Research Article

Remote Surveillance System without Privacy Leakage for Contacts in Infectious Disease

Algorithm 1

Personal information and health data protection.
(1)user registration by
(2)if user is legal
(3) obtain the pseudo-ID from authority
(4)else
(5) reject the users’ registration request and exit
(6)write the pseudo-ID and into wireless sensor devices
(7)for each health data at timestamp
(8) data encryption by
(9) data storage and pre-diagnosis analysis in health center
(10) if is abnormal
(11)  send the related information to hospital by
(12)  hospital sends the location request to the contact with its
(13)  contact verifies the legality of the hospital by its identity ID
(14)  if is legal
(15)   contact sends address to hospital by
(16)  else
(17)   contact rejects the location request
(18)  end if
(19) end if
(20)end for