Skip to main content
Log in

Privacy-preserving design for emergency response scheduling system in medical social networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile health monitoring, which has been expected as an effective way to improve medical service quality, can monitor the medical users’ real-time physiology parameters and the Emergency Response Support System (ERSS) is built up to deal with emergencies. Unfortunately, the information privacy of both the medical users and the healthcare service providers is at risk when their private information is uploaded to the health center. Especially, when emergencies happen, the privacy must be protected and the responding time of the system should not be compromised. In order to protect the privacy and also maintain high efficiency when an emergency occurs, this paper proposes a privacy-preserving based scheduling scheme for emergency response (PPSSER) system. The system can protect physiological data privacy, location privacy and personal attribute privacy. Also it can defend collusion attack. The simulation demonstrates the effectiveness and feasibility of the proposed scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Lu R, Lin X, Shen X (2012) SPOC: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency. IEEE IEEE Trans. Parallel Distrib Syst 24(3):146. doi:10.1109/TPDS

    Article  Google Scholar 

  2. Zhang K, Liang X, Baura M, Lu R, Shen X S (2014) PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs. Information Sciences 284:130– 141

    Article  MathSciNet  Google Scholar 

  3. Alam M M, Berder O, Menard D, Sentieys O (2012) TAD-MAC: traffic-aware dynamic MAC protocol for wireless body area sensor networks. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 2 (1):109–119

    Article  Google Scholar 

  4. Pavlopoulos S, Kyriacou E, Berler A, Dembeyiotis S, Koutsouris D (1998) A novel emergency telemedicine system based on wireless communication technology-AMBULANCE. IEEE Trans Inf Technol Biomed 2(4):261–267. doi:10.1109/4233.737581

    Article  Google Scholar 

  5. Kim TY, Coenen A, Hardiker N (2010) A quality improvement model for healthcare terminologies. J Biomed Inform 43(6):1036–1043. doi:10.1016/j.jbi.2010.08.006

    Article  Google Scholar 

  6. Lin H, Shao J, Zhang C, Fang Y (2013) CAM: Cloud-assisted privacy preserving mobile health monitoring. IEEE Trans Inf. Forensics Secur 8(6):985–997. doi:10.1109/TIFS.2013.2255593

    Article  Google Scholar 

  7. Dhukaram A, Baber C, Elloumi L, van Beijnum B J, De Stefanis P (2011) End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust. In: International Conference on Pervasive Computing Technologies for Healthcare, p 478–484

  8. Chen L, Cao Z, Lu R, Liang X, Shen X (2011) EPF: An event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks. In: IEEE GLOBECOM. IEEE, Houston, pp 1–5

    Google Scholar 

  9. Lu R, Lin X, Liang X, Shen X S (2010) Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network. In: Proceedings of the Fifth International Conference on Body Area Networks. ACM, New York , pp 8–15

    Chapter  Google Scholar 

  10. Lu R, Lin X, Luan T, Liang X, Li X, Chen L, Shen X (2012) Prefilter: An efficient privacy-preserving relay filtering scheme for delay tolerant networks. In: Proceedings IEEE INFOCOM, p 1395–1403. doi:10.1109/INFCOM.2012.6195504

  11. Tong Y, Sun J, Chow S, Li P (2014) Cloud-assisted mobile-access of health data with privacy and auditability. IEEE Journal of Biomedical and Health Informatics 18(2):419–429. doi:10.1109/JBHI.2013.2294932

    Article  Google Scholar 

  12. Liang X, Lu R, Chen L, Lin X, Shen X (2011) PEC: A privacy-preserving emergency call scheme for mobile healthcare social networks. J Complex Networks 13(2):102–112

    Article  Google Scholar 

  13. Sun J, Zhu X, Fang Y (2010) Preserving privacy in emergency response based on wireless body sensor networks. In: IEEE GLOBECOM, p 1–6. doi:10.1109/GLOCOM.2010.5684209

  14. Shi E, Bethencourt J, Chan T H, Song D, Perrig A (2007) Multi-dimensional range query over encrypted data. In: IEEE Symposium on Security and Privacy. IEEE, Berkeley, pp 350– 364

    Google Scholar 

  15. Lin H, Zhu X, Fang Y, Zhang C, Cao Z (2011) Efficient trust based information sharing schemes over distributed collaborative networks. In: Military Communications Conference. IEEE, Baltimore, pp 1399–1403

    Google Scholar 

  16. Boyen X, Waters B (2006) Anonymous hierarchical identity-based encryption (without random oracles). In: Advances in Cryptology. Springer, Santa Barbara, pp 290–307

    Google Scholar 

  17. Menezes A J, Okamoto T, Vanstone S A (1993) Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans Inf Theory 39(5):1639–1646

    Article  MathSciNet  MATH  Google Scholar 

  18. Frey G, Muller M, Ruck H G (1999) The tate pairing and the discrete logarithm applied to elliptic curve cryptosystems. IEEE Trans Inf Theory 45(5):1717–1719

    Article  MathSciNet  MATH  Google Scholar 

  19. Galbraith S D, Harrison K, Soldera D (2002) Implementing the tate pairing. In: Algorithmic Number Theory, pp 324C337. Springer, Sydney

  20. Garefalakis T (2004) The generalized weil pairing and the discrete logarithm problem on elliptic curves. Theor Comput Sci 321(1):59–72

    Article  MathSciNet  MATH  Google Scholar 

  21. Guo L, Zhang C, Sun J, Fang Y (2013) A privacy-preserving attribute-based authentication system for mobile health networks. IEEE Trans Mob Comput 13(9):84. doi:10.1109/TMC

    Google Scholar 

  22. Lynn B (2012) The pairing-based cryptography (PBC) library. http://crypto.stanford.edu/pbc

Download references

Acknowledgments

This work was supported in part by the National Basic Research Program of China under Grant 2010CB731803, in part by the NSF of China under Grants U1405251, 61221003, 61290322, 61174127, and 61273181, in part by the Ministry of Education of China under Grants NCET 13-0358, 20110073130005, and 20110073120025, and in part by the Science and Technology Commission of Shanghai Municipality (STCSM), China under Grant 13QA1401900 and 14511107903, sponsored by Medical and Engineering Interdiscipline Project under Grant YG2013ZD0504 in Shanghai Jiao Tong University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenbin Yu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, W., Liu, Z., Chen, C. et al. Privacy-preserving design for emergency response scheduling system in medical social networks. Peer-to-Peer Netw. Appl. 10, 340–356 (2017). https://doi.org/10.1007/s12083-016-0429-4

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0429-4

Keywords

Navigation