Enter your keyword

2-s2.0-85014990756

[vc_empty_space][vc_empty_space]

Pseudonym-based privacy protection for Steppy application

Nugroho H.A.a,b, Priyana Y.a, Prihatmanto A.S.a, Rhee K.H.b

a School of Electrical Engineering and Informatics, Bandung Institute of Technology, Indonesia
b Dept. of IT Convergence and Application Engineering, Pukyong National University, South Korea

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2016 IEEE.Steppy is an Android-based application which is used for calculating the number of footsteps. The Steppy data is stored in the database and is shown on the Shesop website. When Personal Health Record (PHR) features on the website, privacy becomes vulnerable to various attacks so it needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, anyone who access the site should not tamper without permission. In this paper, we adopt pseudonym technique and apply it to the Shesop website to construct secure application. We review the existing system and make some recommendations to preserve the privacy of user and we design pseudonym technique using time based one-Time password (TOTP). Furthermore, we present an approach to address the security needs and pseudonym algorithms to tackle the security requirements. In addition, the proposed scheme can overcome the leaked information, the real identity of patients is never disclosed to anyone. Analysis result shows that the proposed scheme can enhance the user privacy against the adversary contained in the mobile healthcare networks (MHNs), which can be regarded as one of the most vulnerable conditions for patient’s data.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]MHNs,Pseudonym,Shesop,Steppy,TOTP[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]MHNs,PHR,Privacy,Pseudonym,Shesop,Steppy,TOTP[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/INAES.2016.7821922[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]