Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 6426495, 12 pages
https://doi.org/10.1155/2017/6426495
Research Article

Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities

1Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China
2National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China

Correspondence should be addressed to Qinlong Huang; nc.ude.tpub@cesgnol

Received 18 May 2017; Accepted 6 July 2017; Published 3 August 2017

Academic Editor: Qing Yang

Copyright © 2017 Qinlong Huang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. M. S. Hossain, G. Muhammad, W. Abdul, B. Song, and B. Gupta, “Cloud-assisted secure video transmission and sharing framework for smart cities,” Future Generation Computer Systems, 2017. View at Publisher · View at Google Scholar
  2. B. Tang, Z. Chen, G. Hefferman et al., “Incorporating intelligence in fog computing for big data analysis in smart cities,” IEEE Transactions on Industrial Informatics, no. 99, 2017. View at Publisher · View at Google Scholar
  3. J. Zhou, Z. Cao, X. Dong, X. Lin, and A. Vasilakos, “Securing m-healthcare social networks: challenges, countermeasures and future directions,” IEEE Wireless Communications, vol. 20, no. 4, pp. 12–21, 2013. View at Publisher · View at Google Scholar · View at Scopus
  4. K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. H. Luo, “Security and privacy for mobile healthcare networks: from a quality of protection perspective,” IEEE Wireless Communications, vol. 22, no. 4, pp. 104–112, 2015. View at Publisher · View at Google Scholar · View at Scopus
  5. H. Huang, T. Gong, N. Ye, R. Wang, and Y. Dou, “Private and secured medical data transmission and analysis for wireless sensing healthcare system,” IEEE Transactions on Industrial Informatics, vol. 13, no. 3, pp. 1227–1237, 2017. View at Publisher · View at Google Scholar
  6. X. Liang, M. Barua, R. Lu, X. Lin, and X. Shen, “HealthShare: achieving secure and privacy-preserving health information sharing through health social networks,” Computer Communications, vol. 35, no. 15, pp. 1910–1920, 2012. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Zhou, Z. Cao, X. Dong, N. Xiong, and A. V. Vasilakos, “4S: a secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks,” Information Sciences, vol. 314, pp. 255–276, 2015. View at Publisher · View at Google Scholar
  8. L. Chen, Z. Cao, R. Lu, X. Liang, and X. Shen, “EPF: an event-aided packet forwarding protocol for privacy-preserving mobile healthcare social networks,” in Proceedings of the 54th Annual IEEE Global Telecommunications Conference (GLOBECOM '11), Kathmandu, Nepal, December 2011. View at Publisher · View at Google Scholar · View at Scopus
  9. L. Guo, C. Zhang, J. Sun, and Y. Fang, “A privacy-preserving attribute-based authentication system for mobile health networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 9, pp. 1927–1941, 2014. View at Publisher · View at Google Scholar
  10. W. Yu, Z. Liu, C. Chen, B. Yang, and X. Guan, “Privacy-preserving design for emergency response scheduling system in medical social networks,” Peer-to-Peer Networking and Applications, vol. 10, no. 2, pp. 340–356, 2017. View at Publisher · View at Google Scholar · View at Scopus
  11. K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, “Security and privacy in smart city applications: challenges and solutions,” IEEE Communications Magazine, vol. 55, no. 1, pp. 122–129, 2017. View at Publisher · View at Google Scholar
  12. A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, “Healing on the cloud: secure cloud architecture for medical wireless sensor networks,” Future Generation Computer Systems, vol. 55, pp. 266–277, 2016. View at Publisher · View at Google Scholar · View at Scopus
  13. T.-L. Chen, Y.-T. Liao, Y.-F. Chang, and J.-H. Hwang, “Security approach to controlling access to personal health records in healthcare service,” Security and Communication Networks, vol. 9, no. 7, pp. 652–666, 2016. View at Publisher · View at Google Scholar · View at Scopus
