2. Introduction
System Model
Security Model
Design Goal
Proposed SPOC framework
Security Analysis
Conclusion
References
3. M-Healthcare an application to improve
health care quality and save lives
BSN’s and Smartphone's utilized to provide
m-health care in chronic medical conditions
like heart attacks, diabetes
Medical users are no longer needed to be
monitored within home or hospitals with
m-healthcare
4.
5. Opportunistic computing is to resolve
reliability issue in Personal Health
Information[PHI] process
Once the raw PHI data is processed in OC, the
privacy of PHI would be disclosed
3-contributions
i) balances high reliability of PHI &
minimizing PHI privacy disclosure
ii) to achieve user-centric privacy access
control
iii) to validate proposed SPOC framework
6.
7. As PHI very sensitive, it can handle with
minimal privacy disclosure
It has:
i) Phase-1 access control
ii)Phase-2 access control
These two access control to achieve high
reliable PHI process & transmission in m-
healthcare emergency
8.
9. It is to develop specifically:
i) apply opportunistic computing in
m-healthcare emergency to achieve high
reliability of PHI process and transmission
ii) develop user centric privacy access control
to minimize the PHI privacy disclosure
10. It has 3-parts
1)System Initialization
2)User centric privacy access control for m-
healthcare emergency
-phase-I access control
-phase-II access control
3)Analysis of opportunistic computing in m-
healthcare emergency
11. The proposed SPOC framework can achieve
phase –I access control and also phase –II
access control by providing security
It can achieve the user-centric privacy access
control of opportunistic computing in
m-healthcare emergency
12. The proposed SPOC framework which mainly
exploits how to use OC to achieve high
reliability of PHI process & transmission in
emergency while minimizing the privacy
disclosure is achieved.
It has achieved the balance the high intensive
PHI process
Future work may exploit issues of PPSPC.