A Secure Information Forwarder for Mobile Healthcare System Using Sensors
|
|
|
- Phoebe Cobb
- 10 years ago
- Views:
Transcription
1 A Secure Information Forwarder for Mobile Healthcare System Using Sensors A.Santhi, V.Senthilkumar Abstract A secure information forwarder for mobile healthcare system that combines mobile with sensor network to monitor the health condition of patients.the mobile Healthcare system can benefit medical users by providing high-quality healthcare monitoring, the challenges facing in m-healthcare system, especially during a medical emergency. It provides a wide range of effective, comprehensive, and convenient healthcare services. The sensor measures the health parameters dynamically, and is connected, according to the concept of Bluetooth and 3G network, to the sensor node for wireless transmission through the internet. A visualization module of the recorded biomedical data on Android mobile devices used by patients and doctors at the end of the networks in real-time. Our approach for a mobile healthcare solution is managed to process the large amount of biomedical data combining 3G network and mobile technology for daily lifestyle to users appropriately. I I. INTRODUCTION nformation and communication technologies are transforming our social interactions, lifestyles, and work places. One of the most promising applications of information technology is healthcare and wellness management. Healthcare is moving from an approach based on the reactive responses to acute conditions to a proactive approach characterized by early detection, prevention, and long term management of health conditions. The current trend places an emphasis on the monitoring of health conditions and the management of wellness as significant contributors to individual healthcare and wellbeing. This is particularly important in developed countries with a significant aging population, where information technology can significantly improve the management of chronic conditions and thereby improve quality of life. In particular, the continuous or even occasional recording of biomedical data is critical for the advancement of temperature and pressure by using sensors.each mobile medical user s personal health information (PHI) such as heart beat, blood sugar level, blood pressure and temperature and others, can be first collected by BSN, and then aggregated by smartphone via bluetooth. Finally, they are further transmitted to the remote healthcare center via 3G networks. Based on these collected PHI data, medical professionals at healthcare center can continuously monitor medical users health conditions and as well quickly react to users life-threatening situations and save their lives by dispatching ambulance and medical personnel to an emergency location in a timely fashion. A.Santhi andv.senthilkumar are with Department of Electronics and Communication Engineering, Oxford Engineering College, Pirattiyur, Trichy ( [email protected]) II. LITERATURE REVIEW M. Conti, S. Giordano, M. May, and A. Passarella [2010] Personal computing devices, such as smart-phones and PDAs, are commonplace, bundle several wireless network interfaces, can support compute intensive tasks, and are equipped with powerful means to produce multimedia content. Thus, they provide the resources for what we envision as a human pervasive network: a network formed by user devices, suitable to convey to users rich multimedia content and services according to their interests and needs. Similar to opportunistic networks, where the communication is built on connectivity opportunities, we envisage a network above these resources that joins together features of traditional pervasive networks and opportunistic networks fostering a new computing paradigm: opportunistic computing. In this article we discuss the evolution from opportunistic networking to opportunistic computing; we survey key recent achievements in opportunistic networking, and describe the main concepts and challenges of opportunistic computing. Marco Li, W. Lou, and K. Ren [2010] proposed the wireless body area network has emerged as a new technology for e- healthcare that allows the data of a patient's vital body parameters and movements to be collected by small wearable or implantable sensors and communicated using short-range wireless communication techniques. WBAN has shown great potential in improving healthcare quality, and thus has found a wide range of applications from ubiquitous health monitoring and computer assisted rehabilitation to emergency medical response systems. The security and privacy protection of the data collected from a WBAN, either while stored inside the WBAN or during their transmission outside of the WBAN, is a major unsolved concern, with challenges coming from stringent resource constraints of WBAN devices, and the high demand for both security/privacy and practicality/usability. In this article we look into two important data security issues: secure and dependable distributed data storage, and finegrained distributed data access control for sensitive and private patient medical data. We discuss various practical issues that need to be taken into account while fulfilling the security and privacy requirements. J. Sun and Y. Fang [2010] ProposedCross-organization or cross-domain cooperation takes place from time to time in Electronic Health Record (EHR) system for necessary and high-quality patient treatment. Cautious design of delegation mechanism must be in place as a building block of crossdomain cooperation, since the cooperation inevitably involves exchanging and sharing relevant patient data that are 12
2 considered highly private and confidential. The delegation mechanism grants permission to and restricts access rights of a cooperating partner. Patients are unwilling to accept the EHR system unless their health data are guaranteed proper use and disclosure, which cannot be easily achieved without crossdomain authentication and fine-grained access control. In addition, revocation of the delegated rights should be possible at any time during the cooperation. In this paper, we propose a secure EHR system, based on cryptographic constructions, to enable secure sharing of sensitive patient data during cooperation and preserve patient data privacy. A. Passarella, M. Conti, E. Borgia, and M. Kumar [2010] proposed that we present an analytical model that depicts the service invocation process between seekers and providers. Specifically, we derive the optimal number of replicas to be spawned on encountered nodes, in order to minimize the execution time and optimize the computational and bandwidth resources used. Performance results show that a policy operating in the optimal configuration largely outperforms policies that do not consider resource constraints.making new connections according to personal preferences is a crucial service in mobile social networking, where the initiating user can find matching users within physical proximity. Usually all the users directly publish their complete profiles for others to search. However, in many applications, the users personal profiles may contain sensitive information that they do not want to make public A. Toninelli, R. Montanari, and A. Corradi [2009] Advances in wireless networks, sensors, and portable devices offer unique chances to deliver novel anytime anywhere medical services and information, thus enabling a wide range of healthcare applications, from mobile telemedicine to remote patient monitoring, from location-based medical services to emergency response. Mobile e-health has great potential to extend enterprise hospital services beyond traditional boundaries, but faces many organizational and technological challenges. In pervasive healthcare environments, characterized by user/service mobility, device heterogeneity, and wide deployment scale, a crucial issue is to discover available healthcare services taking into account the dynamic operational and environmental context of patient-healthcare operator interactions. In particular, novel discovery solutions should support interoperability in healthcare service descriptions and ensure security during the discovery process by making services discoverable by authorized users only. A. Existing System III. SYSTEM ANALYSIS In the Existing system, with the pervasiveness of smart phones and the advance of wireless body sensor networks(bsn), mobile Healthcare, which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. Block Diagram Each mobile medical user s PHI such as blood pressure and temperature, can be first collected by using sensors. Sensor data aggregated by smartphone via Bluetooth.Further transmitted to healthcare center via network.healthcare center maintaining the data base.if up normal condition, the healthcare center by dispatching the ambulance to the medical user s current location. Fig 1 pervasive health monitoring in mobile healthcare system The mobile Healthcare system can benefit medical users by providing high-quality pervasive healthcare monitoring, the flourish of m-healthcare system still hinges upon how we fully understand and manage the challenges facing in m- Healthcare system, especially during a medical emergency. To clearly illustrate the challenges in m-healthcare emergency. In general, a medical user s PHI should be reported to the healthcare center every 5 minutes for normal remote monitoring. However, when he has an emergency medical condition, for example, heart attack, his BSN becomes busy reading a variety of medical measures, such as heart rate, blood pressure, and as a result, a large amount of PHI data will be generated in a very short period of time, and they further should be reported every 10 seconds for high-intensive monitoring before ambulance and medical personnel s arrival. However, since smartphone is not only used for healthcare monitoring, but also for other applications, i.e., phoning with friends, the smartphone s energy could be insufficient when an emergency takes place.although this kind of unexpected event may happen with very low probability, for a medical emergency, when we take into 10,000 emergency cases into 13
