Abstract
Mobile health monitoring, which has been expected as an effective way to improve medical service quality, can monitor the medical users’ real-time physiology parameters and the Emergency Response Support System (ERSS) is built up to deal with emergencies. Unfortunately, the information privacy of both the medical users and the healthcare service providers is at risk when their private information is uploaded to the health center. Especially, when emergencies happen, the privacy must be protected and the responding time of the system should not be compromised. In order to protect the privacy and also maintain high efficiency when an emergency occurs, this paper proposes a privacy-preserving based scheduling scheme for emergency response (PPSSER) system. The system can protect physiological data privacy, location privacy and personal attribute privacy. Also it can defend collusion attack. The simulation demonstrates the effectiveness and feasibility of the proposed scheme.
Similar content being viewed by others
References
Lu R, Lin X, Shen X (2012) SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE IEEE Trans. Parallel Distrib Syst 24(3):146. doi:10.1109/TPDS
Zhang K, Liang X, Baura M, Lu R, Shen X S (2014) PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs. Information Sciences 284:130– 141
Alam M M, Berder O, Menard D, Sentieys O (2012) TAD-MAC: traffic-aware dynamic MAC protocol for wireless body area sensor networks. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2 (1):109–119
Pavlopoulos S, Kyriacou E, Berler A, Dembeyiotis S, Koutsouris D (1998) A novel emergency telemedicine system based on wireless communication technology-AMBULANCE. IEEE Trans Inf Technol Biomed 2(4):261–267. doi:10.1109/4233.737581
Kim TY, Coenen A, Hardiker N (2010) A quality improvement model for healthcare terminologies. J Biomed Inform 43(6):1036–1043. doi:10.1016/j.jbi.2010.08.006
Lin H, Shao J, Zhang C, Fang Y (2013) CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Trans Inf. Forensics Secur 8(6):985–997. doi:10.1109/TIFS.2013.2255593
Dhukaram A, Baber C, Elloumi L, van Beijnum B J, De Stefanis P (2011) End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust. In: International Conference on Pervasive Computing Technologies for Healthcare, p 478–484
Chen L, Cao Z, Lu R, Liang X, Shen X (2011) EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks. In: IEEE GLOBECOM. IEEE, Houston, pp 1–5
Lu R, Lin X, Liang X, Shen X S (2010) Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network. In: Proceedings of the Fifth International Conference on Body Area Networks. ACM, New York , pp 8–15
Lu R, Lin X, Luan T, Liang X, Li X, Chen L, Shen X (2012) Prefilter: An efficient privacy-preserving relay filtering scheme for delay tolerant networks. In: Proceedings IEEE INFOCOM, p 1395–1403. doi:10.1109/INFCOM.2012.6195504
Tong Y, Sun J, Chow S, Li P (2014) Cloud-assisted mobile-access of health data with privacy and auditability. IEEE Journal of Biomedical and Health Informatics 18(2):419–429. doi:10.1109/JBHI.2013.2294932
Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Complex Networks 13(2):102–112
Sun J, Zhu X, Fang Y (2010) Preserving privacy in emergency response based on wireless body sensor networks. In: IEEE GLOBECOM, p 1–6. doi:10.1109/GLOCOM.2010.5684209
Shi E, Bethencourt J, Chan T H, Song D, Perrig A (2007) Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy. IEEE, Berkeley, pp 350– 364
Lin H, Zhu X, Fang Y, Zhang C, Cao Z (2011) Efficient trust based information sharing schemes over distributed collaborative networks. In: Military Communications Conference. IEEE, Baltimore, pp 1399–1403
Boyen X, Waters B (2006) Anonymous hierarchical identity-based encryption (without random oracles). In: Advances in Cryptology. Springer, Santa Barbara, pp 290–307
Menezes A J, Okamoto T, Vanstone S A (1993) Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans Inf Theory 39(5):1639–1646
Frey G, Muller M, Ruck H G (1999) The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans Inf Theory 45(5):1717–1719
Galbraith S D, Harrison K, Soldera D (2002) Implementing the tate pairing. In: Algorithmic Number Theory, pp 324C337. Springer, Sydney
Garefalakis T (2004) The generalized weil pairing and the discrete logarithm problem on elliptic curves. Theor Comput Sci 321(1):59–72
Guo L, Zhang C, Sun J, Fang Y (2013) A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans Mob Comput 13(9):84. doi:10.1109/TMC
Lynn B (2012) The pairing-based cryptography (PBC) library. http://crypto.stanford.edu/pbc
Acknowledgments
This work was supported in part by the National Basic Research Program of China under Grant 2010CB731803, in part by the NSF of China under Grants U1405251, 61221003, 61290322, 61174127, and 61273181, in part by the Ministry of Education of China under Grants NCET 13-0358, 20110073130005, and 20110073120025, and in part by the Science and Technology Commission of Shanghai Municipality (STCSM), China under Grant 13QA1401900 and 14511107903, sponsored by Medical and Engineering Interdiscipline Project under Grant YG2013ZD0504 in Shanghai Jiao Tong University.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yu, W., Liu, Z., Chen, C. et al. Privacy-preserving design for emergency response scheduling system in medical social networks. Peer-to-Peer Netw. Appl. 10, 340–356 (2017). https://doi.org/10.1007/s12083-016-0429-4
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-016-0429-4