際際滷

際際滷Share a Scribd company logo
BIBLIOGRAPHY
[1] P. Mohan, D. Marin, S. Sultan, and A. Deen, Medinet: personalizing the self-care
process for patients with diabetes and cardiovascular disease using mobile
telephony. Conference Proceedings of the International Conference of IEEE
Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755758.
[Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765
[2] A. Tsanas, M. Little, P. McSharry, and L. Ramig, Accurate telemonitoring of
parkinsons disease progression by noninvasive speech tests, Biomedical
Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884  893, 2010.
[3] G. Clifford and D. Clifton, Wireless technology in disease management and
medicine, Annual Review of Medicine, vol. 63, pp. 479492, 2012.
[4] L. Ponemon Institute, Americans opinions on healthcare privacy, available:
http://tinyurl.com/4atsdlj, 2010.
[5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. vanBeijnum, and P. D. Stefanis, End-
user perception towards pervasive cardiac healthcare services: Benefits, acceptance,
adoption, risks, security, privacy and trust, in PervasiveHealth, 2011, pp. 478484.
[6] M. Delgado, The evolution of health care it: Are current u.s. privacy policies ready
for the clouds? in SERVICES, 2011, pp. 371378.
[7] N. Singer, When 2+ 2 equals a privacy question, New York Times, 2009.
[8] E. B. Fernandez, Security in data intensive computing systems, in Handbook of
Data Intensive Computing, 2011, pp. 447466.
[9] A. Narayanan and V. Shmatikov, Myths and fallacies of personally identifiable
information, Communications of the ACM, vol. 53, no. 6 , pp. 2426, 2010.
[10] P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, Countering gattaca:
efficient and secure testing of fully-sequenced human genomes, in ACM
Conference on Computer and Communications Security, 2011, pp. 691702.
APPENDIX
1) Indistinguishability of Encryptions under Chosen Ciphertext Attack:
The ID-IE-CCA security for the proposed key private proxy re-encryption scheme
is defined by the following chosen-cipher text attack game played between a challenger C
and an adversary A. Note that we have two types of cipher texts in the proposed key
private re-encryption scheme, and hence, there are two situations.
2) Indistinguishability of Keys under Chosen-Ciphertext Attack:
The ID-IK-CCA security for our proposed key private re-encryption scheme is
defined by the same method as for the ID-IE-CCA security. Note that we have two types
of challenges. One is for an original ciphertext, the other is for a re-encryption key. The
former is for the anonymity of the original ciphertext, and the latter is for the anonymity
of the re-encryption key.

More Related Content

Similar to A PROJECT REPORT ON CLOUD ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING (20)

July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
AIRCC Publishing Corporation
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
Mohammad Shakirul islam
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
TaunyaCoffman887
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
acijjournal
A Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record SystemA Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record System
poojaphddata
The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices
YanNiMok
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
IJNSA Journal
Top 10 cited articles for HIIJ
Top 10 cited articles for HIIJTop 10 cited articles for HIIJ
Top 10 cited articles for HIIJ
hiij
Top 10 cited articles for HIIJ
Top 10 cited articles for HIIJTop 10 cited articles for HIIJ
Top 10 cited articles for HIIJ
hiij
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
November 2024-: Most Downloaded Articles in Computer Science & Information Te...November 2024-: Most Downloaded Articles in Computer Science & Information Te...
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
AIRCC Publishing Corporation
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
ijcisjournal
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
IJNSA Journal
Top downloaded article in academia 2020 - International Journal of Computatio...
Top downloaded article in academia 2020 - International Journal of Computatio...Top downloaded article in academia 2020 - International Journal of Computatio...
Top downloaded article in academia 2020 - International Journal of Computatio...
ijcsity
August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...
August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...
August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...
ClaraZara1
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
AIRCC Publishing Corporation
Contextual Analysis
Contextual AnalysisContextual Analysis
Contextual Analysis
Md Tajul Islam
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
AIRCC Publishing Corporation
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
IJNSA Journal
TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
AIRCC Publishing Corporation
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
IJNSA Journal
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
Mohammad Shakirul islam
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
TaunyaCoffman887
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
acijjournal
A Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record SystemA Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record System
poojaphddata
The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices
YanNiMok
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
IJNSA Journal
Top 10 cited articles for HIIJ
Top 10 cited articles for HIIJTop 10 cited articles for HIIJ
Top 10 cited articles for HIIJ
hiij
Top 10 cited articles for HIIJ
Top 10 cited articles for HIIJTop 10 cited articles for HIIJ
Top 10 cited articles for HIIJ
hiij
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
November 2024-: Most Downloaded Articles in Computer Science & Information Te...November 2024-: Most Downloaded Articles in Computer Science & Information Te...
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
AIRCC Publishing Corporation
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
ijcisjournal
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
IJNSA Journal
Top downloaded article in academia 2020 - International Journal of Computatio...
Top downloaded article in academia 2020 - International Journal of Computatio...Top downloaded article in academia 2020 - International Journal of Computatio...
Top downloaded article in academia 2020 - International Journal of Computatio...
ijcsity
August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...
August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...
August 2024 - Top 10 Cited Articles in International Journal of Security, Pri...
ClaraZara1
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
AIRCC Publishing Corporation
Contextual Analysis
Contextual AnalysisContextual Analysis
Contextual Analysis
Md Tajul Islam
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
AIRCC Publishing Corporation