  14. A. Zhang, A. Bacchus, and X. Lin, “Consent-based access control for secure and privacy-preserving health information exchange,” Security and Communication Networks, vol. 9, no. 16, pp. 3496–3508, 2016. View at Publisher · View at Google Scholar · View at Scopus
  15. Q. Huang, Y. Yang, and M. Shen, “Secure and efficient data collaboration with hierarchical attribute-based encryption in cloud computing,” Future Generation Computer Systems, vol. 72, pp. 239–249, 2017. View at Publisher · View at Google Scholar · View at Scopus
  16. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '05), pp. 457–473, Springer, Aarhus, Denmark, May 2005. View at MathSciNet
  17. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-policy attribute-based encryption,” in Proceedings of the IEEE Symposium on Security and Privacy (SP '07), pp. 321–334, Berkeley, Calif, USA, May 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. S. Narayan, M. Gagné, and R. Safavi-Naini, “Privacy preserving ehr system using attribute-based infrastructure,” in Proceedings of the ACM Workshop on Cloud Computing Security Workshop (CCSW '10), pp. 47–52, Chicago, Ill, USA, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  19. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. M. H. Au, T. H. Yuen, J. K. Liu et al., “A general framework for secure sharing of personal health records in cloud system,” Journal of Computer and System Sciences, 2017. View at Publisher · View at Google Scholar
  21. Y. Liu, Y. Zhang, J. Ling, and Z. Liu, “Secure and fine-grained access control on e-healthcare records in mobile cloud computing,” Future Generation Computer Systems, 2017. View at Publisher · View at Google Scholar
  22. L.-Y. Yeh, P.-Y. Chiang, Y.-L. Tsai, and J.-L. Huang, “Cloud-based fine-grained health information access control framework for lightweight IoT devices with dynamic auditing and attribute revocation,” IEEE Transactions on Cloud Computing, no. 99, 2015. View at Publisher · View at Google Scholar · View at Scopus
  23. P. Zhang, Z. Chen, J. K. Liu, K. Liang, and H. Liu, “An efficient access control scheme with outsourcing capability and attribute update for fog computing,” Future Generation Computer Systems, 2016. View at Publisher · View at Google Scholar
  24. A. Zanella, N. Bui, A. P. Castellani, L. Vangelista, and M. Zorzi, “Internet of things for smart cities,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 22–32, 2014. View at Publisher · View at Google Scholar
  25. X. A. Wang, J. Ma, F. Xhafa, M. Zhang, and X. Luo, “Cost-effective secure E-health cloud system using identity based cryptographic techniques,” Future Generation Computer Systems, vol. 67, pp. 242–254, 2017. View at Publisher · View at Google Scholar
  26. X. Liang, R. Lu, L. Chen, X. Lin, and X. Shen, “PEC: a privacy-preserving emergency call scheme for mobile healthcare social networks,” Journal of Communications and Networks, vol. 13, no. 2, pp. 102–112, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. S. Jiang, X. Zhu, and L. Wang, “EPPS: Efficient and privacy-preserving personal health information sharing in mobile healthcare social networks,” Sensors, vol. 15, no. 9, pp. 22419–22438, 2015. View at Publisher · View at Google Scholar · View at Scopus
  28. Y. Zhou, H. Deng, Q. Wu, B. Qin, J. Liu, and Y. Ding, “Identity-based proxy re-encryption version 2: making mobile access easy in cloud,” Future Generation Computer Systems, vol. 62, pp. 128–139, 2016. View at Publisher · View at Google Scholar · View at Scopus
  29. Q. Huang, L. Wang, and Y. Yang, “DECENT: secure and fine-grained data access control with policy updating for constrained IoT devices,” World Wide Web, pp. 1–17, 2017. View at Publisher · View at Google Scholar
  30. B. Lynn, The pairing-based cryptography library, http://crypto.stanford.edu/pbc/.