Abstract
In this chapter, we summarize the highlights of the monograph and discuss several potential research topics for future work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D. He, C. Chen, S. Chan, J. Bu, and P. Zhang, “Secure and Lightweight Network Admission and Transmission Protocol for Body Sensor Networks,” IEEE Journal of Biomedical and Health Informatics, vol. 17, no. 3, pp. 664–674, 2013.
K. Zhang, X. Liang, M. Barua, R. Lu, and X. Shen, “PHDA: A priority based health data aggregation with privacy preservation for cloud assisted WBANs,” Information Sciences, vol. 284, pp. 130–141, 2014.
Y. Bao, J. Beck, and H. Li, “Compressive sampling for accelerometer signals in structural health monitoring,” SAGE Publications, pp. 235–246, 2011.
K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, and H. Luo, “Security and privacy for mobile healthcare networks — from quality-of-protection perspective,” IEEE Wireless Communications, vol. 22, no. 4, pp. 104–112, 2015.
E. J. Candès and M. Wakin, “An introduction to compressive sampling,” IEEE Signal Processing Magazine, vol. 25, no. 2, pp. 21–30, 2008.
J. Hoffstein, J. Pipher, and J. Silverman, “NTRU: A Ring-Based Public Key Cryptosystem,” in Proc. of ANTS, 1998, pp. 267–288.
P. Nguyen and D. Pointcheval, “Analysis and Improvements of NTRU Encryption Paddings,” in Proc. of CRYPTO, 2002, pp. 210–225.
X. Liang, K. Zhang, X. Shen, and X. Lin, “Security and privacy in mobile social networks: challenges and solutions,” IEEE Wireless Communications, vol. 21, no. 1, pp. 33–41, 2014.
K. Yang, K. Zhang, J. Ren, and X. Shen, “Security and Privacy in Mobile Crowdsourcing Networks: Challenges and Opportunities,” IEEE Communications, vol. 53, no. 8, pp. 75–81, 2015.
J. Ren, Y. Zhang, K. Zhang, and X. Shen, “Exploiting Mobile Crowdsourcing for Pervasive Cloud Services: Challenges and Solutions,” IEEE Communications Magazine, vol. 53, no. 3, pp. 98–105, 2015.
X. Liu, R. Lu, J. Ma, L. Chen, and B. Qin, “Privacy-Preserving Patient-Centric Clinical Decision Support System on Naive Bayesian Classification,” Biomedical and Health Informatics, IEEE Journal of, to appear.
T. Graepel, K. Lauter, and M. Naehrig, “ML Confidential: Machine Learning on Encrypted Data,” in Proc. of ICISC, vol. 7839, 2012, pp. 1–21.
R. Bost, R. Popa, S. Tu, and S. Goldwasser, “Machine Learning Classification over Encrypted Data,” in Proc. of NDSS, 2015, pp. 1–14.
K. E. Emam, F. K. Dankar, R. Issa, E. Jonker, D. Amyot, E. Cogo, J.-P. Corriveau, M. Walker, S. Chowdhury, R. Vaillancourt, T. Roffey, and J. Bottomley, “A Globally Optimal k-Anonymity Method for the De-Identification of Health Data,” American Medical Informatics Association, vol. 5, no. 16, pp. 670–682, 2009.
L. Sweeney, “Achieving k-Anonymity Privacy Protection Using Generalization and Suppression,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 571–588, 2002.
S. Chen, R. Wang, X. Wang, and K. Zhang, “Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow,” in IEEE Symposium on Security and Privacy, 2010, pp. 191–206.
Forbes. [Online]. Available: http://www.forbes.com/sites/robertvamosi/2015/07/20/side-channel-analysis-can-protect-iot-scada/
X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, “SAGE: A Strong Privacy-preserving Scheme Against Global Eavesdropping for ehealth Systems,” IEEE Journal on Selected Areas in Communications, vol. 27, no. 4, pp. 365–378, 2009.
K. Yang, X. Jia, and K. Ren, “Secure and Verifiable Policy Update Outsourcing for Big Data Access Control in the Cloud,” IEEE Transactions on Parallel and Distributed Systems, to appear.
S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” in Proc. of IEEE INFOCOM, 2010, pp. 534–542.
S. Yu, C. Wang, K. Ren, and W. Lou, “Attribute based data sharing with attribute revocation,” in Proc. of ASIACCS, 2010, pp. 261–270.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Zhang, K., Shen, X.(. (2015). Summary and Future Research Directions. In: Security and Privacy for Mobile Healthcare Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-24717-5_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-24717-5_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24715-1
Online ISBN: 978-3-319-24717-5
eBook Packages: Computer ScienceComputer Science (R0)