19 research outputs found

    Secure handshake with symptoms-matching: The essential to the success of mhealthcare social network

    Get PDF
    ABSTRACT In our aging society, mHealthcare social network (MHSN) built upon wireless body sensor network (WBSN) and mobile communications provides a promising platform for the seniors who have the same symptom to exchange their experiences, give mutual support and inspiration to each other, and help forwarding their health information wirelessly to a related eHealth center. However, there exist many challenging security issues in MHSN such as how to securely identify a senior who has the same symptom, how to prevent others who don't have the symptom from knowing someone's symptom? In this paper, to tackle these challenging security issues, we propose a secure same-symptom-based handshake (SSH) scheme, and apply the provable security technique to demonstrate its security in the random oracle model. In addition, we discuss a promising application -social-based patient health information (PHI) collaborative reporting in MHSN, and conduct extensive simulations to evaluate its efficiency in terms of PHI reporting delay

    Ubiquitous Body Sensor Networks

    Full text link

    Self Controllable Health Care Monitoring Arrangement for Patient

    Get PDF
    In this undertaking is utilized to the Condition care monitoring system. Distributed Healthcare cloud computing arrangement considerably facilitates effectual patient treatment for health consultation by allocating confidential condition data amid healthcare providers. Though, it brings concerning the trial of keeping both the data confidentiality and patients’ individuality privacy simultaneously. Countless continuing admission manipulation and nameless authentication schemes cannot be straightforwardly exploited. The arrangement acts there are provider, doctor, patient and admin. The provider is list to website to consent staying to appeal dispatch to admin. Admin is Proved to in a particular provider it deeds to the present add to doctors and hospital divisions established. User or Patient is list to the site. Patient Login to present the deed booking the doctor appointment in situation patient to dispatch a feedback to that doctor treatment comments onward to admin. Doctors is add provider to dispatch a username and password .Doctor is login to think patient appointment features and checking the doctor is present patient or fake user to identified to dispatch to symptoms description upload files(x-ray).Admin is finished procedure is upheld in this system. Patient dispatch doctors feedback bad or wrong to particular doctors appointment annulled temporally. In this undertaking generally utilized for patient and hospital ,doctors features through online upheld for India astute established on card

    Distributed Multi-authority Attribute-based Encryption Scheme for Friend Discovery in Mobile Social Networks

    Get PDF
    AbstractIn recent years, the rapid expansion of the capability of portable devices, cloud servers and cellular network technologies is the wind beneath the wing of mobile social networks. Compared to traditional web-based online social networks, the mobile social networks can assist users to easily discover and make new social interaction with others. A challenging task is to protect the privacy of the users’ profiles and communications. Existing works are mainly based on traditional cryptographic methods, such as homomorphic and group signatures, which are very computationally costly. In this paper, we propose a novel distributed multi-authority attribute-based encryption scheme to efficiently achieve privacy-preserving without additional special signatures. In addition, the proposed scheme can achieve fine-grained and flexible access control. Detailed analysis demonstrates the effectiveness and practicability of our scheme

    PRUB: A Privacy Protection Friend Recommendation System Based on User Behavior

    Get PDF
    The fast developing social network is a double-edged sword. It remains a serious problem to provide users with excellent mobile social network services as well as protecting privacy data. Most popular social applications utilize behavior of users to build connection with people having similar behavior, thus improving user experience. However, many users do not want to share their certain behavioral information to the recommendation system. In this paper, we aim to design a secure friend recommendation system based on the user behavior, called PRUB. The system proposed aims at achieving fine-grained recommendation to friends who share some same characteristics without exposing the actual user behavior. We utilized the anonymous data from a Chinese ISP, which records the user browsing behavior, for 3 months to test our system. The experiment result shows that our system can achieve a remarkable recommendation goal and, at the same time, protect the privacy of the user behavior information

    AN APPROACH TOWARDS EXPLOITATION OF SOCIAL COMMUNICATIONS IN MOBILE SYSTEMS

    Get PDF
    Social network is the networking of communications which bond the people cooperatively and comprise the flow of information connecting people, business connections. Mobile social networks as promising social communication platforms have achieved enormous attention in recent times. Privacy preservation is an important issue of research in social networking. The protection of user’s privacy is connected to their profiles and their results of profile matching. The protocols of profile matching allow the users to get hold of the results of profile matching which enclose partial information of profile and can be categorized on the basis of profiles format and the types of matching functions into three classes such as non anonymity, conditional anonymity and full anonymity.  A family of novel protocols such as profile matching approaches of explicit comparison-based with conditional anonymity which allows two users to measure up to their values of attribute on a specific attribute devoid of revealing the values to each other; implicit comparison-based the responder organizes numerous categories of messages where two messages are created for each group; and implicit predicate-based with full anonymity permits the comparisons of numerous attributes intended for profile matching  were introduced

    A HEALTHCARE SYSTEM THAT PREVENTS IDENTITY OF PATIENTS

    Get PDF
    A lot of the individuals are concerned regarding privacy from the personal health data as you can make certain they're in dilemma for each illegal collection and thought. However protection of patients’ privacy continued to be inexplicable.  We introduce an approved accessible privacy representation is introduced for privacy-preserving cooperative authentication is shown to permit patients allowing corresponding physicians by means of setting access tree that supports flexible threshold predicates. The proposal of recommended system embraces on several levels that's patient can approve connected physicians by means of setting an access tree that supports efficient threshold predicates however, only directly approved physicians are approved to validate identity of patient by means of fulfilling of access tree by their particular attribute sets correspondingly

    Social Closeness Based Private Coordinating Conventions for Online Informal Organizations

    Get PDF
    The hazardous development of Online Interpersonal organizations in the course of recent years has re-imagined the way individuals collaborate with existing companions and particularly make new companions. A few works propose to give individuals a chance to wind up companions on the off chance that they have comparative profile attributes. In any case, profile coordinating includes a natural protection danger of uncovering private profile data to outsiders in the internet. The current answers for the issue endeavor to ensure clients' protection by secretly figuring the convergence or crossing point cardinality of the profile quality arrangements of two clients. These plans have a few impediments can in any case uncover clients' protection. In this project, we influence group structures to reclassify the Online Social Networks(OSN) display and propose a practical awry social closeness measure between two clients. At that point, in light of the proposed hilter kilter social nearness, along with AES algorithm we outline three private coordinating conventions, which give diverse security levels and can ensure clients' protection superior to the past works. At long last, we approve our proposed unbalanced closeness measure utilizing genuine interpersonal organization information and lead broad reenactments to assess the execution of the proposed conventions regarding calculation cost, correspondence cost, add up to running time, and vitality utilization

    Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Get PDF
    corecore