Depiction of Body Area Network in Cloud Environment



Similar documents
/13/$ IEEE

Role of Cloud Computing in the Provision of Healthcare

DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION

An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

Remote Patient Monitoring in Telemedicine using computer communication network through Bluetooth, Wi-Fi, Internet Android Mobile

Mobile and Sensor Systems

How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System

SPY AGENT BASED SECURE DATA AGGREGATION IN WSN

EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY

Wireless Sensor Network: Challenges, Issues and Research

A Catechistic Method for Traffic Pattern Discovery in MANET

Ubiquitous Healthcare Monitor System Using Wearable Wireless Sensor Network

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

Remote Patient Monitoring- An Implementation in ICU Ward

The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network

Bluetooth Health Device Profile and the IEEE Medical Device Frame Work

Securing MANET Using Diffie Hellman Digital Signature Scheme

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

SECURITY STORAGE MODEL OF DATA IN CLOUD Sonia Arora 1 Pawan Luthra 2 1,2 Department of Computer Science & Engineering, SBSSTC

Fig. 1 BAN Architecture III. ATMEL BOARD

International Journal of Research in Advent Technology Available Online at: SENSOR NETWORK FOR PATIENT MONITORING

BROWSER-BASED HOME MONITOR USING ZIGBEE SENSORS

Ranked Keyword Search Using RSE over Outsourced Cloud Data

Adaptive MAC Protocol for Emergency Data Transmission in Wireless Body Sensor Networks

Australian Journal of Basic and Applied Sciences. EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system

Secrecy Maintaining Public Inspecting For Secure Cloud Storage

BodyMAC: Energy Efficient TDMA-based MAC Protocol for Wireless Body Area Networks

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Design of Remote data acquisition system based on Internet of Things

Study on Differential Protection of Transmission Line Using Wireless Communication

Cloud Database Storage Model by Using Key-as-a-Service (KaaS)

WIRELESS SENSOR NETWORK INTEGRATING WITH CLOUD COMPUTING FOR PATIENT MONITORING

Efficient Data Transmission For Wireless Sensor Networks

A Road Map on Security Deliverables for Mobile Cloud Application

Computer/IT Project LIST. Contact:

Congestion Control in WSN using Cluster and Adaptive Load Balanced Routing Protocol

Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region

BSK-WBSN: BIOMETRIC SYMMETRIC KEYS TO SECURE WIRELESS BODY SENSORS NETWORKS

Single Sign-On Secure Authentication Password Mechanism

Special Properties of Ad-hoc Wireless Network and Security Models

Wednesday, January 15, 14. Secure and Private Service Discovery over Low Energy Bluetooth

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Dynamic Query Updation for User Authentication in cloud Environment

Improving data integrity on cloud storage services

Problems of Security in Ad Hoc Sensor Network

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Current and Future Trends in Medical Electronics

AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS

Privacy Preserving Distributed Cloud Storage

In the pursuit of becoming smart

DESIGN AND IMPLEMENTATION OF A SECURE MULTI-CLOUD DATA STORAGE USING ENCRYPTION

Public Auditing & Automatic Protocol Blocking with 3-D Password Authentication for Secure Cloud Storage

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS

An Experimental Study on Wireless Security Protocols over Mobile IP Networks

Upload Traffic over TCP and UDP Protocols in Different Security Algorithms in Wireless Network

Public Auditing for Shared Data in the Cloud by Using AES

Advances in wireless rh measurement using Mesh topology

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

ANDROID APPLICATION DEVELOPMENT FOR ENVIRONMENT MONITORING USING SMART PHONES

TOPOLOGIES NETWORK SECURITY SERVICES

A Wireless Medical Monitoring Over a Heterogeneous Sensor Network

Analysis on Virtualization Technologies in Cloud

About the Authors Preface Acknowledgements List of Acronyms

Monitoring Performances of Quality of Service in Cloud with System of Systems

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

A Survey on Scalable Data Security and Load Balancing in Multi Cloud Environment

Wireless Encryption Protection

Design and Performance Analysis of Building Monitoring System with Wireless Sensor Networks

QUALITY OF SERVICE METRICS FOR DATA TRANSMISSION IN MESH TOPOLOGIES

Content of smart wireless sensor network security and its network security policy

The study on the Coal Mine Safety Integrated Monitoring and Early Warning System DesignUsing the S-MAC Protocol

Data Encryption WHITE PAPER ON. Prepared by Mohammed Samiuddin.

Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks

How To Manage Log On A Cloud Server On A Microsoft Cloud Server (For A Free) On A Pcode (For Free) With A Microode) On An Ipad (For An Ipa) On Pcode) (For P

A MEDICAL HEALTH CARE SYSTEM WITH HIGH SECURITY USING ANDROID APPLICATION

The 5G Infrastructure Public-Private Partnership

Development of enhanced Third party Auditing Scheme for Secure Cloud Storage

Wireless Sensor Networks Chapter 14: Security in WSNs

Implementation of Wireless Gateway for Smart Home

Detecting Multiple Selfish Attack Nodes Using Replica Allocation in Cognitive Radio Ad-Hoc Networks

Wireless LANs vs. Wireless WANs

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

An Evaluation of Security Services schemes For IEEE Wireless LAN s Using Qualnet

Mobile Medical Records. Project Proposal

LOAD BALANCING AS A STRATEGY LEARNING TASK

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

This idea could limit unnecessary visits and help developing countries to provide healthcare remotely as well.

SPINS: Security Protocols for Sensor Networks

CHAPTER 1 INTRODUCTION

Third Party Auditor: An Integrity Checking Technique for Client Data Security in Cloud Computing

A Study on Secure Electronic Medical DB System in Hospital Environment

Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing

SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD

Transcription:

I JMEIT Vol. 2 Issue 1 Jan 2014 Page No: 55-63 ISSN:2348-196x Depiction of Body Area Network in Cloud Environment P.Sankardayal 1, S.Grahalakshmi 2, P.Gopikannan 3, R.Vidhya Lakshmi 4, G.Sankareswari 5 1PG Scholar of Computer Science and Engineering, P.S.R. Engineering College, Tamil Nadu, India 2PG Scholar of Computer Science and Engineering, P.S.R.Rengasamy College of Engineering, Tamil Nadu, India 3Faculty of Computer Science and Engineering, P.S.R.Rengasamy College of Engineering, Tamil Nadu, India 4Faculty of Information Technology, Sri Vidhya College of Engineering and Technology, Tamil Nadu, India 5Faculty of Computer Science and Engineering, Sri Vidhya College of Engineering and Technology, Tamil Nadu, India Email- sankardayal.mail@gmail.com, grahalakshmibe@gmail.com, vidhyarajme@gmail.com, sankariram90@gmail.com ABSTRACT Wireless Body Area network along with Cloud Computing will provide a considerable improvement in medical applications and also in rear future will be a massive approach for other applications too. In this paper, we are discussing about the issues faced by BAN and combination of BAN with Cloud Computing. There are several advantages of combining these two approaches such as security, cost, and storage, availability of data and ease of use. It also covers the detailed overview about the characteristics and components of the WAN with Cloud computing. Keywords- Autonomous Body Area Network (ABN), Actuators, Body Area Network, Cloud Computing, Managed Body Area Network (MBN), Wireless Sensor. 1. INTRODUCTION Wireless Body Area Network (WBAN) which is also referred as Body Sensor Network (BSN), which came into existence during 2006 by the launch of the book Body Sensor Networks written by Professor Guang- Zhong. BAN is an emerging approach not only for medical field but also for other fields like Military, Security, Gaming and more. Due to its emerging trend and numerous advantages in various fields BAN which can be used in Cloud environment, to increase its efficiency. Cloud Computing is also an blowing technology in this twenty first century because of its user friendly access and pay per access policy and usage base has laid not only the IT peoples but also other organizations such as Government, Education, P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 55

