An Enhanced Mobile-Healthcare Emergency System Based on Extended Chaotic Maps

Mobile Healthcare (m-Healthcare) systems, namely smartphone applications of pervasive computing that utilize wireless body sensor networks (BSNs), have recently been proposed to provide smartphone users with health monitoring services and received great attentions. An m-Healthcare system with flaws, however, may leak out the smartphone user’s personal information and cause security, privacy preservation, or user anonymity problems. In 2012, Lu et al. proposed a secure and privacy-preserving opportunistic computing (SPOC) framework for mobile-Healthcare emergency. The brilliant SPOC framework can opportunistically gather resources on the smartphone such as computing power and energy to process the computing-intensive personal health information (PHI) in case of an m-Healthcare emergency with minimal privacy disclosure. To balance between the hazard of PHI privacy disclosure and the necessity of PHI processing and transmission in m-Healthcare emergency, in their SPOC framework, Lu et al. introduced an efficient user-centric privacy access control system which they built on the basis of an attribute-based access control mechanism and a new privacy-preserving scalar product computation (PPSPC) technique. However, we found out that Lu et al.’s protocol still has some secure flaws such as user anonymity and mutual authentication. To fix those problems and further enhance the computation efficiency of Lu et al.’s protocol, in this article, the authors will present an improved mobile-Healthcare emergency system based on extended chaotic maps. The new system is capable of not only providing flawless user anonymity and mutual authentication but also reducing the computation cost.

[1]  Linhua Zhang Cryptanalysis of the public key encryption based on multiple chaotic systems , 2008 .

[2]  Cheng-Chi Lee,et al.  A secure biometric-based remote user authentication with key agreement scheme using extended chaotic maps , 2012, Nonlinear Dynamics.

[3]  Alessio Vecchio,et al.  Opportunistic computing for wireless sensor networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[4]  Gu Si-yang,et al.  Privacy preserving association rule mining in vertically partitioned data , 2006 .

[5]  Mani Krishna,et al.  SPOC : A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2012 .

[6]  Azzedine Boukerche,et al.  Monitoring patients via a secure and mobile healthcare system , 2010, IEEE Wireless Communications.

[7]  Debiao He,et al.  Cryptanalysis and improvement of an extended chaotic maps-based key agreement protocol , 2012, Nonlinear Dynamics.

[8]  Xiaohui Liang,et al.  Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs , 2012, IEEE Transactions on Vehicular Technology.

[9]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[10]  Andrew T. Campbell,et al.  Fast track article: Bubble-sensing: Binding sensing tasks to the physical world , 2010 .

[11]  ALESSANDRA TONINELLI,et al.  Enabling secure service discovery in mobile healthcare enterprise networks , 2009, IEEE Wireless Communications.

[12]  Cheng-Chi Lee,et al.  An extended chaotic maps-based key agreement protocol with user anonymity , 2011, Nonlinear Dynamics.

[13]  Hung-Yu Chien,et al.  ABAKA: An Anonymous Batch Authenticated and Key Agreement Scheme for Value-Added Services in Vehicular Ad Hoc Networks , 2011, IEEE Transactions on Vehicular Technology.

[14]  Cheng-Chi Lee,et al.  Toward a secure batch verification with group testing for VANET , 2013, Wirel. Networks.

[15]  Alfredo De Santis,et al.  Security of public-key cryptosystems based on Chebyshev polynomials , 2004, IEEE Transactions on Circuits and Systems I: Regular Papers.

[16]  Martín Abadi,et al.  A logic of authentication , 1990, TOCS.

[17]  Artak Amirbekyan,et al.  A New Efficient Privacy-Preserving Scalar Product Protocol , 2007, AusDM.

[18]  Xiaohui Liang,et al.  A Secure Handshake Scheme with Symptoms-Matching for mHealthcare Social Network , 2011, Mob. Networks Appl..

[19]  Song Han,et al.  Chaotic map based key agreement with/out clock synchronization , 2009 .

[20]  Marco Conti,et al.  From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.

[21]  Eun-Jun Yoon,et al.  Efficiency and security problems of anonymous key agreement protocol based on chaotic maps , 2012 .

[22]  Xiaodong Lin,et al.  Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems , 2009, IEEE Journal on Selected Areas in Communications.

[23]  Xiaodong Lin,et al.  SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.

[24]  Yuguang Fang,et al.  Cross-Domain Data Sharing in Distributed Electronic Health Record Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.

[25]  Yao Zheng,et al.  Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption , 2019, IEEE Transactions on Parallel and Distributed Systems.

[26]  Mohan Kumar,et al.  Opportunities in Opportunistic Computing , 2010, Computer.

[27]  Mohan Kumar,et al.  Performance evaluation of service execution in opportunistic computing , 2010, MSWIM '10.

[28]  Wenliang Du,et al.  Privacy-preserving cooperative statistical analysis , 2001, Seventeenth Annual Computer Security Applications Conference.

[29]  Jamil Y. Khan,et al.  Wireless Body Sensor Network Using Medical Implant Band , 2007, Journal of Medical Systems.

[30]  Xiaodong Lin,et al.  An Intelligent Secure and Privacy-Preserving Parking Scheme Through Vehicular Communications , 2010, IEEE Transactions on Vehicular Technology.

[31]  A. Miyaji,et al.  New Explicit Conditions of Elliptic Curve Traces for FR-Reduction , 2001 .

[32]  Roksana Boreli,et al.  Improving the efficiency of anonymous routing for MANETs , 2012, Comput. Commun..

[33]  Ming Li,et al.  Data security and privacy in wireless body area networks , 2010, IEEE Wireless Communications.

[34]  Xiaohui Liang,et al.  Secure handshake with symptoms-matching: the essential to the success of mhealthcare social network , 2010, BODYNETS.

[35]  Pin-Han Ho,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.