratively complete health monitoring tasks, this paper introduces a parameter called competence trust (CT), which effectively reduces the probability for low competitive terminals to participate in health monitoring tasks. The CT of an HUMT depends on the requirements of the specific health monitoring task. Let be the available information resources required by the health monitoring task; be the minimum threshold of the various information resources required to complete the current health monitoring task; ξl be the l information resources required to complete the pending health monitoring task. Then, we have

Each information resource of is divided by the corresponding information resource in . The minimum ratio thus obtained is defined as the competence matching degree. That is, the information resource weakness of a terminal is defined as the matching degree between the information resources required to complete the health monitoring task and those possessed by the terminal, that is, the matching degree between and . Since the competence matching degree should be smaller than 1, it is determined as the smaller value between 1 and the minimum ratio.

Furthermore, Shannon’s information entropy was introduced to evaluate the CT of HMUTs, aiming to illustrate uncertain health monitoring information. Based on the entropy theory, the information entropy of event occurrence probability o can be calculated by

The information entropy can increase the accuracy of CT evaluation of terminals and effectively quantify the risk of health monitoring tasks brought by low-competence users, making multidimensional trusted computing model more universal.

Since function (3) changes nonmonotonically, the CT function SUe,r directly corresponding to the monotonic interval of trust can be defined to convert the uncertain competence of terminals into CT.

Figure 2 shows the flow of trusted computing of user terminals. To realize the safety management of HMUTs, it is necessary to establish the relationship between user terminals, which must collaborate with each other to complete complex tasks. In actual situation, HMUT Mr receives a few auxiliary information from the other peripheral devices. To evaluate the performance of HMUT Me in the latest collaboration, it is assumed that HMUT Mr is independent of the auxiliary information from the other peripheral devices. The time window Δh representing the maximum number of historical collaborative tasks can be configured based on task density. Then, the set of probability scores based on time series can be expressed aswhere is positively correlated with the degree of completion of historical tasks. For a user terminal, the stronger the competence, the better the performance.

The older the historical collaboration record, the less effective the information provided by the record. Let h be the current time; be the historical record; be the time of the historical record. Then, the time attenuation factor was introduced to the proposed trusted computing model.

Time attenuation was performed on each historical record to improve the accuracy of trusted computing. Specifically, each record is updated by multiplying with the time attenuation factor.

Beta distribution depicts the distribution of a single variable. It can be adopted as the prior distribution of binomial distribution. Thus, our model adopts beta distribution as the prior distribution of the success rate of the collaborative tasks between HMUTs. Suppose the past behaviors of user terminals are similar to their future behaviors. Let βe,rh) and δe,rh) be the number of positive records and that of negative records, respectively. The former records serve as positive evidence, and the latter as negative evidence. The corresponding probability model can be constructed based on the mathematical expectation of the beta distribution.

Formula (8) shows the historical records of collaboration between user terminals can be divided into βe,rh) and δe,rh).

Considering the dynamicity and instability of HMUTs, it is necessary to effectively identify the abnormal terminals. Otherwise, it would be impossible to realize accurate and robust trusted computing, not to mention the optimization of direct trust. For this purpose, a penalty regulator λ1 and a dynamic adaptor λ2 were added.where λ1 is the penalty (i.e., increase of trust loss) against unsuccessful collaboration; λ2 is the long-term gradual accumulation of the direct trust between two terminals and is used to control the growth rate of GSe.rh).

The feedback difference between terminals not involved in collaboration is needed to realize accurate trust matching of the collaboration between HMUTs. The most reasonable calculation basis is the historical feedback the most similar to the current collaboration form. This paper adopts k-means clustering (KMC) to process the historical feedbacks, before selecting the HMUTs based on collaboration similarity.

There are various types of user terminals and diverse forms of collaboration. As a result, there must be some differences in the collaboration form between terminals, even if the terminals are of similar performance and functions. In this paper, the KMC is adopted to initialize a fixed centroid and a random centroid and complete the preliminary filtering based on task similarity. Out of the two clusters obtained through classification, the cluster containing the current collaboration was determined, and all the feedbacks on the cluster were saved. Then, the set of direct trusts can be calculated by

After the end of the iteration, the KMC divided the feedback set of the object into a large cluster and a small cluster. The mainstream feedbacks from the large cluster were retained, while the abnormal feedbacks from the small cluster were discarded. In this way, the malicious feedbacks were filtered out.

In the above algorithm, the indirect trust obtained from multisource feedbacks is defined as the mean of the feedbacks in the large cluster and helps to compute OSMm.

This paper calculates the trust of HMUTs from two perspectives: the state of collaboration and information resources of user terminals, and the historical records. Hence, the composite trust of the system should comprehensively reflect the situation in the two perspectives. To maximize the safety of system management and minimize system risks, this paper carries out the weighted summation of CT value SUe,r, direct trust GSe,rh), and indirect trust OSMm. Based on single dimensional trusts, the composite trust can be solved by

3. Trust Management of HMUTs

Figure 3 shows the trust model framework of health monitoring platform. It can be observed that the safety of platform management is largely covered by identity management, authentication, and data protection of users. The safety level of user terminal management must be calculated objectively and truthfully. The overall trust of the system is inseparable from the authentication of user terminals. If the credibility of terminal feedbacks is measured by identity management, the privacy of users might be exposed. To prevent the problem, user information should be processed by password encryption or anonymity technology. However, the current technical level cannot guarantee system efficiency and privacy protection at the same time.

To protect the information privacy of user terminals, the safety management framework needs to be established based on trust. Figure 4 presents the safety management framework of HMUTs. There are three layers in the framework, namely, a safety management service provision layer, a trust management service layer, and a safety management service user terminal layer, which respectively provide users with information safety management, trusted computing, and safety management.

Our trust management service can manage the trusts of multiple HMUTs. The trust refers to the trust evaluation computed from feedbacks of user terminals, after safety management. Let U(q) be all the trust feedbacks on system safety management service q; ||U(q)| be the total number of trust feedbacks; H(d, q) be the trust feedback from user terminal d (its value varies with the d values); Dh(q, h0, h) be the change rate of trust in a period. Then, the trust evaluation result can be calculated by

To detect whether collusion feedback is used in the safety management service adopted by user terminals, this paper introduces the feedback density to evaluate the reliability of the trust feedbacks from user terminals. Let q be the safety management service for user terminals; N(q) be the total number of feedbacks from user terminals to q. Then, the feedback density TH(q) can be expressed as

Let be the threshold of collusion feedback; |Ud(d, q)| be the number of feedbacks submitted by user terminal d to q. Then, the collusion feedback factor K(q) can be calculated by

In a fixed period, the intermittent collision feedback to safety management service q can be defined as the intermittent collision feedback of q and used to characterize the mutation in the feedbacks of user terminals. Let |U(q)| be the total number of trust feedbacks to q in a fixed period |h0, h|; be the preset feedback threshold. Then, we have

If formula (15) is satisfied, it is highly possible that intermittent collision feedback has occurred. In other words, intermittent collision feedback will occur when the variation of the total trust feedbacks |U(q)| to q in |h0, h| surpasses a certain level.

To enhance the robustness of HMUT trusted computing model against malicious attacks, this paper first computes the trust of user terminals to exclude some malicious users, thereby mitigating the threat to safety management service. Let be the service provision capability of safety management service qj received by user terminal di at time hl; hl be the time of the l-th transaction. Then, we havewhere is the service provision capability of the h-th index Nfh(1 ≤ h ≤ ) of .

The user terminal satisfaction with safety management was defined as the difference between the actual service capability provided by safety management service qj to user terminal di and the service capability to be realized by qj. The satisfaction σ(di, qj, hl) of di with safety management service provided by qj at time hl can be calculated by

Let be the service capability to be realized by qj at time hl corresponding to the h-th index Nfh. Then, the index of safety management service capability in formula (17) can be calculated by

If satisfies the demand of user terminal di, and the satisfaction of Nfh with safety management service is 1. If deviates from the demand of user terminal di; since 0 < υ < 1, the greater the deviation, the smaller the value of , that is, the less the user terminal’s satisfaction with the safety management service.

To compute composite trust in time, this paper computes the trust of user terminal di in safety management service qj within a time window TW. The trust can be derived from the satisfaction of di with each service qj within the time window. Let hf be the current time, c= min{l|hl ∈ TW}; (l) = thf−hl be the time attenuation function, 0 < t < 1; =f − c be the number of services received by user terminal di within TW; Ψ()=e1/g be the number of safety management services. Then, we have

Formula 19 shows the more the number of safety management services in TW, the greater the Ψ(), the larger the , the more trustworthy the safety management services.

The credibility characterizes the actual performance of a safety management service. The users can choose to accept or reject a safety management service according to the level of credibility. If the credibility of safety management services is too low, the health monitoring platform will face the risk of losing users. Let D = (d1, …, dm) be the set of users receiving safety management service qj within TW; |D| be the number of user terminals receiving safety management service qj within that time window. Then, the credibility of qj perceived by user terminal di within TW can be calculated bywhere μ ∈ (0, 1) is a preset parameter. Formula 20 shows that the more user terminals receiving qj within TW, the greater the 1/μ|D|, the higher the credibility of qj.