Recently uploaded (20)

惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
o774656624
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75
Defining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdfDefining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdf
ARENCOS
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
SnehPrasad2
-PPT-5-Wind-Energy conversion slides contents
-PPT-5-Wind-Energy conversion   slides contents-PPT-5-Wind-Energy conversion   slides contents
-PPT-5-Wind-Energy conversion slides contents
senthilkumarmamse
Practice Head Torpedo - Neometrix Defence.pptx
Practice Head Torpedo - Neometrix Defence.pptxPractice Head Torpedo - Neometrix Defence.pptx
Practice Head Torpedo - Neometrix Defence.pptx
Neometrix_Engineering_Pvt_Ltd
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
samueljackson3773
Indian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical EngineeringIndian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical Engineering
Rajani Vyawahare
How to Build a Speed Sensor using Arduino?
How to Build a Speed Sensor using Arduino?How to Build a Speed Sensor using Arduino?
How to Build a Speed Sensor using Arduino?
CircuitDigest
direct current machine first part about machine.pdf
direct current machine first part about machine.pdfdirect current machine first part about machine.pdf
direct current machine first part about machine.pdf
sahilshah890338
Dilatometer Test in Geotechnical engineering an over view .pptx
Dilatometer Test in Geotechnical engineering an over view .pptxDilatometer Test in Geotechnical engineering an over view .pptx
Dilatometer Test in Geotechnical engineering an over view .pptx
RaghuramChallaC011
Biases, our brain and software development
Biases, our brain and software developmentBiases, our brain and software development
Biases, our brain and software development
Matias Iacono
AIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.pptAIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.ppt
thisisparthipan1
Dijkstra Shortest Path Algorithm in Network.ppt
Dijkstra Shortest Path Algorithm in Network.pptDijkstra Shortest Path Algorithm in Network.ppt
Dijkstra Shortest Path Algorithm in Network.ppt
RAJASEKARAN G
Von karman Equation full derivation .pdf
Von karman Equation full derivation  .pdfVon karman Equation full derivation  .pdf
Von karman Equation full derivation .pdf
Er. Gurmeet Singh
Instruction execution cycle _
Instruction execution cycle                  _Instruction execution cycle                  _
Instruction execution cycle _
SwatiHans10
Environmental Product Declaration - Uni Bell
Environmental Product Declaration - Uni BellEnvironmental Product Declaration - Uni Bell
Environmental Product Declaration - Uni Bell
ManishPatel169454
GE 6B GT Ratcheting Animation- Hemananda Chinara.ppsx
GE 6B GT Ratcheting Animation- Hemananda Chinara.ppsxGE 6B GT Ratcheting Animation- Hemananda Chinara.ppsx
GE 6B GT Ratcheting Animation- Hemananda Chinara.ppsx
Hemananda Chinara
ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3
prasadmutkule1
AI ppt on water jug problem by shivam sharma
AI ppt on water jug problem by shivam sharmaAI ppt on water jug problem by shivam sharma
AI ppt on water jug problem by shivam sharma
ShivamSharma588604
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
惠悋惡 悋惠悋惶 悋悋愆悋悧 愆悛惠 悋悽惘愕悋悸
o774656624
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptxThe Golden Gate Bridge a structural marvel inspired by mother nature.pptx
The Golden Gate Bridge a structural marvel inspired by mother nature.pptx
AkankshaRawat75
Defining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdfDefining the Future of Biophilic Design in Crete.pdf
Defining the Future of Biophilic Design in Crete.pdf
ARENCOS
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
Common Network Architecture:X.25 Networks, Ethernet (Standard and Fast): fram...
SnehPrasad2
-PPT-5-Wind-Energy conversion slides contents
-PPT-5-Wind-Energy conversion   slides contents-PPT-5-Wind-Energy conversion   slides contents
-PPT-5-Wind-Energy conversion slides contents
senthilkumarmamse
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
TASK-DECOMPOSITION BASED ANOMALY DETECTION OF MASSIVE AND HIGH-VOLATILITY SES...
samueljackson3773
Indian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical EngineeringIndian Soil Classification System in Geotechnical Engineering
Indian Soil Classification System in Geotechnical Engineering
Rajani Vyawahare
How to Build a Speed Sensor using Arduino?
How to Build a Speed Sensor using Arduino?How to Build a Speed Sensor using Arduino?
How to Build a Speed Sensor using Arduino?
CircuitDigest
direct current machine first part about machine.pdf
direct current machine first part about machine.pdfdirect current machine first part about machine.pdf
direct current machine first part about machine.pdf
sahilshah890338
Dilatometer Test in Geotechnical engineering an over view .pptx
Dilatometer Test in Geotechnical engineering an over view .pptxDilatometer Test in Geotechnical engineering an over view .pptx
Dilatometer Test in Geotechnical engineering an over view .pptx
RaghuramChallaC011
Biases, our brain and software development
Biases, our brain and software developmentBiases, our brain and software development
Biases, our brain and software development
Matias Iacono
AIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.pptAIR FILTER system in internal combustion engine system.ppt
AIR FILTER system in internal combustion engine system.ppt
thisisparthipan1
Dijkstra Shortest Path Algorithm in Network.ppt
Dijkstra Shortest Path Algorithm in Network.pptDijkstra Shortest Path Algorithm in Network.ppt
Dijkstra Shortest Path Algorithm in Network.ppt
RAJASEKARAN G
Von karman Equation full derivation .pdf
Von karman Equation full derivation  .pdfVon karman Equation full derivation  .pdf
Von karman Equation full derivation .pdf
Er. Gurmeet Singh
Instruction execution cycle _
Instruction execution cycle                  _Instruction execution cycle                  _
Instruction execution cycle _
SwatiHans10
Environmental Product Declaration - Uni Bell
Environmental Product Declaration - Uni BellEnvironmental Product Declaration - Uni Bell
Environmental Product Declaration - Uni Bell
ManishPatel169454
GE 6B GT Ratcheting Animation- Hemananda Chinara.ppsx
GE 6B GT Ratcheting Animation- Hemananda Chinara.ppsxGE 6B GT Ratcheting Animation- Hemananda Chinara.ppsx
GE 6B GT Ratcheting Animation- Hemananda Chinara.ppsx
Hemananda Chinara
ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3ESIT135 Problem Solving Using Python Notes of Unit-3
ESIT135 Problem Solving Using Python Notes of Unit-3
prasadmutkule1
AI ppt on water jug problem by shivam sharma
AI ppt on water jug problem by shivam sharmaAI ppt on water jug problem by shivam sharma
AI ppt on water jug problem by shivam sharma
ShivamSharma588604