3 consideration, the average event number will reach 50, which is not negligible and explicitly indicates the reliability of m- Healthcare system is challenging in emergency.the personal information and very sensitive to medical users, once the PHI data are processed in opportunistic computing, the privacy of PHI would be disclosed. Therefore, how to balance the high reliability of PHI process while minimizing the PHI privacy disclosure during the opportunistic computing becomes a challenging issue in m-healthcare emergency. B. Proposed System In the proposed system, a secure information forwarder for mobile healthcare system using sensors, to overcome this challenge. Each medical user in emergency can achieve the user-centric privacy access control to allow only those qualified helpers to participate in the opportunistic computing to balance the high-reliability of PHI process and minimizing PHI privacy disclosure in m-healthcare emergency. We introduce an efficient user-centric privacy access control, which is based on an attribute-based access control and a new privacy preserving scalar product computation (PPSPC) technique, and allows a medical user to decide who can participate in the opportunistic computing to assist in processing.we propose mobile healthcare system, which consists of three parts: system initialization, user-centric privacy access control for m-healthcare emergency, and analysis of opportunistic computing in m-healthcare emergency. B1. Body sensor network Fig 2 body sensor network The temperature and pressure sensor will be equipped directly in the medical user. The sensor data will transmit the user details for every time period that we have indicated. For example, each mobile medical user s personal health information such as blood pressure and temperature and other details will be captured by the medical users Smartphone. B2. Smartphone communication Transmit to Fig 3 smartphone communication For each sensor data transmitted from sensor will be aggregated by the Smartphone that, the medical users having with them using Bluetooth communication. This received medical information or symptom will be transmitted to healthcare center periodically with the help of 3G network. B3. Healthcare center Fig 4 Healthcare center A secure and privacy-preserving opportunistic computing framework for mobile Healthcare emergency. The resources available on other opportunistically contacted medical users smart-phones can be gathered together to deal with the computing intensive PHI process in emergency situation. Since the PHI will be disclosed during the process in opportunistic computing, to minimize the PHI privacy disclosure. To introduces a user centric two-phase privacy access control to only allow those medical users who have similar symptoms to participate in opportunistic computing. A. System Model I. MODELS AND DESIGN GOAL In our system model, we consider a trusted authority and a group of medical users. TA is a trustable and powerful entity located at healthcare center, which is mainly responsible for the management of the whole m-healthcare system, e.g., initializing the system, equipping proper body sensor nodes and key materials to medical users. Each medical user is equipped with personal BSN and smartphone which can periodically collect PHI and report them to the healthcare center for achieving better health care quality. Unlike in-bed patients at home or hospital, medical users are considered as mobile ones, i.e., walking outside. BSN and smartphone are two key components for the success of m-healthcare system. To guarantee the high reliability of BSN and smartphone, the batteries of BSN and smartphone should be charged up every day so that the battery energy can support daily remote monitoring task in m-healthcare system. Since the BSN is dedicated for remote monitoring, after being charged every day, BSN can deal with not only the normal situations but also the emergency cases in m-healthcare. B. Security Model Mobile healthcare system can enhance the reliability for high-intensive PHI process and transmission in m-healthcare emergency. However, since PHI is very sensitive, a medical user, even in emergency, will not expect to disclose the PHI to all passing-by medical users. Instead, may only disclose PHI to those medical users who have some similar symptoms. In this case, the emergency situation can be handled by opportunistic computing with minimal privacy disclosure. 14
4 Specifically, the security model, essentially define two-phase privacy access control in opportunistic computing, which are required for achieving high-reliable PHI process and transmission in m-healthcare emergency. The access control only allows those medical users who have some similar symptoms to participate in the opportunistic computing. The reason is that those medical users, due to with the similar symptoms, are kind of skilled to process the same type PHI. The AVD manager provides a graphical user interface in which create and manage android virtual device, which are required by the android emulator. Launch the AVD manager in one of the following ways: In eclipse: select window android virtual device manager, or click the AVD manager icon in the toolbar. In android studio: select tools android AVD manager icon in the toolbar. C. Design Goal Fig 5 system model The design goal is to develop a secure mobile healthcare system to provide high