Research Article

Remote Surveillance System without Privacy Leakage for Contacts in Infectious Disease

Algorithm 6

Location information protection.
(1)for each location data LI collected at each timestamp
(2) contact encrypts the location data by
(3) location database
(4)end for
(5)if contact is confirmed
(6) hospital sends N_CD of the contact to the health center
(7) user encrypts the by , and sends it to health center
(8) health center decrypts the location data of the contact by
(9)end if