Skip to main content

Research on Telemedical Monitoring System Based on Homomorphic Encryption

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11634))

Included in the following conference series:

  • 1345 Accesses

Abstract

Social trends such as the accelerating aging of the population and the prevalence of chronic non-communicable diseases have made high-quality and long-term medical care gradually become the focus of attention of the whole society. Telemedical monitoring technology can greatly reduce the demand of hospital-centered medical resources, but increase the risk of data disclosure of personal privacy at the same time. How to ensure the privacy data security of patient in the course of telemedicine is an urgent problem to be solved in the development of new medical system. Based on the technology of homomorphic encryption, this paper studies the feasibility and specific encryption implementation of the telemedical surveillance system, after obtaining the patient indicators, and creates a prototype of a real-time early warning system for hospital, family and individual patients. At last a simulation test is designed on the Windows platform. The results and conclusion provide some reference for the future research of “cloud medicine” technology and give some advise on the application of homomorphic encryption technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Li, J., Gu, J.: Challenges and opportunities of medicine in the age of big data and personalized medicine. Med. Philos. 35(1A), 5–10 (2014)

    Google Scholar 

  2. Xue, F., Chen, H.-B.: Analysis of privacy ethics of big data. Stud. Dialectics Nat. 2, 44–48 (2015)

    Google Scholar 

  3. Schwab, K: The Fourth Industrial Revolution. http://www.foreignaffairs.com/articles/2015-12-12/fourth-industrial-revolution. Accessed 26 Mar 2016

  4. Wang, Q.-F.: Rational thinking on hierarchical control of medical privacy in the era of big data. Med. Philos. (A) 37(5A), 5–8 (2016)

    Google Scholar 

  5. Rivest, R., Adleman, L., Dertouzos, M.: On Data Banks and Privacy Homorphisms. Foundations of Secure Computation. Academic Press, New York (1978)

    Google Scholar 

  6. Cohen, J., Fischer, M.: A robust and verifiable cryptographically secure election scheme. In: Proceedings of the 26th Annual Symposium on Foundation of Computer Science, pp. 372–382. IEEE, Piscataway (1985)

    Google Scholar 

  7. Li, S., Dou, J., Wang, D.: Survey on homomorphic encryption and its applications to cloud security. J. Comput. Res. Dev. 52(6), 1378–1388 (2015)

    Google Scholar 

  8. Li, Z.-Y., Gui, X.-L., Gu, Y.-J., LI, X.-S., Dai, H.-J., Zhang, X.-J.: Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing. J. Softw. 29(7), 1830–1851 (2018)

    MATH  Google Scholar 

  9. Peng, C.-H., Tian, Y.-L., Zhang, B., Xu, Z.-P.: General transitive signature scheme based on homomorphic encryption. J. Commun. 34(11), 18–25 (2013)

    Google Scholar 

  10. Gong, L., Li, S., Guo, Y.: the development and applications of homomorphic encryption. ZTE Technol. J. 22(1), 26–29 (2016)

    Google Scholar 

  11. Meng, R., Rice, S.G., Wang, J., Sun, X.: A fusion steganographic algorithm based on faster R-CNN. CMC: Comput. Mater. Continua 55(1), 001–016 (2018)

    Google Scholar 

  12. Liu, Y., Peng, H., Wang, J.: Verifiable diversity ranking search over encrypted outsourced data. CMC Comput. Mater. Continua 55(1), 037–057 (2018)

    Google Scholar 

  13. Brakersk, Z., Vaikuntanathan, V., Wee, H., Wichs, D.: Obfuscating conjunctions under entropic ring LWE. In: Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, Massachusetts, USA, pp. 14–17 (2016)

    Google Scholar 

Download references

Acknowledgments

Thanks for the valuable suggestion from ICAIS/ICCCS2019 paper viewers. And particularly grateful to ICAIS/ICCCS2019 committee for their works on the publish of paper. The study is supported by Research Project of National University of Defense Technology (ZK18-03-46), and part of the research results participated in the 2016 National College Students Information Security Competition, to whom we also owe many thanks.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fei Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, F., Lin, S., Tan, W., Qian, F., Li, X. (2019). Research on Telemedical Monitoring System Based on Homomorphic Encryption. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11634. Springer, Cham. https://doi.org/10.1007/978-3-030-24271-8_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24271-8_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24270-1

  • Online ISBN: 978-3-030-24271-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics