• Jun 16, 2017 News!Vol.6, No.3 has been indexed by EI (Inspec).   [Click]
  • Jun 15, 2017 News!Vol.6, No.2 has been indexed by EI (Inspec).   [Click]
  • Jun 14, 2017 News!Vol.6, No.1 has been indexed by EI (Inspec).   [Click]
General Information
Editor-in-chief

 
Faculty of Science, University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, IJIEE will be recognized among the readers in the related field."
IJIEE 2015 Vol.5(5): 335-341 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2015.V5.554

Secure Opportunistic Computing Privacy Preserving Group Signature Authentication Scheme for M-Healthcare Emergency

Angolo Shem Mbandu, Xu Chunxiang, and Kamenyi Domenic Mutiria
Abstract— M-healthcare applications make use of Body Sensor Network nodes to capture health data from a patient, transfer the data via blue tooth to the patient’s smartphone, which in turn transmits the information via a 3G network to remote servers at a Healthcare Center.This paper proposes a group signature authentication scheme composed of a medical users group and a medical personnel group to be used by patients and doctors respectively in the event that during an emergency the battery power of the patient under emergency runs low by using opportunistic computing approach. The group signature authentication scheme which is based on an RSA variant ensures that the privacy of the health information is controlled by the user, while a symptom matching scheme is used to control privacy. The scheme ensures user centric privacy of patient’s health information. A detailed security analysis shows that the proposed scheme can withstand several kinds of attacks while at the same time achieving user centered privacy access control. In addition, extensive performance evaluations using simulations on real world maps demonstrate the efficiency and effectiveness in terms of providing high reliable PHI processing and transmission while minimizing the privacy disclosure during and m-Healthcare emergency.

Index Terms— M-healthcare, authentication, group signature, opportunistic computing, matchmaking.

A. S. Mbandu and X. Chunxiang are with the Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P.R.China (e-mail: asmbandu@gmail.com, chxxu@uestc.edu.cn).
D. M. Kamenyi is with the Office of the Auditor General, Kenya. He is also with University of Electronic Science and Technology of China, Chengdu, P.R.China (e-mail: dkamenyi@yahoo.co.uk).

[PDF]

Cite: Angolo Shem Mbandu, Xu Chunxiang, and Kamenyi Domenic Mutiria, " Secure Opportunistic Computing Privacy Preserving Group Signature Authentication Scheme for M-Healthcare Emergency," International Journal of Information and Electronics Engineering vol. 5, no. 5, pp. 335-341, 2015.

Copyright © 2008-2016. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net