Abstract
The m-healthcare system can benefit medical users by providing high-quality pervasive healthcare monitoring, the growing of m-healthcare system is still strange on how we fully understand and manage the challenges facing in this m-healthcare system, especially during a medical emergency. In this paper, we propose a new secure and privacy-preserving opportunistic computing framework, called SPOC, to address this challenge. With the help of our proposed SPOC framework, each medical user who is in an emergency can achieve the user-centric privacy access control to allow only those qualified helpers to participate in the opportunistic computing to balance the high reliability of PHI process and minimizing PHI privacy disclosure in m-Health care emergency. We introduce an efficient user-centric privacy access control in SPOC framework, which is based on an attribute-based access control and a new privacy-preserving scalar product computation (PPSPC) technique, and allows a medical user to decide who can participate in the opportunistic computing to assist in processing his great PHI data.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Xiaodong L, Sun X, Ho P-H, Shen X (2007) GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 56(6):3442–3456
Avvenuti M, Corsini P, Masci P, Vecchio A (2007) Opportunistic computing for wireless sensor networks. In: IEEE international conference on mobile adhoc and sensor systems, MASS, pp 1–6. IEEE
Ren Y, Werner R, Pazzi N, Boukerche A (2010) Monitoring patients via a secure and mobile healthcare system. IEEE Wirel Commun 17(1)
Conti M, Giordano S, May M, Passarella A (2010) From opportunistic networks to opportunistic computing. IEEE Commun Mag 48(9)
Li M, Shucheng Yu, Zheng Y, Ren K, Lou W (2013) Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption. IEEE Trans Parallel Distrib Syst 24(1):131–143
Passarella A, Conti M, Borgia E, Kumar M (2010) Performance evaluation of service execution in opportunistic computing. In: Proceedings of the 13th ACM international conference on modeling, analysis, and simulation of wireless and mobile systems, pp 291–298. ACM
Lu R, Lin X, Liang X, Shen X (2011) A secure handshake scheme with symptoms-matching for mhealthcare social network. Mob Netw Appl (special issue on wireless and personal communication) 16(6):683–694
ManogaranG, Varatharajan R, Lopez D, Kumar PM, Sundarasekar R, Thota C (2018) A new architecture of Internet of Things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gener Comput Syst 82:375–387
Shi M, Hanxiang W, Zhang J, Han M, Meng B, Zhang H (2017) Self-powered wireless smart patch for healthcare monitoring. Nano Energy 32:479–487
Baig MM, GholamHosseini H, Moqeem AA, Mirza F, Lindén M (2017) A systematic review of wearable patient monitoring systems—current challenges and opportunities for clinical adoption. J Med Syst 41(7):115
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ramya, P., Naga Sravanthi, P., Kumar, M.M. (2019). Reliable Healthcare Monitoring System Using SPOC Framework. In: Saini, H., Sayal, R., Govardhan, A., Buyya, R. (eds) Innovations in Computer Science and Engineering. Lecture Notes in Networks and Systems, vol 74. Springer, Singapore. https://doi.org/10.1007/978-981-13-7082-3_45
Download citation
DOI: https://doi.org/10.1007/978-981-13-7082-3_45
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-7081-6
Online ISBN: 978-981-13-7082-3
eBook Packages: EngineeringEngineering (R0)