Design of a Secure Emergency Communication System Based on Cloud for Pregnancy

  • Guan-Chen Li
  • Chin-Ling Chen
  • Feng Lin
  • Jungpil Shin
  • Cheng Gu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10232)

Abstract

Due to the high maternal mortality, it is particularly necessary to attend pregnant woman by emergency communication system as timely treatment to avoid maternal deaths. In this paper, we propose an emergency communication system based on cloud computing and mobile devices for a pregnant woman to have a more efficiently and timely treatment. Moreover, security is the utmost important issue. The proposed scheme integrates proxy authorization of the Schnorr’s signature, symmetric encryption technology, a message authentication code, and RFC 2631 to protect the communication messages and the pregnant woman’s privacy not been revealed or stolen.

Keywords

RFC 2631 Schnorr’s signature Cloud Emergency 

Notes

Acknowledgements

This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract number MOST 105-2221-E-324-007, MOST 105-2622-E-212-008 -CC2 and MOST103-2632-E-324-001-MY3.

References

  1. 1.
    Chen, C.L., Yang, T.T., Chiang, M.-L., Shih, T.F.: A privacy authentication scheme based on cloud for medical environment. J. MS 38(11), 143 (2014)Google Scholar
  2. 2.
  3. 3.
    Platania, M., Obenshain, D., Tantillo, T., Amir, Y., Suri, N.: On choosing server-or client-side solutions for BFT. ACM Comput. Surv. 48(4), 61 (2016)CrossRefGoogle Scholar
  4. 4.
    Mavletova, A.: Data quality in PC and mobile web surveys. SSCR 31(6), 725–743 (2013)Google Scholar
  5. 5.
    Sailunaz, K., Alhussein, M., Shahiduzzaman, M., Anowar, F., Mamun, K.A.A.: CMED: Cloud based medical system framework for rural health monitoring in developing countries. CEE 53, 469–481 (2016)Google Scholar
  6. 6.
    Mould-Millman, N.K., de Vries, S., Stein, C., Kafwamfwa, M., Dixon, J., Yancey, A., Laba, B., Overton, J., McDaniel, R., Wallis, L.A.: Developing emergency medical dispatch systems in Africa–recommendations of the african federation for emergency medicine/international academies of emergency dispatch working group. Afr. J. EM 5(3), 141–147 (2015)CrossRefGoogle Scholar
  7. 7.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE 79(9), 1338–1354 (1996)Google Scholar
  8. 8.
    Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)MathSciNetCrossRefMATHGoogle Scholar
  9. 9.
    Chen, C.L., Chen, Y.Y., Lee, C.-C., Wu, C.-H.: Design and analysis of a secure and effective emergency system for mountaineering events. J. Supercomputing 70(1), 54–74 (2014)CrossRefGoogle Scholar
  10. 10.
    Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM, Fairfax (1993)Google Scholar
  11. 11.
    Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). doi: 10.1007/3-540-68339-9_33 CrossRefGoogle Scholar
  12. 12.
    Rescorla, E.: Diffie-Hellman key agreement method (1999). https://www.ietf.org/rfc/rfc2631.txt

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Guan-Chen Li
    • 1
  • Chin-Ling Chen
    • 2
    • 3
  • Feng Lin
    • 1
  • Jungpil Shin
    • 4
  • Cheng Gu
    • 5
  1. 1.School of Information and Communication EngineeringShenyang Aerospace UniversityLiaoningChina
  2. 2.Department of Computer Science and Information EngineeringChaoyang University of TechnologyTaichungTaiwan (R.O.C.)
  3. 3.School of Information EngineeringChangchun University of TechnologyChangchunChina
  4. 4.Graduate School of Computer Science and EngineeringThe University of AizuAizuwakamatsuJapan
  5. 5.College of Electronic and Communication EngineeringTianjin Normal UniversityTianjingChina

Personalised recommendations