In this paper, the satisfaction of di with qj is characterized by the difference between the credibility of safety management service qj and the credibility of qj perceived by user terminal di. Let be the credibility of qj at the latest update. Then, we havewhere ω is a preset threshold; α ∈ (0, 1) is a preset parameter. If , the credibility of safety management service qj perceived by user terminal di is not very different from the credibility of qj. In this case, the user terminal makes a relatively objective evaluation of the safety management service. The smaller the difference, that is, the greater the , the more objective the evaluation. If , the user terminal fails to make an objective evaluation of the safety management service.

4. Experiments and Results Analysis

To verify its feasibility, our model (model 1) was compared with four other models: the trusted computing model coupling similarity and information entropy (model 2), multisource feedback trusted computing model (model 3), trusted computing model based on improved Dempster-Shafer (D-S) evidence theory (model 4), and lightweight trusted computing model (model 5).

During the experiment, the proportion of low-competence terminals on the platform was gradually increased from 0% to 60% to simulate the influence of different trusted computing models on the success rate of collaboration between user terminals, as the number of low-competence terminals gradually increases in real working. Figure 5 presents the variation in the success rate of collaboration between user terminals with the proportions of low-competence terminals derived by each model. The term low-competence terminal refers to the user terminal, whose information resources cannot match demand because its utilization of information resources changes too rapidly.

As shown in Figure 5, with the growing proportion of low-competence terminals, the success rate of collaboration of models 1–3 changed stably, while that of model 4 and model 5 declined more and more steeply. This is because our model can evaluate the capability of user terminals based on the current state of information resources and suppress the risk of safety management failure induced by terminal collaboration. To sum up, the experimental results demonstrate that our model can effectively handle the variation in the number of low-competence terminals and the situation of information resources and achieve good robustness.

Based on the in-depth understanding of the nature and features of attacks, scholars have constructed various attack models, such as attack tree, attack network, attack graph. Figure 6 provides our attack model, where the abscissa is the time node, and the ordinate is the number of feedbacks from user terminals.

To verify the overall effect of the safety management system for HMUTs against malicious terminals, this paper tests the success rate of collaboration at different proportions of malicious terminals. During the experiment, the proportion of malicious terminals was gradually increased from 0% to 60%.

Figure 7 presents the relationship between the proportion of malicious terminals and the success rate of collaboration, as derived by each model. It can be observed that all models had a high success rate of collaboration when malicious terminals took up a small proportion. After the proportion increased to a high level, the models differed in terms of the success rate of collaboration. Our trusted computing model performed better than the other models, in the presence of the same malicious attacks.

Considering the low delay requirement of safety management systems, this paper measures the complexity of the proposed trusted computing mechanism and tries to improve the multidimensional trusted computing model for HMUTs. Two core metrics were selected to evaluate model performance: the time cost and robustness of function execution. As shown in Figure 8, our model converged within less time than the other models, reflecting the excellence of our model in a lightweight design.

The above three experiments demonstrate that our trusted computing model is lightweight, accurate, reliable, and stable.

Next, the authors further verified the effectiveness of our trust-based safety management scheme. Figure 9 provides the trust measured by our model and that measured by model 2, which performs similarly with our model. The blue line is the trust measured by the reference model 2, while the dashed line is the trust measured by our model. Figure 10 compares the precision and recall of the two models.

When the credibility was computed by the reference model, the trust was high at 10s, because the numerous malicious feedbacks submitted by malicious users exaggerate the trust of the safety management services. When our trust-based model was adopted for computing, the trust value fluctuated very slightly. The fluctuation (<0.05) was so small as to be negligible. This confirms that our model can effectively resist the collusion attacks by malicious users. In addition, the high recall of our model indicates that the proposed model can correctly judge whether a safety management service is under collusion attack.

The precision was obtained by comparing the trust of a safety management service with the trust promised by the platform, while the recall was calculated by comparing that with the trust perceived by user terminals.

Figure 11 presents the precisions and recalls of our model (blue curves) and reference model (red curves). It is obvious that the precisions and recalls of both models decreased slightly with the growing number of safety management services. The reason is that the increase of such services adds difficulty to model computing and increases the computing error. Of course, our model performed better than the reference model and achieved higher precision and recall. In summary, our model is an ideal tool to compute the safety level of safety management services.

5. Conclusions

This paper investigates the safety management solution for HMUTs based on trusted computing. First, the authors set up a multidimensional trusted computing model for HMUTs. Then, the computing method was detailed for composite trust based on single-dimensional trust. After that, a trust management scheme was prepared for HMUTs.

The proposed model was compared experimentally with four other models. Specifically, the authors plotted the relationship between the success rate of collaboration and the proportion of low-competence terminals and that between the success rate of collaboration and the proportion of malicious terminals. The relationship curves confirm that our trusted computing model outperformed the other models in resisting the same malicious attacks. Furthermore, the trust, precision, and recall of our model were contrasted with a reference model. The comparison demonstrates that our model performed better than the reference model and achieved higher precision and recall.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.