2013
DOI: 10.1109/tpds.2012.146
|View full text |Cite
|
Sign up to set email alerts
|

SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency

Abstract: Abstract-With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy-preserving opportunistic computing framework, call… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
168
0

Year Published

2014
2014
2018
2018

Publication Types

Select...
7
1

Relationship

3
5

Authors

Journals

citations
Cited by 241 publications
(168 citation statements)
references
References 29 publications
0
168
0
Order By: Relevance
“…. , 10 POIs between 1 and 2 as HL 1 and add 5,10,15,20,25, and 30 un-checked-in POIs between 1 and 2 as HL 2 .…”
Section: Performancementioning
confidence: 99%
See 2 more Smart Citations
“…. , 10 POIs between 1 and 2 as HL 1 and add 5,10,15,20,25, and 30 un-checked-in POIs between 1 and 2 as HL 2 .…”
Section: Performancementioning
confidence: 99%
“…Some research works focus on the privacy-preserving of healthcare information in mobile health monitoring environment [24,25]. Cloud-assisted mobile health (mHealth) monitoring is a revolutionary way to improve the quality of healthcare service.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2014, Wang et al proposed the fair remote retrieval of outsourced private medical records in electronic health networks [6]. Lu et al proposed privacy preserving opportunistic computing framework for mobile-health care emergency [7]. In 2016, He et al introduced a novel network security architecture for cloud computing considering characteristics of cloud computing [8].…”
Section: Related Workmentioning
confidence: 99%
“…The flourish of e-health monitoring systems faces the challenges in privacy preservation [24], [25]. TA attacks have been recognized as effective methods to reveal the type of users' health data [12].…”
Section: B Privacy Preservation For E-healthmentioning
confidence: 99%