reliability of PHI process and transmission while minimizing PHI privacy in mobile Healthcare emergency. To apply opportunistic computing in m-healthcare emergency to achieve high reliability of PHI process and transmission; and develop user-centric privacy access control to minimize the PHI privacy.the system using bilinear pairings, system initialization and user centric privacy access control. The residual power of smartphone may be insufficient for high-intensive PHI process and transmission. To deal with this embarrassing situation, opportunistic computing provides a promising solution in mobile Healthcare system. Each medical user accessing the smartphone. The sensor data information transmit to the smartphone via Bluetooth. The smartphone data transmit to the healthcare center server and view the patient s current location. A. Simulation Output V. RESULTS AND DISCUSSION Create app with android, eclipse software can run call service program. Google announced the availability of app inventor for eclipse, a web based visual development environment for novice programmers, based on MIT s open blocks java library and providing access to android devices GPS, accelerometer and orientation data, phone functions, text messaging, speech to text conversion, contact data, persistent storage and web services. Android virtual device manager Managing AVD Fig 6 simulation output An AVD is a device configuration for the android emulator that allows model different configurations of android powered devices. 15
5 Fig 7 (a) AVD Manager Fig 8 (b) Eclipse- AVD manager output VI. CONCLUSION AND FUTUREWORK Fig 7 (b) AVD Manager Fig 8 (a) Eclipse- AVD manager output A. Conclusion A secure information forwarder for mobile healthcare system using sensors, the Android mobile devices is successfully implemented. An information forwarder are designed and used for the measurement of temperature sensor and blood pressure sensor, while the Android mobile device is used to provide a mobile healthcare service by means of an Android application running on a Samsung device with wireless internet access.medical users can walk outside and receive the high-quality healthcare monitoring. By combining the 3G network and mobile communication techniques, significant network extension and the higher accessibility of mobile healthcare system has been achieved. We have proposed the ideas of establishing the 3G applications. With the use of comfortable wearable sensors in global areas, the proposed mobile healthcare system promises to improve the flexibility and scalability of healthcare applications. In addition, an Android mobile healthcare application can be deployed on mobile devices, such as smartphones, tablet PCs, and laptops to monitor biomedical temperature and pressure details in real time for healthcare services. With an exponentially increasing number of sensors and opportunities in the marketplace, this field of research has the potential to significantly change and improve the efficiency of the healthcare system. Based on our results, we conclude that, with the evolution of network integration and the management of embedded devices operating multimodal tasks a more precise and universal healthcare service scheme can be realized. B. Future Work An information forwarder for mobile healthcare system, which is connected to the sensors placed on the patient s body to collect health parameters, further transfers the sensor data to the Bluetooth device. The Bluetooth device transfers the data to the Android mobile application. The 3G network device provides reliable communication to transmit a patient s 16
6 biomedical data to a healthcare center server via the internet. This program performs an accurate recognition even if the patient is abnormal condition. Receiving all the transmitted data via 3G network communication in the server, the monitoring data stores in a database and plots all the measured biomedical data dynamically. Various algorithms are combined and implemented as mobile application software with the Java Android language to handle all the processes from the server. Using algorithm and filtered the abnormal biomedical data only transfers to a healthcare center server in an android application.the query processes handle the communication between the server and Android mobile device to display the patient current location and nearby hospital on a mobile screen in real time. All the studies and implementation will be done in the next phase and any advancement if possible, is expected to be incorporated with that. [16] A. Amirbekyan and V. Estivill-Castro, A New Efficient Privacy- Preserving Scalar Product Protocol, Proc. Sixth Australasian Conf. Data Mining and Analytics (AusDM 07), pp , [17] X. Lin, X. Sun, P. Ho, and X. Shen, GSIS: A Secure and Privacy Preserving Protocol for vehicular communications, IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp , Nov [18] J. Vaidya and C. Clifton, Privacy Preserving Association Rule Mining in Vertically Partitioned Data, Proc. Eighth ACM SIGKDD Int l Conf. Knowledge Discovery and Data Mining (KDD 02), pp , [19] W. Du and M. Atallah, Privacy-Preserving Cooperative Statistical Analysis, Proc. 17th