CAM : Cloud-assisted privacy preserving mobile health monitoring

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review

106 Scopus Citations
View graph of relations

Author(s)

Detail(s)

Original languageEnglish
Article number6490390
Pages (from-to)985-997
Journal / PublicationIEEE Transactions on Information Forensics and Security
Volume8
Issue number6
Publication statusPublished - 2013
Externally publishedYes

Abstract

Cloud-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients' privacy and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a cloud-assisted privacy preserving mobile health monitoring system to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy reencryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients' privacy and service providers' intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design. © 2005-2012 IEEE.

Research Area(s)

  • Healthcare, key private proxy reencryption, mobile health (mHealth), outsourcing decryption, privacy

Bibliographic Note

Publication details (e.g. title, author(s), publication statuses and dates) are captured on an “AS IS” and “AS AVAILABLE” basis at the time of record harvesting from the data source. Suggestions for further amendments or supplementary information can be sent to lbscholars@cityu.edu.hk.

Citation Format(s)

CAM: Cloud-assisted privacy preserving mobile health monitoring. / Lin, Huang; Shao, Jun; Zhang, Chi et al.
In: IEEE Transactions on Information Forensics and Security, Vol. 8, No. 6, 6490390, 2013, p. 985-997.

Research output: Journal Publications and ReviewsRGC 21 - Publication in refereed journalpeer-review