scholarly journals Privacy-Preserving Self-Helped Medical Diagnosis Scheme Based on Secure Two-Party Computation in Wireless Sensor Networks

2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Yi Sun ◽  
Qiaoyan Wen ◽  
Yudong Zhang ◽  
Wenmin Li

With the continuing growth of wireless sensor networks in pervasive medical care, people pay more and more attention to privacy in medical monitoring, diagnosis, treatment, and patient care. On one hand, we expect the public health institutions to provide us with better service. On the other hand, we would not like to leak our personal health information to them. In order to balance this contradiction, in this paper we design a privacy-preserving self-helped medical diagnosis scheme based on secure two-party computation in wireless sensor networks so that patients can privately diagnose themselves by inputting a health card into a self-helped medical diagnosis ATM to obtain a diagnostic report just like drawing money from a bank ATM without revealing patients’ health information and doctors’ diagnostic skill. It makes secure self-helped disease diagnosis feasible and greatly benefits patients as well as relieving the heavy pressure of public health institutions.

2016 ◽  
Vol 12 (07) ◽  
pp. 4 ◽  
Author(s):  
Song Ling ◽  
Qi Dong Yang

For the requirement of low energy consumption and high privacy-preserving in wireless sensor networks of range query, we propose a low energy consumption secure and verifiable range query protocol called SPRQ.SPRQ uses a novel prime aggregation to protect the privacy of the query data; We further propose an idea of the and value chain whereby data items collected by each sensor will be linked with each other just like a chain.The Sink verifies the integrity of query results by checking whether the data chain of each sensor is complete or not. The results of simulation experiments prove that prime aggregation can effectively reduce the amount of increased data in the prefix encoding process,so,network energy consumption is lower compared with other secure range query protocols.


2009 ◽  
Vol 2 (2) ◽  
pp. 195-213 ◽  
Author(s):  
Mauro Conti ◽  
Lei Zhang ◽  
Sankardas Roy ◽  
Roberto Di Pietro ◽  
Sushil Jajodia ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document