Abstract
Due to the high maternal mortality, it is particularly necessary to attend pregnant woman by emergency communication system as timely treatment to avoid maternal deaths. In this paper, we propose an emergency communication system based on cloud computing and mobile devices for a pregnant woman to have a more efficiently and timely treatment. Moreover, security is the utmost important issue. The proposed scheme integrates proxy authorization of the Schnorr’s signature, symmetric encryption technology, a message authentication code, and RFC 2631 to protect the communication messages and the pregnant woman’s privacy not been revealed or stolen.
References
Chen, C.L., Yang, T.T., Chiang, M.-L., Shih, T.F.: A privacy authentication scheme based on cloud for medical environment. J. MS 38(11), 143 (2014)
Website of WHO. http://www.who.int/mediacentre/factsheets/fs348/en/
Platania, M., Obenshain, D., Tantillo, T., Amir, Y., Suri, N.: On choosing server-or client-side solutions for BFT. ACM Comput. Surv. 48(4), 61 (2016)
Mavletova, A.: Data quality in PC and mobile web surveys. SSCR 31(6), 725–743 (2013)
Sailunaz, K., Alhussein, M., Shahiduzzaman, M., Anowar, F., Mamun, K.A.A.: CMED: Cloud based medical system framework for rural health monitoring in developing countries. CEE 53, 469–481 (2016)
Mould-Millman, N.K., de Vries, S., Stein, C., Kafwamfwa, M., Dixon, J., Yancey, A., Laba, B., Overton, J., McDaniel, R., Wallis, L.A.: Developing emergency medical dispatch systems in Africa–recommendations of the african federation for emergency medicine/international academies of emergency dispatch working group. Afr. J. EM 5(3), 141–147 (2015)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE 79(9), 1338–1354 (1996)
Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)
Chen, C.L., Chen, Y.Y., Lee, C.-C., Wu, C.-H.: Design and analysis of a secure and effective emergency system for mountaineering events. J. Supercomputing 70(1), 54–74 (2014)
Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM, Fairfax (1993)
Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). doi:10.1007/3-540-68339-9_33
Rescorla, E.: Diffie-Hellman key agreement method (1999). https://www.ietf.org/rfc/rfc2631.txt
Acknowledgements
This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract number MOST 105-2221-E-324-007, MOST 105-2622-E-212-008 -CC2 and MOST103-2632-E-324-001-MY3.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Li, GC., Chen, CL., Lin, F., Shin, J., Gu, C. (2017). Design of a Secure Emergency Communication System Based on Cloud for Pregnancy. In: Au, M., Castiglione, A., Choo, KK., Palmieri, F., Li, KC. (eds) Green, Pervasive, and Cloud Computing. GPC 2017. Lecture Notes in Computer Science(), vol 10232. Springer, Cham. https://doi.org/10.1007/978-3-319-57186-7_42
Download citation
DOI: https://doi.org/10.1007/978-3-319-57186-7_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-57185-0
Online ISBN: 978-3-319-57186-7
eBook Packages: Computer ScienceComputer Science (R0)