Ann. Computer Security Applications Conf. (ACSAC 01), pp , [20] P. Paillier, Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, Proc. 17th Int l Conf. Theory and Application of Cryptographic Techniques (EUROCRYPT 99), pp , REFERENCES [1] R. Zhang, Y. Zhang, J. Sun, and G. Yan, Fine-Grained Private Matching for Proximity-Based Mobile Social Networking, Prof. of INFOCOM 12, pp. 1-9, [2] R. Lu, X. Lin, X. Liang, and X. Shen, A Secure Handshake Scheme with Symptoms Matching for m-healthcare Social Network, Mobile Networks and Applications special issue on wireless and personal comm., vol. 16, no. 6, pp , [3] W. Dong, V. Dave, L. Qiu, and Y. Zhang, Secure Friend Discovery in Mobile Social Networks, Prof. of INFOCOM 11, pp , [4] R. Lu, X. Lin, X. Liang, and X. Shen, Secure Handshake with Symptoms-Matching: The Essential to the Success of M healthcare Social Network, Proc. Fifth Int l Conf. Body Area Networks (BodyNets 10), [5] Y. Ren, R.W.N. Pazzi, and A. Boukerche, Monitoring Patients via a Secure and Mobile Healthcare System, IEEE Wireless Comm., vol. 17, no. 1, pp , Feb [6] A. Passarella, M. Conti, E. Borgia, and M. Kumar, Performance Evaluation of Service Execution in Opportunistic Computing, Proc. 13th ACM Int l Conf. Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWIM 10), pp , [7] M. Li, W. Lou, and K. Ren, Data Security and Privacy in Wireless Body Area Networks, IEEE Wireless Comm., vol. 17, no. 1, pp , Feb [8] J. Sun and Y. Fang, Cross-Domain Data Sharing in Distributed Electronic Health Record Systems, IEEE Trans. Parallel Distributed and Systems, vol. 21, no. 6, pp , June [9] M. Conti, S. Giordano, M. May, and A. Passarella, From Opportunistic Networks to Opportunistic Computing, IEEE Comm. Magazine, vol. 48, no. 9, pp , Sept [10] M. Conti and M. Kumar, Opportunities in Opportunistic Computing, IEEE Computer, vol. 43, no. 1, pp , Jan [11] A. Toninelli, R. Montanari, and A. Corradi, Enabling Secure Service Discovery in Mobile Healthcare Enterprise Networks, IEEE Wireless Comm., vol. 16, no. 3, pp , June [12] X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, Sage: A Strong Privacy-Preserving Scheme against Global Eavesdropping for Ehealth Systems, IEEE J. Selected Areas in Comm., vol. 27, no. 4, pp , May [13] M.R. Yuce, S.W.P. Ng, N.L. Myo, J.Y. Khan, and W. Liu, Wireless Body Sensor Network Using Medical Implant Band, J. Medical Systems, vol. 31, no. 6, pp , [14] M. Avvenuti, P. Corsini, P. Masci, and A. Vecchio, Opportunistic Computing for Wireless Sensor Networks, Proc. IEEE Int l Conf. Mobile Adhoc and Sensor Systems (MASS 07), pp. 1-6, [15] X. Lin, X. Sun, P. Ho, and X. Shen, GSIS: A Secure and Privacy Preserving Protocol for vehicular communications, IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp , Nov
A Secure Health Care Management System
A Secure Health Care Management System I Amisha.N, II Mr.Sathish Kumar I,II M.E,CS Dep, Anna University, Chennai, Tamil Nadu, India Abstract The m-healthcare system can benefit medical users by providing
Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION
A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE
WAITER: A Wearable Personal Healthcare and Emergency Aid System
Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping
Fig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Australian Journal of Basic and Applied Sciences. EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system
ISSN:1991-8178 Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system 1 Vidhya. A, 2 Dr.
Secure Data Sharing in Cloud Computing using Hybrid cloud
International Journal of Electronics and Computer Science Engineering 144 Available Online at www.ijecse.org ISSN: 2277-1956 Secure Data Sharing in Cloud Computing using Hybrid cloud Er. Inderdeep Singh
Depiction of Body Area Network in Cloud Environment
I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology November-2015 Volume 2, Issue-6
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology Email: [email protected] November-2015 Volume 2, Issue-6 www.ijermt.org Modeling Big Data Characteristics for Discovering
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
A Novel Pathway for Portability of Networks and Handing-on between Networks
A Novel Pathway for Portability of Networks and Handing-on between Networks D. S. Dayana #1, S. R. Surya #2 Department of Computer Applications, SRM University, Chennai, India 1 [email protected]
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES
A SECURE DECISION SUPPORT ESTIMATION USING GAUSSIAN BAYES CLASSIFICATION IN HEALTH CARE SERVICES K.M.Ruba Malini #1 and R.Lakshmi *2 # P.G.Scholar, Computer Science and Engineering, K. L. N College Of
Summer projects for Dept. of IT students in the summer 2015
Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Abstract
Study of Wireless Sensor Networks and their application for Personal Health Monitoring. Author 1 Mr. Parag Jawarkar, Author 2 Mrs. Shweta Lambat Abstract Our paper studied Wireless Sensor Network Application
Horizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: [email protected] Roadmap Introduction Challenges
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD
http:// PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD Mrs. Ramya.R 1, Mrs. Shruthi.G 2 1 M. Tech. Student, 2 Assistant Professor, Department of CSE, Don Bosco Institute of Technology, Bangalore,
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 63-68 AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
Privacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:
Remote Patient Monitoring- An Implementation in ICU Ward
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,
DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE DESIGN OF CLUSTER OF SIP SERVER BY LOAD BALANCER M.Vishwashanthi 1, S.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Anurag Group
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing
Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security
SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks
IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman)
MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS
MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS Marco Picone, Marco Muro, Vincenzo Micelli, Michele Amoretti, Francesco Zanichelli Distributed Systems
Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry
Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry July 2014 Introduction Trying to find your way around a large hospital or locating a high-value medical device such as
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
A Study for Home and Mobile U-Healthcare System
, pp. 255-260 http://dx.doi.org/10.14257/ijseia.2015.9.5.24 A Study for Home and Mobile U-Healthcare System Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology, Catholic University
International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Result and Analysis of Implemented Real Time Wireless Health Monitoring System Using Sensors
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 4, Ver. IV (Jul - Aug. 2014), PP 68-72 Result and Analysis of Implemented Real
ONLINE HEALTH MONITORING SYSTEM USING ZIGBEE
ONLINE HEALTH MONITORING SYSTEM USING ZIGBEE S.Josephine Selvarani ECE Department, Karunya University, Coimbatore. Abstract - An on-line health monitoring of physiological signals of humans such as temperature
A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud Arpitha.K 1,Aawini.T 2,Divya J. 3, Kalyani P 4, Prof. Sudhakar Avareddy 5 1,2,3,4 Department of CSE, BITM Bellary, Karnataka. 5 Department
A Design of Mobile Convergence Architecture for U-healthcare
, pp. 253-260 http://dx.doi.org/10.14257/ijseia.2015.9.1.22 A Design of Mobile Convergence Architecture for U-healthcare Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology Catholic
Monitoring Human Blood Pressure for U-Healthcare Using ISO/IEEE PHD Standard
Monitoring Human Blood Pressure for U-Healthcare Using ISO/IEEE PHD Standard Gi Hyun Bang, Do Kyeong Lee and Deok Jai Choi Electronics Computer Engineering, Chonnam National University 77 Yongbong-dong,
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
A Study on Service Oriented Network Virtualization convergence of Cloud Computing
A Study on Service Oriented Network Virtualization convergence of Cloud Computing 1 Kajjam Vinay Kumar, 2 SANTHOSH BODDUPALLI 1 Scholar(M.Tech),Department of Computer Science Engineering, Brilliant Institute
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
Healthcare Delivery. Transforming. through Mobility Solutions. A Solution White Paper - version 1.0
Transforming Healthcare Delivery through Mobility Solutions A Solution White Paper - version 1.0 HTC Global Services HTC Towers, No. 41, GST Road, Guindy, Chennai - 600 032, India. Ph: +91 44 4345 3500
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战
Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: [email protected]
Real Time Health Monitoring Using GPRS Technology
Real Time Health Monitoring Using GPRS Technology 1 Shubhangi M. Verulkar, 2 Maruti Limkar 1 EXTC department,k.c.college of Engg.,Nerul. Mumbai university. 2 Electronics department,terna college of engg,nerul,
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks
Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
A Study on the Security of RFID with Enhancing Privacy Protection
A Study on the Security of RFID with Enhancing Privacy Protection *Henry Ker-Chang Chang, *Li-Chih Yen and *Wen-Chi Huang *Professor and *Graduate Students Graduate Institute of Information Management
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Cellular Wireless technology: Creating a link between people and the healthcare community
Cellular Wireless technology: Creating a link between people and the healthcare community Introduction Demands on health-care systems worldwide have increased to the point where the delivery and cost of
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage
Efficient and Secure Dynamic Auditing Protocol for Integrity Verification In Cloud Storage Priyanga.R 1, Maheswari.B 2, Karthik.S 3 PG Scholar, Department of CSE, SNS College of technology, Coimbatore-35,
Seminar: Security Metrics in Cloud Computing (20-00-0577-se)
Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
Prachi T. Deokar, Dr. Manoj S. Nagmode Department of Electronics & Telecommunications, MITCOE, Pune, India 411005 Prachi.deokar19@gmail.
Cloud Server Based Home Automation System Using Android Phone Prachi T. Deokar, Dr. Manoj S. Nagmode Department of Electronics & Telecommunications, MITCOE, Pune, India 411005 [email protected]
ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES
ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ABSTRACT K. Krishnakanth 1 and P. Kavipriya 2 1 M.E Embedded Systems, Sathyabama University, Chennai, India. [email protected]
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT
ENERGY SAVING SYSTEM FOR ANDROID SMARTPHONE APPLICATION DEVELOPMENT Dipika K. Nimbokar 1, Ranjit M. Shende 2 1 B.E.,IT,J.D.I.E.T.,Yavatmal,Maharashtra,India,[email protected] 2 Assistant Prof,
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Project presentation ASSET - ADAPTIVE SECURITY FOR SMART INTERNET OF THINGS IN EHEALTH
Project presentation ASSET - ADAPTIVE SECURITY FOR SMART INTERNET OF THINGS IN EHEALTH Habtamu Abie, Dr. Scient., Principal Scientist ASSET Project Manager Norwegian Computing Center Tuesday 19 th of March
Internet of Things for Smart Crime Detection
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 749-754 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4685 Internet of Things for Smart Crime Detection Jeong-Yong Byun, Aziz
Using Cloud Computing Technology to Develop a Emergency. Care System on Android
Using Cloud Computing Technology to Develop a Emergency Care System on Android Steven K.C. Lo 1 Chi-Ming Chung 2 Chien-Yuan Hunag 3 1 Department of Information Management, Jinwen University of Science
IEEE 2015-2016 JAVA TITLES
ECWAY ECHNOLGIES IEEE 2015-2016 JAVA TITLES BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS Abstract: Introduction: Literature Survey: System Analysis: Existing System: Disadvantages: Proposed System: Advantages:
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
A Survey of Cloud Based Health Care System
A Survey of Cloud Based Health Care System Chandrani Ray Chowdhury Assistant Professor, Dept. of MCA, SDET-Brainware Group of Institution, Barasat, West Bengal, India ABSTRACT: Cloud communicating is an
PROTECTION OF SECURITY AND PRIVACY FOR MEDICAL DATA IN WIRELESS MEDICAL SENSOR NETWORKS
PROTECTION OF SECURITY AND PRIVACY FOR MEDICAL DATA IN WIRELESS MEDICAL SENSOR NETWORKS C.Gayathri 1, D.Sathya 2 1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore,
Cloud Development of Medical Systems By Oleg Kruk, Embedded Research Lab Leader, DataArt
Cloud Development of Medical Systems By Oleg Kruk, Embedded Research Lab Leader, DataArt Abstract Wireless electronic medical devices have made remote medicine a reality. Disease prevention, monitoring
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup. Emmanuel Agu
CS 528 Mobile and Ubiquitous Computing Lecture 2: Android Introduction and Setup Emmanuel Agu What is Android? Android is world s leading mobile operating system Google: Owns Android, maintains it, extends
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining
A UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Security and Privacy Issues in Wireless Sensor Networks for Healthcare
Security and Privacy Issues in Wireless Sensor Networks for Healthcare Vivek Agrawal Accepted in HealthyIoT 2014 Conference (Springer) Høgskolen i Gjøvik, NISLAB 1 Agenda Introduction Healthcare Monitoring
Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds
Survey on Efficient Information Retrieval for Ranked Query in Cost-Efficient Clouds Ms. Jyotsna T. Kumbhar 1 ME Student, Department of Computer Engineering, TSSM S, P.V.P.I.T., Bavdhan, Pune University,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!
SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact
Mobile Cloud Computing: A Comparison of Application Models
Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Mobile Cloud Computing: A Comparison of Application Models Nidhi
Iknaia Asset and Personnel Tracking Management System for the Construction Industry
Iknaia Asset and Personnel Tracking Management System for the Construction Industry Introduction The UK construction industry accounts for over 7%* of the UK s Gross Domestic Product and employs over two
Communication via M2M
Chapter 5: Green Wireless Communication via M2M Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Abstract 1. Abstract Based on the observation
Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung
Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline
Development of a new service using Wi-Fi Direct
COMPUTER NETWORKS COEN233 Development of a new service using Wi-Fi Direct HE SHOUCHUN MEENAKSHI HARIKUMAR NAGA TULASI SOUJANYA VADREVU 1 INDEX 6. Implementation--------------------------------------------------------------------------------------------3
