GPC 2017: Green, Pervasive, and Cloud Computing pp 585-595 | Cite as
Design of a Secure Emergency Communication System Based on Cloud for Pregnancy
Abstract
Due to the high maternal mortality, it is particularly necessary to attend pregnant woman by emergency communication system as timely treatment to avoid maternal deaths. In this paper, we propose an emergency communication system based on cloud computing and mobile devices for a pregnant woman to have a more efficiently and timely treatment. Moreover, security is the utmost important issue. The proposed scheme integrates proxy authorization of the Schnorr’s signature, symmetric encryption technology, a message authentication code, and RFC 2631 to protect the communication messages and the pregnant woman’s privacy not been revealed or stolen.
Keywords
RFC 2631 Schnorr’s signature Cloud EmergencyNotes
Acknowledgements
This research was supported by the Ministry of Science and Technology, Taiwan, R.O.C., under contract number MOST 105-2221-E-324-007, MOST 105-2622-E-212-008 -CC2 and MOST103-2632-E-324-001-MY3.
References
- 1.Chen, C.L., Yang, T.T., Chiang, M.-L., Shih, T.F.: A privacy authentication scheme based on cloud for medical environment. J. MS 38(11), 143 (2014)Google Scholar
- 2.Website of WHO. http://www.who.int/mediacentre/factsheets/fs348/en/
- 3.Platania, M., Obenshain, D., Tantillo, T., Amir, Y., Suri, N.: On choosing server-or client-side solutions for BFT. ACM Comput. Surv. 48(4), 61 (2016)CrossRefGoogle Scholar
- 4.Mavletova, A.: Data quality in PC and mobile web surveys. SSCR 31(6), 725–743 (2013)Google Scholar
- 5.Sailunaz, K., Alhussein, M., Shahiduzzaman, M., Anowar, F., Mamun, K.A.A.: CMED: Cloud based medical system framework for rural health monitoring in developing countries. CEE 53, 469–481 (2016)Google Scholar
- 6.Mould-Millman, N.K., de Vries, S., Stein, C., Kafwamfwa, M., Dixon, J., Yancey, A., Laba, B., Overton, J., McDaniel, R., Wallis, L.A.: Developing emergency medical dispatch systems in Africa–recommendations of the african federation for emergency medicine/international academies of emergency dispatch working group. Afr. J. EM 5(3), 141–147 (2015)CrossRefGoogle Scholar
- 7.Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE 79(9), 1338–1354 (1996)Google Scholar
- 8.Schnorr, C.-P.: Efficient signature generation by smart cards. J. Cryptology 4(3), 161–174 (1991)MathSciNetCrossRefMATHGoogle Scholar
- 9.Chen, C.L., Chen, Y.Y., Lee, C.-C., Wu, C.-H.: Design and analysis of a secure and effective emergency system for mountaineering events. J. Supercomputing 70(1), 54–74 (2014)CrossRefGoogle Scholar
- 10.Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM, Fairfax (1993)Google Scholar
- 11.Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 387–398. Springer, Heidelberg (1996). doi: 10.1007/3-540-68339-9_33 CrossRefGoogle Scholar
- 12.Rescorla, E.: Diffie-Hellman key agreement method (1999). https://www.ietf.org/rfc/rfc2631.txt