Research Article
Remote Surveillance System without Privacy Leakage for Contacts in Infectious Disease
Algorithm 1
Personal information and health data protection.
(1) | user registration by | (2) | if user is legal | (3) | obtain the pseudo-ID from authority | (4) | else | (5) | reject the users’ registration request and exit | (6) | write the pseudo-ID and into wireless sensor devices | (7) | for each health data at timestamp | (8) | data encryption by | (9) | data storage and pre-diagnosis analysis in health center | (10) | if is abnormal | (11) | send the related information to hospital by | (12) | hospital sends the location request to the contact with its | (13) | contact verifies the legality of the hospital by its identity ID | (14) | if is legal | (15) | contact sends address to hospital by | (16) | else | (17) | contact rejects the location request | (18) | end if | (19) | end if | (20) | end for |
|