— M-healthcare applications make use of Body Sensor Network nodes to capture health data from a patient, transfer the data via blue tooth to the patient’s smartphone, which in turn transmits the information via a 3G network to remote servers at a Healthcare Center.This paper proposes a group signature authentication scheme composed of a medical users group and a medical personnel group to be used by patients and doctors respectively in the event that during an emergency the battery power of the patient under emergency runs low by using opportunistic computing approach. The group signature authentication scheme which is based on an RSA variant ensures that the privacy of the health information is controlled by the user, while a symptom matching scheme is used to control privacy. The scheme ensures user centric privacy of patient’s health information. A detailed security analysis shows that the proposed scheme can withstand several kinds of attacks while at the same time achieving user centered privacy access control. In addition, extensive performance evaluations using simulations on real world maps demonstrate the efficiency and effectiveness in terms of providing high reliable PHI processing and transmission while minimizing the privacy disclosure during and m-Healthcare emergency.
— M-healthcare, authentication, group signature, opportunistic computing, matchmaking.
A. S. Mbandu and X. Chunxiang are with the Department of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu, P.R.China (e-mail: email@example.com, firstname.lastname@example.org).
D. M. Kamenyi is with the Office of the Auditor General, Kenya. He is also with University of Electronic Science and Technology of China, Chengdu, P.R.China (e-mail: email@example.com).
Cite: Angolo Shem Mbandu, Xu Chunxiang, and Kamenyi Domenic Mutiria, " Secure Opportunistic Computing Privacy Preserving Group Signature Authentication Scheme for M-Healthcare Emergency," International Journal of Information and Electronics Engineering vol. 5, no. 5, pp. 335-341, 2015.