access icon free SPCOR: a secure and privacy-preserving protocol for mobile-healthcare emergency to reap computing opportunities at remote and nearby

This study proposes a secure and privacy-preserving protocol for outsourcing health data processing operations during the emergency in the mobile healthcare network. The proposed protocol provides a practical solution to utilise smartphone resources at both remote and nearby for processing the overwhelming personal health information (PHI) of a user in healthcare emergency opportunistically and securely. The patients with symptoms matching with those of the user in an emergency are considered as opportunities to minimise the privacy disclosure of the user. Opportunities at both remote and nearby are exploited with the help of a base station in the 4G network. Moreover, novel and efficient outsourced privacy access control schemes are developed to minimise the power drain of the user in an emergency without compromising his privacy. The outsourced privacy access control is facilitated through the design of innovative schemes for outsourced attribute-based access mechanism and an outsourced privacy-preserving scalar product computation. Detailed performance evaluations through implementations on Raspberry Pi 3B + board and simulations using NS3 network simulator and Scyther tool confirm the efficiency of the proposed protocol in providing highly reliable PHI processing and transmissions with reasonably low delay and energy consumption while maintaining user privacy.

Inspec keywords: smart phones; 4G mobile communication; mobile computing; medical information systems; protocols; medical computing; data privacy; health care; authorisation; emergency management

Other keywords: overwhelming personal health information; outsourcing health data processing operations; secure privacy-preserving; mobile-healthcare emergency; efficient outsourced privacy access control schemes; mobile healthcare network; outsourced privacy-preserving scalar product computation; outsourced attribute-based access mechanism; NS3 network simulator; privacy disclosure; user privacy

Subjects: Mobile radio systems; Protocols; Biology and medical computing; Mobile, ubiquitous and pervasive computing; Protocols; Emergency management; Data security; Medical administration

