Sage: a strong privacy-preserving scheme against global eavesdropping for ehealth systems

The eHealth system is envisioned as a promising approach to improving health care through information technology, where security and privacy are crucial for its success and largescale deployment. In this paper, we propose a strong privacy-preserving Scheme against Global Eavesdropping, named SAGE, for eHealth systems. The proposed SAGE can achieve not only the content oriented privacy but also the contextual privacy against a strong global adversary. Extensive analysis demonstrates the effectiveness and practicability of the proposed scheme.

[1]  Lynda L. McGhie,et al.  THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT , 2004 .

[2]  Liang Zhang,et al.  Protecting Receiver-Location Privacy in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[3]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[4]  Feng Jiang,et al.  Congestion Control in Multihop Wireless Networks , 2007, IEEE Transactions on Vehicular Technology.

[5]  Fillia Makedon,et al.  Entrapping adversaries for source protection in sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[6]  S. Sastry,et al.  Security and Privacy Issues with Health Care Information Technology , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[7]  Jung Hee Cheon,et al.  An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.

[8]  Chwan-Lu Tseng,et al.  A Mobile Care System With Alert Mechanism , 2007, IEEE Transactions on Information Technology in Biomedicine.

[9]  Madhav V. Marathe,et al.  Parametric probabilistic sensor network routing , 2003, WSNA '03.

[10]  Deborah Estrin,et al.  Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.

[11]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[12]  Wade Trappe,et al.  Enhancing Source-Location Privacy in Sensor Network Routing , 2005, ICDCS.

[13]  Zhenfu Cao,et al.  Efficient remote user authentication scheme using smart card , 2005, Comput. Networks.

[14]  Birgit Pfitzmann,et al.  Real-time mixes: a bandwidth-efficient anonymity protocol , 1998, IEEE J. Sel. Areas Commun..

[15]  L. Gatzoulis,et al.  Wearable and Portable eHealth Systems , 2007, IEEE Engineering in Medicine and Biology Magazine.

[16]  K.K. Venkatasubramanian,et al.  Security for Pervasive Health Monitoring Sensor Applications , 2006, 2006 Fourth International Conference on Intelligent Sensing and Information Processing.

[17]  Upkar Varshney,et al.  Pervasive Healthcare and Wireless Health Monitoring , 2007, Mob. Networks Appl..

[18]  Steven J. Murdoch,et al.  Message Splitting Against the Partial Adversary , 2005, Privacy Enhancing Technologies.

[19]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[20]  J. Muehlsteff,et al.  Wireless Body Sensor Network for Continuous Cuff-less Blood Pressure Monitoring , 2006, 2006 3rd IEEE/EMBS International Summer School on Medical Devices and Biosensors.

[21]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[22]  Yuan-Ting Zhang,et al.  Physiological Signal Based Entity Authentication for Body Area Sensor Networks and Mobile Healthcare Systems , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.

[23]  Jean-Sébastien Coron,et al.  On the Exact Security of Full Domain Hash , 2000, CRYPTO.

[24]  Carl M. Harris,et al.  Fundamentals of queueing theory (2nd ed.). , 1985 .

[25]  Andreas Pfitzmann,et al.  Networks Without User Observability: Design Options , 1985, EUROCRYPT.

[26]  Kevin Fu,et al.  Security and Privacy for Implantable Medical Devices , 2008, IEEE Pervasive Comput..

[27]  Hannes Federrath,et al.  Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[28]  Sandeep K. S. Gupta,et al.  Security solutions for pervasive healthcare , 2007 .

[29]  B. R. Badrinath,et al.  Trajectory based forwarding and its applications , 2003, MobiCom '03.

[30]  J. Limb,et al.  Editorial on the IEEE/OSA Journal of Lightwave Technology and the IEEE Journal on Selected Areas in Communications , 1986 .

[31]  David Chaum,et al.  The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.

[32]  Carl M. Harris,et al.  Fundamentals of queueing theory , 1975 .

[33]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[34]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[35]  Guang-Zhong Yang,et al.  Pervasive body sensor network: an approach to monitoring the post-operative surgical patient , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[36]  Victor Shoup,et al.  OAEP Reconsidered , 2001, CRYPTO.

[37]  Andreas Pfitzmann,et al.  Networks without user observability , 1987, Comput. Secur..

[38]  Cao Zhenfu A Self-Encryption Remote User Anonymous Authentication Scheme Using Smart Cards , 2006 .

[39]  Wendi B. Heinzelman,et al.  Flooding Strategy for Target Discovery in Wireless Networks , 2003, MSWIM '03.

[40]  Chong-Kwon Kim,et al.  Flooding in wireless ad hoc networks , 2001, Comput. Commun..

[41]  Dario Salvi,et al.  A new solution for a heart failure monitoring system based on wearable and information technologies , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[42]  Heinrich Planck,et al.  Sensory baby vest for the monitoring of infants , 2006, International Workshop on Wearable and Implantable Body Sensor Networks (BSN'06).

[43]  Naranker Dulay,et al.  Privacy Preserving Trust Negotiation for Pervasive Healthcare , 2006, 2006 Pervasive Health Conference and Workshops.

[44]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[45]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[46]  Ilias Iakovidis,et al.  Towards personal health record: current situation, obstacles and trends in implementation of electronic healthcare record in Europe , 1998, Int. J. Medical Informatics.