Abstract
Social trends such as the accelerating aging of the population and the prevalence of chronic non-communicable diseases have made high-quality and long-term medical care gradually become the focus of attention of the whole society. Telemedical monitoring technology can greatly reduce the demand of hospital-centered medical resources, but increase the risk of data disclosure of personal privacy at the same time. How to ensure the privacy data security of patient in the course of telemedicine is an urgent problem to be solved in the development of new medical system. Based on the technology of homomorphic encryption, this paper studies the feasibility and specific encryption implementation of the telemedical surveillance system, after obtaining the patient indicators, and creates a prototype of a real-time early warning system for hospital, family and individual patients. At last a simulation test is designed on the Windows platform. The results and conclusion provide some reference for the future research of “cloud medicine” technology and give some advise on the application of homomorphic encryption technology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Li, J., Gu, J.: Challenges and opportunities of medicine in the age of big data and personalized medicine. Med. Philos. 35(1A), 5–10 (2014)
Xue, F., Chen, H.-B.: Analysis of privacy ethics of big data. Stud. Dialectics Nat. 2, 44–48 (2015)
Schwab, K: The Fourth Industrial Revolution. http://www.foreignaffairs.com/articles/2015-12-12/fourth-industrial-revolution. Accessed 26 Mar 2016
Wang, Q.-F.: Rational thinking on hierarchical control of medical privacy in the era of big data. Med. Philos. (A) 37(5A), 5–8 (2016)
Rivest, R., Adleman, L., Dertouzos, M.: On Data Banks and Privacy Homorphisms. Foundations of Secure Computation. Academic Press, New York (1978)
Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of the 26th Annual Symposium on Foundation of Computer Science, pp. 372–382. IEEE, Piscataway (1985)
Li, S., Dou, J., Wang, D.: Survey on homomorphic encryption and its applications to cloud security. J. Comput. Res. Dev. 52(6), 1378–1388 (2015)
Li, Z.-Y., Gui, X.-L., Gu, Y.-J., LI, X.-S., Dai, H.-J., Zhang, X.-J.: Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing. J. Softw. 29(7), 1830–1851 (2018)
Peng, C.-H., Tian, Y.-L., Zhang, B., Xu, Z.-P.: General transitive signature scheme based on homomorphic encryption. J. Commun. 34(11), 18–25 (2013)
Gong, L., Li, S., Guo, Y.: the development and applications of homomorphic encryption. ZTE Technol. J. 22(1), 26–29 (2016)
Meng, R., Rice, S.G., Wang, J., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. CMC: Comput. Mater. Continua 55(1), 001–016 (2018)
Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. CMC Comput. Mater. Continua 55(1), 037–057 (2018)
Brakersk, Z., Vaikuntanathan, V., Wee, H., Wichs, D.: Obfuscating conjunctions under entropic ring LWE. In: Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Massachusetts, USA, pp. 14–17 (2016)
Acknowledgments
Thanks for the valuable suggestion from ICAIS/ICCCS2019 paper viewers. And particularly grateful to ICAIS/ICCCS2019 committee for their works on the publish of paper. The study is supported by Research Project of National University of Defense Technology (ZK18-03-46), and part of the research results participated in the 2016 National College Students Information Security Competition, to whom we also owe many thanks.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Xiao, F., Lin, S., Tan, W., Qian, F., Li, X. (2019). Research on Telemedical Monitoring System Based on Homomorphic Encryption. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-24271-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24270-1
Online ISBN: 978-3-030-24271-8
eBook Packages: Computer ScienceComputer Science (R0)