A PROJECT REPORT ON CLOUD ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING

  • 1. BIBLIOGRAPHY [1] P. Mohan, D. Marin, S. Sultan, and A. Deen, Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony. Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755758. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765 [2] A. Tsanas, M. Little, P. McSharry, and L. Ramig, Accurate telemonitoring of parkinsons disease progression by noninvasive speech tests, Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884 893, 2010. [3] G. Clifford and D. Clifton, Wireless technology in disease management and medicine, Annual Review of Medicine, vol. 63, pp. 479492, 2012. [4] L. Ponemon Institute, Americans opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj, 2010. [5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. vanBeijnum, and P. D. Stefanis, End- user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust, in PervasiveHealth, 2011, pp. 478484. [6] M. Delgado, The evolution of health care it: Are current u.s. privacy policies ready for the clouds? in SERVICES, 2011, pp. 371378. [7] N. Singer, When 2+ 2 equals a privacy question, New York Times, 2009. [8] E. B. Fernandez, Security in data intensive computing systems, in Handbook of Data Intensive Computing, 2011, pp. 447466. [9] A. Narayanan and V. Shmatikov, Myths and fallacies of personally identifiable information, Communications of the ACM, vol. 53, no. 6 , pp. 2426, 2010. [10] P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, Countering gattaca: efficient and secure testing of fully-sequenced human genomes, in ACM Conference on Computer and Communications Security, 2011, pp. 691702.
  • 2. APPENDIX 1) Indistinguishability of Encryptions under Chosen Ciphertext Attack: The ID-IE-CCA security for the proposed key private proxy re-encryption scheme is defined by the following chosen-cipher text attack game played between a challenger C and an adversary A. Note that we have two types of cipher texts in the proposed key private re-encryption scheme, and hence, there are two situations. 2) Indistinguishability of Keys under Chosen-Ciphertext Attack: The ID-IK-CCA security for our proposed key private re-encryption scheme is defined by the same method as for the ID-IE-CCA security. Note that we have two types of challenges. One is for an original ciphertext, the other is for a re-encryption key. The former is for the anonymity of the original ciphertext, and the latter is for the anonymity of the re-encryption key.