CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring

被引:89
作者
Lin, Huang [1 ]
Shao, Jun [2 ]
Zhang, Chi [3 ]
Fang, Yuguang [4 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[3] Univ Sci & Technol China, Sch Informat Sci & Technol, Hefei 230026, Anhui, Peoples R China
[4] Xidian Univ, State Key Lab ISN, Xian 710071, Peoples R China
基金
中国国家自然科学基金; 美国国家科学基金会;
关键词
Healthcare; key private proxy reencryption; mobile health (mHealth); outsourcing decryption; privacy; BRANCHING PROGRAMS;
D O I
10.1109/TIFS.2013.2255593
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients' privacy and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a cloud-assisted privacy preserving mobile health monitoring system to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy reencryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients' privacy and service providers' intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.
引用
收藏
页码:985 / 997
页数:13
相关论文
共 55 条
[1]  
Al-Fedaghi S., 2012, Intelligent Information Management, V4, P123
[2]  
[Anonymous], 2012, SECURITY 12
[3]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[4]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
[5]  
Baldi P, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P691
[6]   Privacy-Preserving ECG Classification With Branching Programs and Neural Networks [J].
Barni, Mauro ;
Failla, Picrluigi ;
Lazzeretti, Riccardo ;
Sadeghi, Ahmad-Reza ;
Schneider, Thomas .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (02) :452-468
[7]  
Barni M, 2009, LECT NOTES COMPUT SC, V5789, P424, DOI 10.1007/978-3-642-04444-1_26
[8]  
Blake I.F., 2004, Advances in Cryptology (ASIACRYPT), volume 3329 of Lecture Notes in Computer Science (LNCS), V3329, P122
[9]  
Blake IF, 2004, LECT NOTES COMPUT SC, V3329, P515
[10]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122