Abstract
Mobile health monitoring, which can monitor the medical users’ real-time physiology parameters, has been expected as an effective way to improve medical service quality and make response to the emergency. Unfortunately, it also risks the information privacy of both the medical users and the healthcare service providers when they upload their information. This paper is to propose a privacy-preserving based scheduling scheme for emergency response (PPSSER) to protect the privacy of the involved users when an emergency occurs. Moreover, the multi-dimensional region query method is introduced to conseal the personal health information and homomorphic encryption is used to protect the location and attribute privacy of the users. Finally, the simulation demonstrates the effectiveness and feasibility of the proposed scheme.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alam, M.M., Berder, O., Menard, D., Sentieys, O.: TAD-MAC: traffic-aware dynamic MAC protocol for wireless body area sensor networks. IEEE J. Emerg. Sel. Top. Circuits Syst. 2(1), 109–119 (2012)
Chen, L., Cao, Z., Lu, R., Liang, X., Shen, X.: EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks. In: IEEE GLOBECOM, Houston, TX, USA, pp. 1–5 (2011)
Dhukaram, A., Baber, C., Elloumi, L., van Beijnum, B.J., De Stefanis, P.: End-user perception towards pervasive cardiac healthcare services: benefits, acceptance, adoption, risks, security, privacy and trust. In: International Conference on Pervasive Computing Technologies for Healthcare, pp. 478–484, May 2011
Feng, D., Kim, J., Khadra, M., Hudson, D., Roux, C.: Guest editorial: telehealth systems and applications. IEEE J. Biomed. Health Inform. 19(1), 81 (2015)
Guo, L., Zhang, C., Sun, J., Fang, Y.: A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans. Mob. Comput. 13(9), 1927–1941 (2014)
Lin, H., Shao, J., Zhang, C., Fang, Y.: CAM: cloud-assisted privacy preserving mobile health monitoring. IEEE Trans. Inf. Forensics Secur. 8(6), 985–997 (2013)
Lu, R., Lin, X., Luan, T., Liang, X., Li, X., Chen, L., Shen, X.: Prefilter: an efficient privacy-preserving relay filtering scheme for delay tolerant networks. In: Proceedings IEEE INFOCOM, pp. 1395–1403, March 2012
Lu, R., Lin, X., Shen, X.: SPOC: a secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE Trans. Parallel Distrib. Syst. 24(3), 614–624 (2013)
Lynn, B.: The pairing-based cryptography (PBC) library (2012). http://crypto.stanford.edu/pbc
Sun, J., Zhu, X., Fang, Y.: Preserving privacy in emergency response based on wireless body sensor networks. In: IEEE GLOBECOM, pp. 1–6, December 2010
Gmp library. http://gmplib.org
Acknowledgment
This work was supported in part by the National Basic Research Program of China under Grant 2010CB731803, in part by the NSF of China under Grants U1405251, 61221003, 61290322, 61174127, and 61273181, in part by the Ministry of Education of China under Grants NCET-13-0358, 20110073130005, and 20110073120025, and in part by the Science and Technology Commission of Shanghai Municipality (STCSM), China under Grant 13QA1401900.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Yu, W., Chen, C., Yang, B., Guan, X. (2015). PPSSER: Privacy-Preserving Based Scheduling Scheme for Emergency Response in Medical Social Networks. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_70
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_70
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)