• Jun 01, 2020 News!Papers published in Vol.10, No.2 have all received dois from Crossref.
  • May 15, 2020 News!Papers published in Vol.9, No.1-Vol.10, No.1 have all received dois from Crossref.
  • May 15, 2020 News!IJIEE Vol. 10, No. 2 issue has been published online!   [Click]
General Information
    • ISSN: 2010-3719 (Online)
    • Abbreviated Title: Int. J. Inf. Electron. Eng.
    • Frequency: Quarterly
    • DOI: 10.18178/IJIEE
    • Editor-in-Chief: Prof. Chandratilak De Silva Liyanage
    • Executive Editor: Jennifer Zeng
    • Abstracting/ Indexing : Google Scholar, Electronic Journals Library, Crossref and ProQuest,  INSPEC (IET), EBSCO, CNKI.
    • E-mail ijiee@ejournal.net
Editor-in-chief

 
University of Brunei Darussalam, Brunei Darussalam   
" It is a great honor to serve as the editor-in-chief of IJIEE. I'll work together with the editorial team. Hopefully, The value of IJIEE will be well recognized among the readers in the related field."

IJIEE 2015 Vol.5(5): 335-341 ISSN: 2010-3719
DOI: 10.7763/IJIEE.2015.V5.554

Secure Opportunistic Computing Privacy Preserving Group Signature Authentication Scheme for M-Healthcare Emergency

Angolo Shem Mbandu, Xu Chunxiang, and Kamenyi Domenic Mutiria
Abstract— M-healthcare applications make use of Body Sensor Network nodes to capture health data from a patient, transfer the data via blue tooth to the patient’s smartphone, which in turn transmits the information via a 3G network to remote servers at a Healthcare Center.This paper proposes a group signature authentication scheme composed of a medical users group and a medical personnel group to be used by patients and doctors respectively in the event that during an emergency the battery power of the patient under emergency runs low by using opportunistic computing approach. The group signature authentication scheme which is based on an RSA variant ensures that the privacy of the health information is controlled by the user, while a symptom matching scheme is used to control privacy. The scheme ensures user centric privacy of patient’s health information. A detailed security analysis shows that the proposed scheme can withstand several kinds of attacks while at the same time achieving user centered privacy access control. In addition, extensive performance evaluations using simulations on real world maps demonstrate the efficiency and effectiveness in terms of providing high reliable PHI processing and transmission while minimizing the privacy disclosure during and m-Healthcare emergency.

Index Terms— M-healthcare, authentication, group signature, opportunistic computing, matchmaking.

A. S. Mbandu and X. Chunxiang are with the Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P.R.China (e-mail: asmbandu@gmail.com, chxxu@uestc.edu.cn).
D. M. Kamenyi is with the Office of the Auditor General, Kenya. He is also with University of Electronic Science and Technology of China, Chengdu, P.R.China (e-mail: dkamenyi@yahoo.co.uk).

[PDF]

Cite: Angolo Shem Mbandu, Xu Chunxiang, and Kamenyi Domenic Mutiria, " Secure Opportunistic Computing Privacy Preserving Group Signature Authentication Scheme for M-Healthcare Emergency," International Journal of Information and Electronics Engineering vol. 5, no. 5, pp. 335-341, 2015.

Copyright © 2008-2021. International Journal of Information and Electronics Engineering. All rights reserved.
E-mail: ijiee@ejournal.net