Disseminação Robusta de Dados Pessoais Sensíveis Baseada em Comunidade de Interesse e Confiança Social para Suportar Situações Emergenciais de Saúde

  • Agnaldo Batista UFPR
  • Michele Nogueira UFPR
  • Aldri Santos UFPR

Abstract


E-health services deal with sensitive personal data, which must be preserved in the delivery and from unauthorized access. Dissemination control mechanisms have currently focused on health structured environments, like hospitals, and still do not adequately support the moments from an emergency takes place until health care in urban dynamic environments, as streets and avenues. Social aspects from people and their relationships contribute to preserving data delivery. This paper presents STEALTH, a system that employs social trust and communities of interest (CoI) to control the dissemination of people's sensitive data in emergencies on dynamic environments. NS-3 Simulations demonstrate its ability to ensure data dissemination to people who can contribute to efficient service. STEALTH achieved up to 80% of reliability in access to data with maximum latency of 95ms, up to 98,8% of availability for emergency situations.

References

Al-Hamadi, H. and Chen, R. (2017). Trust-Based Decision Making for Health IoT Systems. IEEE Internet of Things Journal, 4(5):1408–1419.

Association, I. S. et al. (2012). 802.15. 6-2012 IEEE Standards for Local and Metropolitan Area Networks–Part 15.6: Wireless Body Area Networks.

Bao, F. and Chen, R. (2012). Trust Management for the Internet of Things and Its Application to Service Composition. In WoWMoM 2012, pages 1–6.

Bao, F., Chen, R., and Guo, J. (2013). Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems. In ISADS 2013, pages 1–7.

Carminati, B., Ferrari, E., and Guglielmi, M. (2016). Detection of Unspecified Emergencies for Controlled Information Sharing. IEEE TDSC, 13(6):630–643.

Cho, J.-H., Chan, K., and Adali, S. (2015). A Survey on Trust Modeling. ACM Computing Surveys (CSUR), 48(2):28.

Coscia, M., Giannotti, F., and Pedreschi, D. (2011). A classification for community discovery methods in complex networks. Statistical Analysis and Data Mining, 4(5):512–546.

Feige, U., Fiat, A., and Shamir, A. (1988). Zero-knowledge proofs of identity. Journal of cryptology, 1(2):77–94.

Garyfalos, A. and Almeroth, K. C. (2008). Coupons: A Multilevel Incentive Scheme for Information Dissemination in Mobile Networks. IEEE Transactions on Mobile Computing, 7(6):792–804.

Helgason, Ó., Kouyoumdjieva, S. T., and Karlsson, G. (2014). Opportunistic Communication and Human Mobility. IEEE Transactions on Mobile Computing, 13(7):1597–1610.

Latré, B., Braem, B., Moerman, I., Blondia, C., and Demeester, P. (2011). A survey on wireless body area networks. Wireless Networks, 17(1):1–18.

Lima, M. N., dos Santos, A. L., and Pujolle, G. (2009). A Survey of Survivability in Mobile Ad Hoc Networks. IEEE Communications Surveys and Tutorials, 11(1):66–77.

Mohammad, S. and Hirst, G. (2012). Distributional Measures of Semantic Distance: A Survey. CoRR, abs/1203.1858.

Movassaghi, S., Abolhasan, M., Lipman, J., Smith, D., and Jamalipour, A. (2014). Wireless Body Area Networks: A Survey. IEEE Communications surveys & tutorials, 16(3):1658–1686.

Nogueira, M., Mannes, E., and Santos, A. (2012). Serviços Confiáveis em MANETs Baseado em Sistema de Quórum Tolerante à Má-conduta. In Anais do XXX SBRC, pages 305–318. SBC.

Resnik, P. (1999). Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language. JAIR, 11:95–130.

Rossetti, G. and Cazabet, R. (2018). Community Discovery in Dynamic Networks: a Survey. ACM Computing Surveys (CSUR), 51(2):35.

Silverstein, J. (2019). Hundreds of millions of Facebook user records were exposed on Amazon cloud server. https://www.cbsnews.com/news/millions-facebook-user-records-exposedamazon-cloud-server/. [Online]. Acessado em Abr. 2019.

Truong, N. B., Lee, H., Askwith, B., and Lee, G. M. (2017). Toward a Trust Evaluation Mechanism in the Social Internet of Things. Sensors, 17(6):1346.

Vasilomanolakis, E., Wolf, J. H., Böck, L., Karuppayah, S., and Mühlhäuser, M. (2017). I Trust my Zombies: A Trust-enabled Botnet. CoRR, abs/1712.03713.

Vivekavardhana, R. B. and Sudhindra, K. R. (2014). Survey of Trust Models in Wireless Sensor Networks. IJAIST, 31(31).

Williams, M., Nurse, J. R., and Creese, S. (2016). The Perfect Storm: The Privacy Paradox and the Internet-of-Things. In ARES 2016, pages 644–652. IEEE.

Wu, Z. and Palmer, M. (1994). Verbs semantics and lexical selection. In ACM Proceedings of the 32nd annual meeting on Association for Computational Linguistics, pages 133–138.
Published
2019-09-02
BATISTA, Agnaldo; NOGUEIRA, Michele; SANTOS, Aldri. Disseminação Robusta de Dados Pessoais Sensíveis Baseada em Comunidade de Interesse e Confiança Social para Suportar Situações Emergenciais de Saúde. In: BRAZILIAN SYMPOSIUM ON CYBERSECURITY (SBSEG), 19. , 2019, São Paulo. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2019 . p. 197-210. DOI: https://doi.org/10.5753/sbseg.2019.13972.

Most read articles by the same author(s)

1 2 3 > >>