An anonymity communication protocol for security and privacy of clients in IoT-based mobile health transactions

[1]  Muttukrishnan Rajarajan,et al.  Patient’s privacy protection with anonymous access to medical services , 2008, 2008 Second International Conference on Pervasive Computing Technologies for Healthcare.

[2]  Thaier Hayajneh,et al.  Security issues with certificate authorities , 2017, 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON).

[3]  Daniel Slamanig,et al.  The Degree of Privacy in Web-based Electronic Health Records , 2009 .

[4]  Hyotaek Lim,et al.  Security System in Cloud Computing for Medical Data Usage , 2013 .

[5]  Pradeep Kumar Ray,et al.  The Need for Technical Solutions for Maintaining the Privacy of EHR , 2006, 2006 International Conference of the IEEE Engineering in Medicine and Biology Society.

[6]  Sajjan G. Shiva,et al.  Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment , 2017, 2017 IEEE 42nd Conference on Local Computer Networks Workshops (LCN Workshops).

[7]  Noboru Sonehara,et al.  Aspects of privacy for electronic health records , 2011, Int. J. Medical Informatics.

[8]  Rakesh Agrawal,et al.  Securing electronic health records without impeding the flow of information , 2007, Int. J. Medical Informatics.

[9]  Na Wang,et al.  Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing , 2020, Sensors.

[10]  Mohammad Ayoub Khan,et al.  A Secure Framework for Authentication and Encryption Using Improved ECC for IoT-Based Medical Sensor Data , 2020, IEEE Access.

[11]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[12]  Ebru Gökalp,et al.  Analysing Opportunities and Challenges of Integrated Blockchain Technologies in Healthcare , 2018, SIGSAND/PLAIS.

[13]  Wen-Shenq Juang RO-cash: An efficient and practical recoverable pre-paid offline e-cash scheme using bilinear pairings , 2010, J. Syst. Softw..

[14]  Omar Almomani,et al.  Security-aware CoAP application layer protocol for the internet of things using elliptic-curve cryptography , 2018, Int. Arab J. Inf. Technol..

[15]  Henning Müller,et al.  Strategies for health data exchange for secondary, cross-institutional clinical research , 2010, Comput. Methods Programs Biomed..

[16]  Thomas Neubauer,et al.  A methodology for the pseudonymization of medical data , 2011, Int. J. Medical Informatics.

[17]  Ditipriya Sinha,et al.  Authentication and Privacy Preservation in IoT Based Forest Fire Detection by Using Blockchain – A Review , 2019 .

[18]  Randolph C. Barrows,et al.  Review: Privacy, Confidentiality, and Electronic Medical Records , 1996, J. Am. Medical Informatics Assoc..

[19]  Dongxi Liu,et al.  Lattice-based Zero-Knowledge Proofs: New Techniques for Shorter and Faster Constructions and Applications , 2019, IACR Cryptol. ePrint Arch..

[20]  Ling Liu,et al.  Security Models and Requirements for Healthcare Application Clouds , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[21]  Yanina Protskaya,et al.  An anonymization protocol for the Internet of Things , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).

[22]  Sourav Mukhopadhyay,et al.  A Mutual Authentication Framework for Wireless Medical Sensor Networks , 2017, Journal of Medical Systems.

[23]  Alptekin Küpçü,et al.  Research issues for privacy and security of electronic health services , 2017, Future Gener. Comput. Syst..

[24]  Feng Xiang,et al.  A Blockchain Privacy Protection Scheme Based on Ring Signature , 2020, IEEE Access.

[25]  Luca Veltri,et al.  mjCoAP: An Open-Source Lightweight Java CoAP Library for Internet of Things Applications , 2014, OpenIoT@SoftCOM.

[26]  Thomas Neubauer,et al.  A secure architecture for the pseudonymization of medical data , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[27]  Jean Bacon,et al.  A model of OASIS role-based access control and its support for active security , 2002, ACM Trans. Inf. Syst. Secur..

[28]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[29]  Jinjun Chen,et al.  Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions , 2019, Future Gener. Comput. Syst..

[30]  Yuguang Fang,et al.  PAAS: A Privacy-Preserving Attribute-Based Authentication System for eHealth Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.

[31]  Seung Joo Kim,et al.  Preserving Patient's Anonymity for Mobile Healthcare System in IoT Environment , 2016 .

[32]  Gautam Srivastava,et al.  A Decentralized Privacy-Preserving Healthcare Blockchain for IoT , 2019, Sensors.

[33]  Gautam Srivastava,et al.  Optimized Blockchain Model for Internet of Things based Healthcare Applications , 2019, 2019 42nd International Conference on Telecommunications and Signal Processing (TSP).

[34]  Moayad Aloqaily,et al.  An Authentic-Based Privacy Preservation Protocol for Smart e-Healthcare Systems in IoT , 2019, IEEE Access.

[35]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[36]  Carsten Bormann,et al.  CoAP: An Application Protocol for Billions of Tiny Internet Nodes , 2012, IEEE Internet Computing.

[37]  Thaier Hayajneh,et al.  Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring , 2018, Journal of Medical Systems.

[38]  J. M. Eklund,et al.  Blockchain Technology in Healthcare: A Systematic Review , 2019, Healthcare.

[39]  Mohsen Guizani,et al.  BPDS: A Blockchain Based Privacy-Preserving Data Sharing for Electronic Medical Records , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[40]  Benjamin Fabian,et al.  Secret Sharing for Health Data in Multi-provider Clouds , 2013, 2013 IEEE 15th Conference on Business Informatics.

[41]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[42]  Dong Hoon Lee,et al.  A Privacy-Strengthened Scheme for E-Healthcare Monitoring System , 2012, Journal of Medical Systems.

[43]  C. Fidge,et al.  Privacy-preserving electronic health record linkage using pseudonym identifiers , 2008, HealthCom 2008 - 10th International Conference on e-health Networking, Applications and Services.

[44]  Md. Zakirul Alam Bhuiyan,et al.  Privacy-friendly platform for healthcare data in cloud based on blockchain environment , 2019, Future Gener. Comput. Syst..

[45]  David-Olivier Jaquet-Chiffelle,et al.  Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records , 2011, Int. J. Medical Informatics.

[46]  Gianluigi Ferrari,et al.  Design and Deployment of an IoT Application-Oriented Testbed , 2015, Computer.

[47]  Benjamin Fabian,et al.  Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..

[48]  Khalifa Toumi,et al.  A novel data exploitation framework based on blockchain , 2020, Pervasive Mob. Comput..

[49]  Jian Shen,et al.  Future Generation Computer Systems , 2022 .

[50]  Vipul Gupta,et al.  Speeding up Secure Web Transactions Using Elliptic Curve Cryptography , 2004, NDSS.

[51]  Shanlin Yang,et al.  Blockchain-Based Medical Records Secure Storage and Medical Service Framework , 2018, Journal of Medical Systems.

[52]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[53]  M. Eric Johnson,et al.  Information security and privacy in healthcare: current state of research , 2010, Int. J. Internet Enterp. Manag..

[54]  Gaurav Sharma,et al.  A Survey of Healthcare Internet of Things (HIoT): A Clinical Perspective , 2020, IEEE Internet of Things Journal.

[55]  Sachin Shetty,et al.  Integrating blockchain for data sharing and collaboration in mobile healthcare applications , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[56]  Silvio Micali,et al.  How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.

[57]  Agusti Solanas,et al.  Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice , 2018, IEEE Access.

[58]  Yuguang Fang,et al.  Privacy and emergency response in e-healthcare leveraging wireless body sensor networks , 2010, IEEE Wireless Communications.