References

    1. 1)
      • 24. Li, M., Lou, W., Ren, K.: ‘Data security and privacy in wireless body area networks’, IEEE Wirel. Commun., 2010, 17, (1), pp. 5158.
    2. 2)
      • 14. https://about.att.com/stor/firstnet_selects_att_to_build_network_supporting_first _responders.html.
    3. 3)
      • 6. Conti, M., Kumar, M.: ‘Opportunities In opportunistic computing’, IEEE Comput., 2010, 43, (1), pp. 4250.
    4. 4)
      • 34. Kurian, A.: ‘Latency Analysis and Reduction in a 4G Network’, M.S. Thesis, Dept. Elect. Eng., TU Delft, Delft, Netherlands, 2018.
    5. 5)
      • 25. Sun, J., Fang, Y.: ‘Cross-domain data sharing in distributed electronic health record systems’, IEEE Trans. Parallel Distrib. Syst., 2010, 21, (6), pp. 754764.
    6. 6)
      • 11. Meshram, C., Lee, C.-C., Meshram, S. G., et al.: ‘An efficient mobile-healthcare emergency framework’, J. Med. Syst., 2020, 44, (58), pp. 114.
    7. 7)
      • 15. Boneh, D., Franklin, M.K.: ‘Identity-based encryption from the weil pairing’. Proc. Annual Int. Conf. Cryptology Organized (CRYPTO ‘01), California, USA, 2001, pp. 213229.
    8. 8)
      • 18. ericsson.com: LTE Broadcast ericsson White paper, [Online]. Available at https://archive.ericsson.net/service/internet/picov/get?DocNo=1/28701-FGD101187 Lang=ENHighestFree=Y.
    9. 9)
      • 29. http://www.uaproperty.com/articles/In-Ukraine-ambulance-come-patient-10-minutes.html, 2012.
    10. 10)
      • 28. Liang, X., Barua, M, Lu, R., et al: ‘Privacy-preserving wireles s data transmission for e-healthcare applications’, IEEE Comsoc MMTC E-Lett., 2011, 6, (11), pp. 3945.
    11. 11)
      • 33. Lin, X., Lu, R., Liang, X., et al: ‘STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in vanets’. Proc. of INFOCOM ‘11, 2011, pp. 21472155.
    12. 12)
      • 13. https://www.cnet.com/news/at-t-partners-on-5g-enabled-hospital-effort/.
    13. 13)
      • 26. Zhang, A., Chen, J., Hu, R.Q., et al: ‘SeDS: secure data sharing strategy for D2D communication in LTE-advanced networks’, IEEE Trans. Veh. Technol., 2016, 65, (4), pp. 26592672.
    14. 14)
      • 10. Lee, C.-C., Hsu, C.-W., Lai, Y.-M., et al: ‘An enhanced Mobile-healthcare emergency system based on extended chaotic maps’, J. Med. Syst., 2013, 37, pp. 112.
    15. 15)
      • 30. Ross, S.: ‘Introduction to probability models’ (Pearson education, Academic Press, USA, 2019, 9th Edn.).
    16. 16)
      • 5. Lu, R., Lin, X., Shen, X.: ‘SPOC: a secure and privacy-preserving opportunistic computing framework for Mobile-healthcare emergency’, IEEE Trans. Parallel Distrib. Syst., 2013, 24, (3), pp. 614624.
    17. 17)
      • 21. Lu, R., Chen, X., Lin, X., et al: ‘PEC: A privacy-preserving emergency call scheme for Mobile healthcare social networks’, IEEE/KICS J. Commun. Netw., 2011, 13, (2), pp. 102112.
    18. 18)
      • 19. Cremers, C., Mauw, S.: ‘Operational semantics and verification of security protocols’, in ‘Information security and cryptography’ (Springer-Verlag, Berlin Heidelberg, Germany2012), pp. 1363.
    19. 19)
      • 1. Hang, K.Z., Yang, K., Liang, X., et al: ‘Security and privacy for Mobile healthcare networks :from a quality Of protection perspective’, IEEE Wirel. Commun., 2015, 22, pp. 104112.
    20. 20)
      • 35. Bortolotti, D., Mangia, M., Bartolini, A., et al: ‘Energy-aware bio-signal compressed sensing reconstruction on the WBSN-gateway’, IEEE Trans. Emerg. Top. Comput., 2018, 6, pp. 370381.
    21. 21)
      • 20. Lu, R., Lin, X., Liang, X., et al: ‘Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network’. Proc. Fifth Int. Conf. Body Area Networks (BodyNets ‘10), Corfu, Greece, 2010.
    22. 22)
      • 22. Dong, C., Chen, L.: ‘A fast secure dot product protocol with application to privacy preserving association rule mining’. In Pacific-Asia Conf. on Knowledge Discovery and Data Mining, Cham, May 2014, pp. 606617.
    23. 23)
      • 31. Ding, N., Wagner, D., Chen, X.: ‘Characterizing and modeling the impact of wireless signal strength on smartphone battery drain’. ACM SIGMETRICS'13, Pittsburgh, USA, June 2013.
    24. 24)
      • 4. Yuce, M.R., Ng, S.W.P., Myo, N.L., et al: ‘Wireless body sensor network using medical implant band’, J. Med. Syst., 2007, 31, (6), pp. 467474.
    25. 25)
      • 9. Passarella, A., Conti, M., Borgia, E., et al: ‘Performance evaluation of service execution in opportunistic computing’. Proc. 13th ACM Int. Conf. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM ‘10), 2010, pp. 291298.
    26. 26)
      • 23. Amirbekyan, A., Estivill-Castro, V.: ‘A new efficient privacy-preserving scalar product protocol’. Proc. Sixth Australasian Conf. Data Mining and Analytics (AusDM ‘07), Gold Coast, Australia, 2007, pp. 209214.
    27. 27)
      • 16. Libert, B., Quisquater, J.J.: ‘The exact security of an identity based signature and its applications’, Tech. Rep., 2004, eprint.iacr.org/2004/.
    28. 28)
      • 27. Ayday, E., Raisaro, J.L., Hubaux, J.-P.: ‘Privacy-enhancing technologies for medical tests using genomic data’. NDSS'13, San Diego, USA, 2013.
    29. 29)
      • 8. Conti, M., Giordano, S., May, M., et al: ‘From opportunistic networks to opportunistic computing’, IEEE Commun. Mag., 2010, 48, (9), pp. 126139.
    30. 30)
      • 3. Liang, X., Barua, M., Chen, L., et al: ‘Enabling pervasive healthcare through continous remote health monitoring’, IEEE Wirel. Commun., 2012, 19, pp. 1018.
    31. 31)
      • 17. Alcatel-Lucent: The LTE Network Architecture A comprehensive tutorial. [Online]. Available at http://www.cse.unt.edu /rdantu/FALL _2013_WIRELESS_NETWORKS/LTE_Alcatel_White_Paper.pdf.
    32. 32)
      • 7. Avvenuti, M., Corsini, P., Masci, P., et al: ‘Opportunistic computing for wireless sensor networks’. IEEE Proc. of MASS'07, 2007, pp. 16.
    33. 33)
      • 12. https://www.businessinsider.com/att-onepulse-smartwatch-medical-wearable-lte-2019-3?IR=T.
    34. 34)
      • 32. Price, M.: ‘Wireless communication using bluetooth and android’, [Online]. Available at https://www.egr.msu.edu/classes/ece480/capstone/fall13 /group 8/Bluetooth Communication.pdf.
    35. 35)
      • 2. Sahi, M.A., Abbas, H., Saleem, K., et al: ‘Privacy preservation in e-healthcare environments: state of the art and future directions’, IEEE Access, 2018, 6, pp. 464478.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2020.0086
Loading

Related content

content/journals/10.1049/iet-ifs.2020.0086
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading