Depiction of Body Area Network in Cloud Environment

Size: px
Start display at page:

Download "Depiction of Body Area Network in Cloud Environment"

Transcription

1 I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: ISSN: x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5 1PG Scholar of Computer Science and Engineering, P.S.R. Engineering College, Tamil Nadu, India 2PG Scholar of Computer Science and Engineering, P.S.R.Rengasamy College of Engineering, Tamil Nadu, India 3Faculty of Computer Science and Engineering, P.S.R.Rengasamy College of Engineering, Tamil Nadu, India 4Faculty of Information Technology, Sri Vidhya College of Engineering and Technology, Tamil Nadu, India 5Faculty of Computer Science and Engineering, Sri Vidhya College of Engineering and Technology, Tamil Nadu, India - sankardayal.mail@gmail.com, grahalakshmibe@gmail.com, vidhyarajme@gmail.com, sankariram90@gmail.com ABSTRACT Wireless Body Area network along with Cloud Computing will provide a considerable improvement in medical applications and also in rear future will be a massive approach for other applications too. In this paper, we are discussing about the issues faced by BAN and combination of BAN with Cloud Computing. There are several advantages of combining these two approaches such as security, cost, and storage, availability of data and ease of use. It also covers the detailed overview about the characteristics and components of the WAN with Cloud computing. Keywords- Autonomous Body Area Network (ABN), Actuators, Body Area Network, Cloud Computing, Managed Body Area Network (MBN), Wireless Sensor. 1. INTRODUCTION Wireless Body Area Network (WBAN) which is also referred as Body Sensor Network (BSN), which came into existence during 2006 by the launch of the book Body Sensor Networks written by Professor Guang- Zhong. BAN is an emerging approach not only for medical field but also for other fields like Military, Security, Gaming and more. Due to its emerging trend and numerous advantages in various fields BAN which can be used in Cloud environment, to increase its efficiency. Cloud Computing is also an blowing technology in this twenty first century because of its user friendly access and pay per access policy and usage base has laid not only the IT peoples but also other organizations such as Government, Education, P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 55

2 Banking and Healthcare are also shifting their attention towards Cloud Computing. To make a combination of these two emerging technology into a single application will be much useful for the users of both the areas. There are several effects to be considered while combining BAN and Cloud Computing. The main goal of this paper will make an understanding about BAN and Cloud Computing and also their combination. There are several factors which are considered to be an issue in BAN are cost, memory storage, interoperability, security, energy consumption. While combining BAN and Cloud we can reduce the cost and increase the memory storage and also possible to increase the throughput. 2. BACKGROUND OUTLINE 2.1 Body Area Networks an outline BAN is a combination of Biomedical Engineering and Sensor networks. BAN is formally defined by IEEE as, a communication standard optimized for low power devices and operation on, in or around the human body. BAN can make benefits to human by studying the body condition using sensors and translate the observed details to the user. Depending upon the observed details the person (Physician) can take further steps to improve the efficiency and utilization of the observed human s body. BAN is an upcoming technology due to the increased population of aged peoples and the cost for medical expenses has increased rapidly. Medical field uses the sensors for getting the information about the patient by placing the sensors in tissues and skin to observe the condition of the patient. After observing the health condition, Doctors can monitor and provide further treatment to the patient. 2.2 Difference between MBNS and ABNS Managed Body Area Network (MBAN) which uses a Third party for taking assessment based upon the collected information from the sensors. Autonomous Body Area Network (ABAN) is an intelligent sensor which contains of actuators in addition to sensor, for making assessment intelligently and individually. Fig. 1. WAN in Cloud environment P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 56

3 Fig. 2. Flow of secure storage 2.3 Cloud computing an outline Cloud computing which uses internet for making computing technologies. Cloud computing provides user friendly environment for IT and other organizations (Government, education) for utilizing the resources and sharing the resources on demand basics. The main requirement of cloud computing is internet, without using internet we can t access in Cloud environment. The main purpose for moving into Cloud computing is that storage is provided as one of the Infra-structure as a service. First Cloud Company was started by Ellison in 1998 called as NetSuite according to Ellison. 2.4 Retrieval of data from Cloud When the patient or his relatives want to download the data, they have to send a request to CSP. When the verification process gets success then the requested data will be sent to the user for making further analysis or processing. When the Physician wants the patient s information, it is sent as a request to CSP. After the successful verification of the user, the whole data is showed to the physician for his analysis. From that whole data set the Physician may download the necessary details. After downloading the data, the user has to decrypt the data for further analysis or treatment. 3. NEW CONSTRUCTION OF BAN IN CLOUD ENVIRONMENT The new construction for BAN is shown in Fig. 1. This construction mainly focuses on medical application but it can also be applied in various other areas also. Here the patient who maybe in hospital, home, driving, or in other areas will be connected to wireless sensors for monitoring the health condition of the body. This P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 57

4 wearable sensor may be used for measuring ECG, EEG and blood pressure level. To identify the location of the patient GPS is used. After measuring all the details by the sensor, the output will be transferred to actuator. The actuator will make immediate decision intelligently and will send the decision to local Personal Digital Assistant (PDA) using WiFi. The PDA will check transmit the data to Cloud server via internet. Here the Cloud service Provider (CSP) will check the authentication of the sender and will store the data into server, if the authentication is proved to be correct. The major issue in this construction is while using a semi-trusted server security is weak. To overcome this security problem, we have to encrypt the data before storing it in cloud. There are various encryption algorithms such as DES, Triple DES and AES or other algorithms too. Security is a challenging process in Cloud environment these days. 3.1 Registration to Cloud server Users initially have to register to Cloud due to processing of utilization and privacy preserving of CSPs and users. The users are persons such as Patient, Physician, relatives to the patient. They have to provide data s such as their personal information and access rights and has to make a contract between CSP and user for processing the Cloud on use per demand basis. Fig. 3. Download and Decryption of secured data 3.2 Transmission of data in two modes First data transmission to Cloud, during the patient s health condition is normal then data will be transferred directly to Cloud after encryption. This encryption process should be done in PDA if the patient is in home P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 58

5 or in public place, then the data should be encrypted using his laptop or PDA and if he is in hospital then we may use laptop or desktop in hospital. Then with the help of internet, we may transfer the encrypted data to Cloud. Second transmission will be transferred to Physician (Doctor) before storing it in Cloud due to abnormal position of the patient. When the patient is in critical position the data will be sent to the respected physician, Hospital and to the relatives of the patient for providing immediate assessment. Then the same data is sent to Cloud after encryption. 3.3 Components in BAN There are three major components by all BANs and they are, 1. Sensor nodes 2. Actuator nodes 3. Personal device Sensor node Sensor nodes are used for gathering the physical information of the user and process the data. These sensors are attached to the patient s skin or to their dress or to the tissue. The number of sensor nodes are depends upon the application. The components included in sensor nodes are Actuator node Actuator nodes will receive the data from sensors and will act (Decide) according to the sensor s information and user s information. The components include in actuators are Personal device Sometimes these devices are referred as Body Control Unit (BDU), will collect the information from sensors and actuator and inform the retrieved information to user via an external gateway by a display or an LED. All the components contain the following sub-components for processing and access. a. Power unit b. Memory and Processor c. Transceiver It also uses some software for making interface with hardware component and to the application software. 4. CHALLENGES IN THIS NEW APPROACH 1. Security 2. Interoperability 3. Power consumption 4. Routing P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 59

6 5. SOLUTIONS AND DISCUSSION OF THE CHALLENGES 5.1 Power overwhelming For power consuming we may use the following methods: ZigBee Bluetooth WiFi Ultra Wide Band (UWB) Among all the above method ZigBee will consume low power but it is limited to 250Kbps. Bluetooth and WiFi is also used but for short range of coverage. Most of the case UWB and WiFi are used. 5.2 Security Security has to be maintained in the following aspects Authentication Integrity Confidentiality Communication link Protect data 1. An authentication has to be maintained for identifying the BAN patient, physician and other user. 2. Integrity between sensors and storage area. 3. Confidentiality of data and user information has to be maintained. 4. Communication link must be secure between the sensors and to other devices. 5. Protection of data in all the aspects such as during transmission and storing. For all the above security constraints, an effective cryptographic algorithm has to be used. Some examples of such algorithms are DES (Data Encryption Standard), Triple DES, and AES (Advanced Encryption Standard), IDE (Identity Based Encryption). P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 60

7 5.3 Interoperability Interoperability has to be maintained in the following constraints Memory Power Storage Plug-and-play Ease of use Interaction between devices. For the entire above problem Cloud Computing provides solution. 5.4 Routing Routing of data is a major problem in network but apart from that we have to concentrate in tissue heating of the patient. The solution for above routing includes, LEACH (Low Energy Adaptive Clustering Hierarchy) Cluster- based routing Cross-layer routing 5.5 Protocol Some protocols used are LBT (Listen before-talk) Drawback Not good for collision Not energy efficient Multi channel Management Advantage Channel is reserved. Aggregation of channels into single channel will be useful to reduce traffic. Other protocols used by MAC layer are TDMA but that has its own disadvantages. 6 APPLICATIONS OF THE NEW APPROACH Medical health care Wireless Audio Military P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 61

8 Gaming Sports monitoring Home area networks 7 CONCLUSION WAN and Cloud computing both are emerging technology and this paper which provides an overview about this combination. Yet there are few areas which have to be concentrated in this combination for improving the QoS of this combination. The major concentrations are to be made in security, power consumption, routing. The main advantage of this combination is low cost, high throughput and user friendly access, unlimited memory access using cloud. This article will be an inspiration for the researchers to make concentration in this area and will provide an efficient model to the user in rear future. REFERENCES [1] M. Chen et al., Body Area Networks: A Survey, ACM/Springer Mobile Networks and Applications, vol. 16, no. 2, 2011, pp [2] Jiafu Wan, Caifeng Zou, Chin-Feng Lai, Ming Zhou, Xiaofei Wang, Cloud Enabled Wireless Body Area Networks for Pervasive Healthcare, IEEE Networks September/October [3] Sangwon Lee, Murali Annavaram, Wireless Body Area Networks: Where Does Energy Go?, IISWC 2012: [4] M. Li, W. Lou, and K. Ren, Data Security and Privacy in Wireless Body Area Networks, IEEE Wireless Communication, vol. 17, no. 1, 2010, pp [5] Suraj Pandey, William Voorsluys, Shang Niv, Ahsan Khandoker, Rajkumar Buyya, An Automatic Cloud Environment for Hosting ECG Data Analysis Services, Future Generation Computer System, 15 May 2011 pp [6] Jui-chien Hsieh, Meng-Wei Hsu, A cloud computing based 12-lead ECG Telemedicine service Hsieh and Hsu BMC Medical Informatics and Decision Making, 2012, 12:77. [7] J Xing, Y Zhu, A survey on body area network, in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 09),Beijing,China, (2009). [8] M.S. Balamurugan, Cloud Care: A Remote Health Monitoring System, IWBBIO 2013 Proceedings, Granada March, [9] Hassan Ghasemzadeh, Vitali Loseu, Eric Guenterberg, Roozbeh Jafari, Sport Training Using Body Sensor Networks: A Statistical pproach to Measure Wrist Rotation for Golf Swing, BodyNets 09 April 1-3, 2009, Los Angeles, CA, USA. P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan Page 62

1 0890-8044/13/$25.00 2013 IEEE

1 0890-8044/13/$25.00 2013 IEEE Cloud-Enabled Wireless Body Area Networks for Pervasive Healthcare Jiafu Wan and Caifeng Zou, South China University of Technology Sana Ullah, King Saud University Chin-Feng Lai, National Chung Cheng University

More information

Role of Cloud Computing in the Provision of Healthcare

Role of Cloud Computing in the Provision of Healthcare Role of Cloud Computing in the Provision of Healthcare Ms. Anusha Bamini, Professor Sharmini Enoch July 2011 Volume 1 Issue 1 Publications The World Journal of Medical Education and Research (WJMER) is

More information

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan

More information

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile

Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile S.Saravanan Research Scholar, Department of CSE, Rajiv Gandhi college of

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India

More information

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, DECEMBER 214, VOLUME: 5, ISSUE: 4 SPY AGENT BASED SECURE DATA AGGREGATION IN WSN T. Lathies Bhasker 1 and G. Arul Jagan 2 1 Department

More information

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network

Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network Chetan D. Kurjekar 1 and Nikhil M. Palekar 2 Computer Science and Engineering, Jawaharlal Darda College of Engineering and Technology,

More information

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System , pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133

More information

Remote Patient Monitoring- An Implementation in ICU Ward

Remote Patient Monitoring- An Implementation in ICU Ward 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Remote Patient Monitoring- An Implementation in ICU Ward Arun E 1+, Marimuthu V 2,

More information

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,

More information

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work

Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Bluetooth Health Device Profile and the IEEE 11073 Medical Device Frame Work Rudi Latuske, ARS Software GmbH 1. Bluetooth in Medical Applications Bluetooth, as a short range wireless technology, is very

More information

Securing MANET Using Diffie Hellman Digital Signature Scheme

Securing MANET Using Diffie Hellman Digital Signature Scheme Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2

More information

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Security Infrastructure for Trusted Offloading in Mobile Cloud Computing Professor Kai Hwang University of Southern California Presentation at Huawei Forum, Santa Clara, Nov. 8, 2014 Mobile Cloud Security

More information

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC Ferozepur, Punjab, India Email: 1 soniaarora141@gmail.com, 2 pawanluthra81@gmail.com

More information

Fig. 1 BAN Architecture III. ATMEL BOARD

Fig. 1 BAN Architecture III. ATMEL BOARD Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org SENSOR NETWORK FOR PATIENT MONITORING

International Journal of Research in Advent Technology Available Online at: http://www.ijrat.org SENSOR NETWORK FOR PATIENT MONITORING SENSOR NETWORK FOR PATIENT MONITORING Dipali D.Phadat 1, Ashish T.Bhole 2 dipali.phadat028@gmail.com ashishbhole@hotmail.com Computer Science & Engineering Department S.S.B.T.College of Engineering & Technology,

More information

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Review of the Air Force Academy No 2 (24) 2013 BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS Marian ALEXANDRU, Vlad URSU Transilvania University of Brasov, Romania Abstract: A study of how to implement

More information

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Ranked Keyword Search Using RSE over Outsourced Cloud Data Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama

More information

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks , pp. 205-216 http://dx.doi.org/10.14257/ijseia.2015.9.9.18 Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks Rae Hyun Kim and Jeong Gon Kim 1 Department of Electronic

More information

Australian Journal of Basic and Applied Sciences. EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system

Australian Journal of Basic and Applied Sciences. EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system ISSN:1991-8178 Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system 1 Vidhya. A, 2 Dr.

More information

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

Secrecy Maintaining Public Inspecting For Secure Cloud Storage Secrecy Maintaining Public Inspecting For Secure Cloud Storage K.Sangamithra 1, S.Tamilselvan 2 M.E, M.P.Nachimuthu.M.Jaganathan Engineering College, Tamilnadu, India 1 Asst. Professor, M.P.Nachimuthu.M.Jaganathan

More information

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks Gengfa Fang and Eryk Dutkiewicz Department of Physics and Engineering Macquarie University, Sydney, NSW, Australia Tel:

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption. Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune ghatkar.abhaya@gmail.com, jadhavreena70@yahoo.com, renjug03@gmail.com,

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

Study on Differential Protection of Transmission Line Using Wireless Communication

Study on Differential Protection of Transmission Line Using Wireless Communication Study on Differential Protection of Transmission Line Using Wireless Communication George John.P 1, Agna Prince 2, Akhila.K.K 3, Guy Marcel 4, Harikrishnan.P 5 Professor, Dept. of EEE, MA Engineering College,

More information

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

Cloud Database Storage Model by Using Key-as-a-Service (KaaS) www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah

More information

WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING

WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING S. Janani Devi 1, G. S. Sreetha Devi 2, G. M. Tamil Selvan 3 SPG Scholar Bannari Amman Institute of Technology, Alathukombai,

More information

Efficient Data Transmission For Wireless Sensor Networks

Efficient Data Transmission For Wireless Sensor Networks Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant

More information

A Road Map on Security Deliverables for Mobile Cloud Application

A Road Map on Security Deliverables for Mobile Cloud Application A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,

More information

Computer/IT Project LIST. Contact: 9860171201 8796142757

Computer/IT Project LIST. Contact: 9860171201 8796142757 Computer/IT Project LIST Contact: 9860171201 8796142757 1. Detecting E Banking Phishing Websites Using Associative Classification 2. Vehicle Tracking Using Driver Mobile Gps Tracking 3. Sentiment Analysis

More information

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol Monu Rani 1, Kiran Gupta 2, Arvind Sharma 3 1 M.Tech (Student), 2 Assistant Professor, 3 Assistant Professor Department

More information

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile

More information

BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS

BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS Samira Mesmoudi and Mohammed Feham STIC Laboratory, University of Tlemcen, Algeria {s_mesmoudi, m_feham}@mail.univ-tlemcen.dz

More information

Single Sign-On Secure Authentication Password Mechanism

Single Sign-On Secure Authentication Password Mechanism Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,

More information

Special Properties of Ad-hoc Wireless Network and Security Models

Special Properties of Ad-hoc Wireless Network and Security Models Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of

More information

Wednesday, January 15, 14. Secure and Private Service Discovery over Low Energy Bluetooth

Wednesday, January 15, 14. Secure and Private Service Discovery over Low Energy Bluetooth Secure and Private Service Discovery over Low Energy Bluetooth Square Register Hardware credit card reader Developed for businesses Android and ios app Square Wallet Android and ios app Works with Square

More information

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions

More information

Dynamic Query Updation for User Authentication in cloud Environment

Dynamic Query Updation for User Authentication in cloud Environment Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,

More information

Improving data integrity on cloud storage services

Improving data integrity on cloud storage services International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * hanacek@fit.vutbr.cz Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Current and Future Trends in Medical Electronics

Current and Future Trends in Medical Electronics Current and Future Trends in Medical Electronics By Steven Dean, Medical Marketing Director, Texas Instruments www.arrownac.com 800.833.3557 Current and Future Trends in Medical Electronics By Steven Dean,

More information

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. Saranya17113@gmail.com Dr.S.Rajalakshmi, Associate Professor/CSE,

More information

Privacy Preserving Distributed Cloud Storage

Privacy Preserving Distributed Cloud Storage Privacy Preserving Distributed Cloud Storage Praveenkumar Khethavath 1 *, Doyel Pal 2 1 Department of Mathematics, Engineering and Computer Science, LaGuardia Community College, Long Island City, NY 11101.

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION Prof. M. Ben Swarup Professor, Department of CSE Vignan's Institute of Information Technology Visakhapatnam-49, India Chukkala

More information

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage P. Selvigrija, Assistant Professor, Department of Computer Science & Engineering, Christ College

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,

More information

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

An Experimental Study on Wireless Security Protocols over Mobile IP Networks An Experimental Study on Wireless Security Protocols over Mobile IP Networks Avesh K. Agarwal Department of Computer Science Email: akagarwa@unity.ncsu.edu Jorinjit S. Gill Department of Electrical and

More information

Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network

Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network Abdalla Gheryani, And Mladen Veinović Abstract This paper studies and measures the outcome of different security

More information

Public Auditing for Shared Data in the Cloud by Using AES

Public Auditing for Shared Data in the Cloud by Using AES Public Auditing for Shared Data in the Cloud by Using AES 1 Syagamreddy Subbareddy, 2 P.Tejaswi, 3 D.Krishna 1 M.Tech(CSE) Pursuing, 2 Associate Professor, 3 Associate Professor,HOD, 1,2,3 Dept. of Computer

More information

Advances in wireless rh measurement using Mesh topology

Advances in wireless rh measurement using Mesh topology Advances in wireless rh measurement using Mesh topology PTC Remote Management & Service Development and realization of made to measure wireless sensor and control solutions Michell Co-marked leader in

More information

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah

More information

ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES

ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES ABSTRACT K. Krishnakanth 1 and P. Kavipriya 2 1 M.E Embedded Systems, Sathyabama University, Chennai, India. krishnakoneru99@gmail.com

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

A Wireless Medical Monitoring Over a Heterogeneous Sensor Network

A Wireless Medical Monitoring Over a Heterogeneous Sensor Network A Wireless Medical Monitoring Over a Heterogeneous Sensor Network Mehmet R. Yuce, Peng Choong Ng, Chin K. Lee, Jamil Y. Khan, and Wentai Liu Abstract This paper presents a heterogeneous sensor network

More information

Analysis on Virtualization Technologies in Cloud

Analysis on Virtualization Technologies in Cloud Analysis on Virtualization Technologies in Cloud 1 V RaviTeja Kanakala, V.Krishna Reddy, K.Thirupathi Rao 1 Research Scholar, Department of CSE, KL University, Vaddeswaram, India I. Abstract Virtualization

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Monitoring Performances of Quality of Service in Cloud with System of Systems

Monitoring Performances of Quality of Service in Cloud with System of Systems Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 8 January 2015 ISSN (online): 2349-6010 A Survey on Scalable Data Security and Load Balancing in Multi Cloud

More information

Wireless Encryption Protection

Wireless Encryption Protection Wireless Encryption Protection We re going to jump around a little here and go to something that I really find interesting, how do you secure yourself when you connect to a router. Now first and foremost

More information

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks Mohammed A. Abdala & Alaa Mohammed Salih Department of Networks, College of Information Engineering, University

More information

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES SWATHI NANDURI * ZAHOOR-UL-HUQ * Master of Technology, Associate Professor, G. Pulla Reddy Engineering College, G. Pulla Reddy Engineering

More information

Content of smart wireless sensor network security and its network security policy

Content of smart wireless sensor network security and its network security policy Abstract Content of smart wireless sensor network security and its network security policy Xiehua Yu Minnan Science and Technology Institute, Fujian Normal University, Fujian, 362332, China eceived 1 October

More information

The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol

The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol School of Economics and Management, Hebei University of Science and Technology, Shijiazhuang

More information

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin. www.itmr.ac.in 01 0110 0001 01101 WHITE PAPER ON Data Encryption Prepared by Mohammed Samiuddin www.itmr.ac.in Contents INTRODUCTION... 2 NEED FOR DATA ENCRYPTION... 3 DUE CARE... 3 REPUTATIONAL RISK... 3 REGULATORY

More information

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

How To Manage Log On A Cloud Server On A Microsoft Cloud Server (For A Free) On A Pcode (For Free) With A Microode) On An Ipad (For An Ipa) On Pcode) (For P

How To Manage Log On A Cloud Server On A Microsoft Cloud Server (For A Free) On A Pcode (For Free) With A Microode) On An Ipad (For An Ipa) On Pcode) (For P MANAGING ACCOUNTABILITY FOR APPLICATION SHARING IN THE CLOUD USING PUSH-PULL KEY MATCHING ALGORITHM Satpalsing D. Rajput 1, Ashish T. Bhole 2 P.G. Student, Department of Computer Engineering, SSBT s COET

More information

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION Mr. T.CHANDRA SEKHAR RAO PROFESSOR and HEAD T.SREEDHAR M.TECH DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING LOYOLA INSTITUTE

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,

More information

Wireless Sensor Networks Chapter 14: Security in WSNs

Wireless Sensor Networks Chapter 14: Security in WSNs Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks Kiruthiga S PG student, Coimbatore Institute of Engineering and Technology Anna University, Chennai,

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 3, Issue.

More information

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or

More information

An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet

An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and

More information

Mobile Medical Records. Project Proposal

Mobile Medical Records. Project Proposal Mobile Medical Records Project Proposal Paul Brittan Shelley-Ann Petzer Table of Contents 1. Project Description... 2 2. Problem Statement... 2 2.1 Research Aims... 2 2.1.1 The performance comparisons

More information

LOAD BALANCING AS A STRATEGY LEARNING TASK

LOAD BALANCING AS A STRATEGY LEARNING TASK LOAD BALANCING AS A STRATEGY LEARNING TASK 1 K.KUNGUMARAJ, 2 T.RAVICHANDRAN 1 Research Scholar, Karpagam University, Coimbatore 21. 2 Principal, Hindusthan Institute of Technology, Coimbatore 32. ABSTRACT

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

This idea could limit unnecessary visits and help developing countries to provide healthcare remotely as well.

This idea could limit unnecessary visits and help developing countries to provide healthcare remotely as well. I. The Healthcare Problem a. Explanation of why this solution is needed. b. How we can solve the problem. c. The components needed to solve the problem. II. Bluetooth Enabled Medical Device Architecture

More information

SPINS: Security Protocols for Sensor Networks

SPINS: Security Protocols for Sensor Networks SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Introduction Cloud computing as a new paradigm of information technology that offers tremendous advantages in economic aspects such as reduced time to market, flexible computing

More information

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing Renuka Goyal, Navjot Sidhu Centre for Computer Science and Technology, Central University of Punjab Bathinda,

More information

A Study on Secure Electronic Medical DB System in Hospital Environment

A Study on Secure Electronic Medical DB System in Hospital Environment A Study on Secure Electronic Medical DB System in Hospital Environment Yvette E. Gelogo 1 and Sungwon Park 2 * 1 Catholic University of Daegu, Daegu, Korea 2 Department of Nursing, Hannam University, 133

More information

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny

More information

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering

More information