Open AccessOpen Access


Fog-based Self-Sovereign Identity with RSA in Securing IoMT Data

A. Jameer Basha1, N. Rajkumar2, Mohammed A. AlZain3, Mehedi Masud4, Mohamed Abouhawwash5,6,*

1 Department of Computer Science and Engineering, Hindusthan Institute of Technology, Coimbatore, 641032, India
2 Department of Computer Science and Engineering, School of Engineering, Presidency University, Bangalore, 560064, India
3 Department of Information Technology, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
4 Department of Computer Science, College of Computers and Information Technology, Taif University, Taif, 21944, Saudi Arabia
5 Department of Mathematics, Faculty of Science, Mansoura University, Mansoura, 35516, Egypt
6 Department of Computational Mathematics, Science, and Engineering (CMSE), Michigan State University, East Lansing, MI, 48824, USA

* Corresponding Author: Mohamed Abouhawwash. Email:

Intelligent Automation & Soft Computing 2022, 34(3), 1693-1706.


In the healthcare applications, Internet of Medical Things (IoMT) comforts the communication processes between the medical devices and the humans via wireless network. Moreover, this communication helps both the physicians and the patients to contact remotely for the diagnosis of the disease’s wearable devices sensor signals. However, IoMT system violates the privacy preserving of Patient’s Health Record (PHR) as well as self-sovereign identity of patient. In this regard, security action should be taken. Previous techniques used in IoMT are in lack of data consistency, confidentiality, and inaccessible of data. To overcome these issues, the fog computing-based technology is used in order to handle the health data of the patient for digital identity management. Self-Sovereign Identity empowers the patient to handle and control their own data. This paper proposes Fog Computing based Self-Sovereign Identity with Rivest, Shamir, Adleman (RSA) for IoMT (FCSSI+RSA-IoMT). For that, it keeps the Patient Health Record (PHR) securely and effectively using RSA to make the identification and authentication procedures at ease. Besides, PHR is used to store the sensitive information regarding identity and privacy of the patient. Additionally, it records the diagnosis history of patient by the doctors and radiology images. Therefore, the result evaluation proves that, for 100 users, the proposed technique takes only 631 secs and also the throughput performance is better when compared to the existing techniques.


Cite This Article

A. Jameer Basha, N. Rajkumar, M. A. AlZain, M. Masud and M. Abouhawwash, "Fog-based self-sovereign identity with rsa in securing iomt data," Intelligent Automation & Soft Computing, vol. 34, no.3, pp. 1693–1706, 2022.

This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 529


  • 235


  • 0


Share Link

WeChat scan