SPCOR: a secure and privacy‐preserving protocol for mobile‐healthcare emergency to reap computing opportunities at remote and nearby

S Alex, DP Pattathil… - IET Information …, 2020 - Wiley Online Library
S Alex, DP Pattathil, D Kakkanattu Jagalchandran
IET Information Security, 2020Wiley Online Library
This study proposes a secure and privacy‐preserving protocol for outsourcing health data
processing operations during the emergency in the mobile healthcare network. The
proposed protocol provides a practical solution to utilise smartphone resources at both
remote and nearby for processing the overwhelming personal health information (PHI) of a
user in healthcare emergency opportunistically and securely. The patients with symptoms
matching with those of the user in an emergency are considered as opportunities to …
This study proposes a secure and privacy‐preserving protocol for outsourcing health data processing operations during the emergency in the mobile healthcare network. The proposed protocol provides a practical solution to utilise smartphone resources at both remote and nearby for processing the overwhelming personal health information (PHI) of a user in healthcare emergency opportunistically and securely. The patients with symptoms matching with those of the user in an emergency are considered as opportunities to minimise the privacy disclosure of the user. Opportunities at both remote and nearby are exploited with the help of a base station in the 4G network. Moreover, novel and efficient outsourced privacy access control schemes are developed to minimise the power drain of the user in an emergency without compromising his privacy. The outsourced privacy access control is facilitated through the design of innovative schemes for outsourced attribute‐based access mechanism and an outsourced privacy‐preserving scalar product computation. Detailed performance evaluations through implementations on Raspberry Pi 3B + board and simulations using NS3 network simulator and Scyther tool confirm the efficiency of the proposed protocol in providing highly reliable PHI processing and transmissions with reasonably low delay and energy consumption while maintaining user privacy.
Wiley Online Library
以上显示的是最相近的搜索结果。 查看全部搜索结果