Skip to main content

Advertisement

Log in

A Privacy-Strengthened Scheme for E-Healthcare Monitoring System

  • Original Paper
  • Published:
Journal of Medical Systems Aims and scope Submit manuscript

Abstract

Recent Advances in Wireless Body Area Networks (WBANs) offer unprecedented opportunities and challenges to the development of pervasive electronic healthcare (E-Healthcare) monitoring system. In E-Healthcare system, the processed data are patients’ sensitive health data that are directly related to individuals’ privacy. For this reason, privacy concern is of great importance for E-Healthcare system. Current existing systems for E-Healthcare services, however, have not yet provided sufficient privacy protection for patients. In order to offer adequate security and privacy, in this paper, we propose a privacy-enhanced scheme for patients’ physical condition monitoring, which achieves dual effects: (1) providing unlinkability of health records and individual identity, and (2) supporting anonymous authentication and authorized data access. We also conduct a simulation experiment to evaluate the performance of the proposed scheme. The experimental results demonstrate that the proposed scheme achieves better performance in terms of computational complexity, communication overheads and querying efficiency compared with previous results.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Patel, M., and Wang, J., Applications, challenges, and prospective in emerging body area networking technologies. IEEE Wirel. Commun. 17:80–88, 2010.

    Article  Google Scholar 

  2. Milenkovic, A., Otto, C., and Jovanov, E., Wireless sensor networks for personal health monitoring: Issues and an implementation. Comput. Commun. 29:2521–2533, 2006.

    Article  Google Scholar 

  3. Chen, M., Gonzalez, S., Vasilakos, A., Cao, H., and Leung, V. C. M., Body area networks: A survey. ACM/Springer Mob. Netw. Appl. 16:171–193, 2011. doi:10.1007/s11036-010-0260-8.

    Article  Google Scholar 

  4. Sun, J., Fang, Y., and Zhu, X., Privacy and emergency response in e-healthcare leveraging wireless body sensor networks. IEEE Wirel. Commun. 17:66–73, 2010.

    Article  Google Scholar 

  5. Health Insurance Portability and Accountability Act of 1996, 104th U.S. Congress, 1996.

  6. Tan, C. C., Wang, H., and Zhong, S., IBE-Lite: A lightweight identity-based cryptography for body sensor networks. IEEE Trans. Inf. Technol. Biomed. 13:926–932, 2009.

    Article  Google Scholar 

  7. Shamir, A., Identity-based cryptosystems and signature schemes. In: Advances in Cryptology Proceedings of CRYPTO 84. Springer, pp. 47–53, 1984.

  8. Boneh, D., and Franklin, M., Identity-based encryption from the weil pairing. In: Proc. of the 21st Annu. Int. Cryptol. Conf. on Adv. in Cryptol. Springer Berlin, pp. 213–229, 2001.

  9. Zhang, Y., Liu, W., Lou, W., and Fang, Y., Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J. Sel. Areas Commun. 24:247–260, 2006.

    Article  Google Scholar 

  10. Chaum, D. L., Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24:84–90, 1981.

    Article  Google Scholar 

  11. Schechter, S., Parnell, T., and Hartemink, A., Anonymous authentication of membership in dynamic groups. In: Financial Cryptography 3rd Int. Conf. Springer Berlin, pp. 184–195, 1999.

  12. Nguyen, L., and Safavi-Naini, R., Dynamic k-times anonymous authentication. In: Appl. Cryptogr. and Netw. Secur. 3rd Int. Conf. Springer, New York, pp. 318–333, 2005.

    Google Scholar 

  13. Chaum, D. L., and Van Heyst, E., Group signatures. In: EUROCRYPT ’91 Proc. of the 10th Annu. Int. Conf. on Theory and Appl. of Cryptogr. Tech. Vol. 547, pp. 257–265, 1991.

  14. Rivest, R. L., Shamir, A., and Tauman, Y., How to leak a secret. In: Adv. in Cryptol. SIACRYPT 2001. Berlin: Springer, pp. 552–565, 2001.

    Chapter  Google Scholar 

  15. Koblitz, N., Elliptic curve cryptosystems. Math. Comput. 48:203–209, 1987.

    Article  MathSciNet  MATH  Google Scholar 

  16. Camtepe, S. A., and Yener, B., Key distribution mechanisms for wireless sensor networks: A survey. Technical Report TR–05–07, Rensselaer Polytechnic Institute, 2005.

  17. Shi, E., and Perrig, A., Designing secure sensor networks. IEEE Wirel. Commun Mag. 11:38–43, 2004.

    Google Scholar 

  18. Raazi, S. M. K.-U.-R., Lee, H., Lee, S., and Lee, Y.-K., BARI+: A biometric based distributed key management approach for wireless body area networks. Sensors.10 4:3911–3933, 2010.

    Google Scholar 

  19. Wander, A. S., Gura, N., Eberle, H., Gupta, V., and Shantz, S. C., Energy analysis of public-key cryptography for wireless sensor networks. percom. In: Third IEEE Int. Conf. on Pervasive Comput. and Commun. (PERCOM’05). pp.324–328, 2005.

  20. Gaubatz, G., Kaps, J., Erdin, and Sunar, B., State of the art in ultra-low power public key cryptography for wireless sensor networks, percomw. In: Third IEEE Int. Conf. on Pervasive Comput. and Commun. Workshops (PERCOMW’05). pp. 146–150, 2005.

  21. Liu, A., and Ning, P., TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks. In: Proc. of the 7th Int. Conf. on Inf. Proc. in Sensor Netw. (IPSN 2008). pp. 245–256, 2008.

Download references

Acknowledgements

This work was supported by the IT R&D program of MKE/KEIT [KI002113, Development of Security Technology for Car-Healthcare].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Hoon Lee.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, C., Lee, H. & Lee, D.H. A Privacy-Strengthened Scheme for E-Healthcare Monitoring System. J Med Syst 36, 2959–2971 (2012). https://doi.org/10.1007/s10916-011-9774-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10916-011-9774-2

Keywords

Navigation