{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:50Z","timestamp":1740141770224,"version":"3.37.3"},"reference-count":30,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2015,12,1]],"date-time":"2015-12-01T00:00:00Z","timestamp":1448928000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170263","60911140102"],"award-info":[{"award-number":["61170263","60911140102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170263","60911140102"],"award-info":[{"award-number":["61170263","60911140102"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2015,12,1]]},"abstract":"<jats:p> With the growing need for the remote caring at home and the everincreasing popularity of mobile devices, more and more applications are being developed to enable remote health monitoring. Combining cloud computing with mobile technologies has enabled the healthcare service provider to offer continuous health data collection and physicians to conveniently monitor and assess users\u2019 health while they are at home. However, users\u2019 health data contain highly confidential information, and servers in the cloud are out of users\u2019 trusted domain. Therefore, users may be reluctant to take advantage of remote health monitoring systems before they make sure their data are properly protected. In this paper, we propose a secure continuous remote health monitoring system named SCRHM with the main component, a searchable encryption scheme supporting range searches for remote health monitoring system. With this scheme, remote health monitoring service provider is able to detect outliers over encrypted health parameters. Using analysis, we prove the correctness and security of the proposed scheme on privacy protection of users\u2019 health data. Via simulation experiments, we validate the performance of the proposed scheme in terms of computation and communication overhead. <\/jats:p>","DOI":"10.1155\/2015\/392439","type":"journal-article","created":{"date-parts":[[2015,12,19]],"date-time":"2015-12-19T07:52:31Z","timestamp":1450511551000},"page":"392439","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":5,"title":["SCRHM: A Secure Continuous Remote Health Monitoring System"],"prefix":"10.1177","volume":"11","author":[{"given":"Qiuxiang","family":"Dong","sequence":"first","affiliation":[{"name":"Institute of Software, School of EECS, Peking University, Beijing 100871, China"},{"name":"MoE Key Lab of High Confidence Software Technologies, PKU, Beijing 100871, China"},{"name":"MoE Key Lab of Network and Software Security Assurance, PKU, Beijing 100871, China"}]},{"given":"Zhi","family":"Guan","sequence":"additional","affiliation":[{"name":"Institute of Software, School of EECS, Peking University, Beijing 100871, China"},{"name":"MoE Key Lab of High Confidence Software Technologies, PKU, Beijing 100871, China"},{"name":"MoE Key Lab of Network and Software Security Assurance, PKU, Beijing 100871, China"},{"name":"National Engineering Research Center of Software Engineering, PKU, Beijing 100871, China"}]},{"given":"Kunlun","family":"Gao","sequence":"additional","affiliation":[{"name":"State Grid Smart Grid Research Institute, Beijing 102211, China"}]},{"given":"Zhong","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Software, School of EECS, Peking University, Beijing 100871, China"},{"name":"MoE Key Lab of High Confidence Software Technologies, PKU, Beijing 100871, China"},{"name":"MoE Key Lab of Network and Software Security Assurance, PKU, Beijing 100871, China"}]}],"member":"179","published-online":{"date-parts":[[2015,12,17]]},"reference":[{"volume-title":"World Population Prospects: The 2012 Revision Population Database","year":"2012","author":"Population Division","key":"B1-2015-392439"},{"key":"B3-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/cbms.2009.5255383"},{"key":"B5-2015-392439","doi-asserted-by":"publisher","DOI":"10.3390\/s141121329"},{"first-page":"117","volume-title":"Proceedings of the 7th International Conference on Security of Information and Networks (SIN \u203214)","author":"Paul G.","key":"B8-2015-392439"},{"key":"B9-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2012.6393513"},{"key":"B10-2015-392439","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2005.07.018"},{"key":"B12-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2013.2262913"},{"key":"B13-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcc.2009.2032660"},{"key":"B14-2015-392439","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.05.004"},{"first-page":"47","volume-title":"Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop","author":"Narayan S.","key":"B15-2015-392439"},{"key":"B16-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"B17-2015-392439","doi-asserted-by":"publisher","DOI":"10.1145\/1882992.1883024"},{"key":"B18-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"B19-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2011.55"},{"key":"B20-2015-392439","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"B21-2015-392439","unstructured":"Popa R. A.Building practical systems that compute on encrypted data [Ph.D. thesis]2014Cambridge, Mass, USAMassachusetts Institute of Technology"},{"key":"B22-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"first-page":"79","volume-title":"Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS \u203206)","author":"Curtmola R.","key":"B23-2015-392439"},{"key":"B24-2015-392439","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"B25-2015-392439","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_29"},{"key":"B26-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2007.29"},{"volume-title":"Proceedings of the 19th Network & Distributed System Security Symposium (NDSS \u203212)","author":"Lu Y.","key":"B27-2015-392439"},{"key":"B28-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/icde.2013.6544835"},{"key":"B29-2015-392439","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590305"},{"key":"B30-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"B31-2015-392439","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"B32-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2011.83"},{"key":"B33-2015-392439","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559862"},{"key":"B34-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/iwqos.2013.6550283"},{"key":"B35-2015-392439","doi-asserted-by":"publisher","DOI":"10.1109\/icde.2013.6544870"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/392439","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2015\/392439","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2015\/392439","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,7]],"date-time":"2021-05-07T13:45:44Z","timestamp":1620395144000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2015\/392439"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,1]]},"references-count":30,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2015,12,1]]}},"alternative-id":["10.1155\/2015\/392439"],"URL":"https:\/\/doi.org\/10.1155\/2015\/392439","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2015,12,1]]}}}