Banking and Healthcare are also shifting their attention towards Cloud Computing. To make a combination of these two emerging technology into a single application will be much useful for the users of both the areas. There are several effects to be considered while combining BAN and Cloud Computing. The main goal of this paper will make an understanding about BAN and Cloud Computing and also their combination. There are several factors which are considered to be an issue in BAN are cost, memory storage, interoperability, security, energy consumption. While combining BAN and Cloud we can reduce the cost and increase the memory storage and also possible to increase the throughput. 2. BACKGROUND OUTLINE 2.1 Body Area Networks an outline BAN is a combination of Biomedical Engineering and Sensor networks. BAN is formally defined by IEEE 802.15 as, a communication standard optimized for low power devices and operation on, in or around the human body. BAN can make benefits to human by studying the body condition using sensors and translate the observed details to the user. Depending upon the observed details the person (Physician) can take further steps to improve the efficiency and utilization of the observed human s body. BAN is an upcoming technology due to the increased population of aged peoples and the cost for medical expenses has increased rapidly. Medical field uses the sensors for getting the information about the patient by placing the sensors in tissues and skin to observe the condition of the patient. After observing the health condition, Doctors can monitor and provide further treatment to the patient. 2.2 Difference between MBNS and ABNS Managed Body Area Network (MBAN) which uses a Third party for taking assessment based upon the collected information from the sensors. Autonomous Body Area Network (ABAN) is an intelligent sensor which contains of actuators in addition to sensor, for making assessment intelligently and individually. Fig. 1. WAN in Cloud environment P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 56

Fig. 2. Flow of secure storage 2.3 Cloud computing an outline Cloud computing which uses internet for making computing technologies. Cloud computing provides user friendly environment for IT and other organizations (Government, education) for utilizing the resources and sharing the resources on demand basics. The main requirement of cloud computing is internet, without using internet we can t access in Cloud environment. The main purpose for moving into Cloud computing is that storage is provided as one of the Infra-structure as a service. First Cloud Company was started by Ellison in 1998 called as NetSuite according to Ellison. 2.4 Retrieval of data from Cloud When the patient or his relatives want to download the data, they have to send a request to CSP. When the verification process gets success then the requested data will be sent to the user for making further analysis or processing. When the Physician wants the patient s information, it is sent as a request to CSP. After the successful verification of the user, the whole data is showed to the physician for his analysis. From that whole data set the Physician may download the necessary details. After downloading the data, the user has to decrypt the data for further analysis or treatment. 3. NEW CONSTRUCTION OF BAN IN CLOUD ENVIRONMENT The new construction for BAN is shown in Fig. 1. This construction mainly focuses on medical application but it can also be applied in various other areas also. Here the patient who maybe in hospital, home, driving, or in other areas will be connected to wireless sensors for monitoring the health condition of the body. This P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 57

wearable sensor may be used for measuring ECG, EEG and blood pressure level. To identify the location of the patient GPS is used. After measuring all the details by the sensor, the output will be transferred to actuator. The actuator will make immediate decision intelligently and will send the decision to local Personal Digital Assistant (PDA) using WiFi. The PDA will check transmit the data to Cloud server via internet. Here the Cloud service Provider (CSP) will check the authentication of the sender and will store the data into server, if the authentication is proved to be correct. The major issue in this construction is while using a semi-trusted server security is weak. To overcome this security problem, we have to encrypt the data before storing it in cloud. There are various encryption algorithms such as DES, Triple DES and AES or other algorithms too. Security is a challenging process in Cloud environment these days. 3.1 Registration to Cloud server Users initially have to register to Cloud due to processing of utilization and privacy preserving of CSPs and users. The users are persons such as Patient, Physician, relatives to the patient. They have to provide data s such as their personal information and access rights and has to make a contract between CSP and user for processing the Cloud on use per demand basis. Fig. 3. Download and Decryption of secured data 3.2 Transmission of data in two modes First data transmission to Cloud, during the patient s health condition is normal then data will be transferred directly to Cloud after encryption. This encryption process should be done in PDA if the patient is in home P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 58

or in public place, then the data should be encrypted using his laptop or PDA and if he is in hospital then we may use laptop or desktop in hospital. Then with the help of internet, we may transfer the encrypted data to Cloud. Second transmission will be transferred to Physician (Doctor) before storing it in Cloud due to abnormal position of the patient. When the patient is in critical position the data will be sent to the respected physician, Hospital and to the relatives of the patient for providing immediate assessment. Then the same data is sent to Cloud after encryption. 3.3 Components in BAN There are three major components by all BANs and they are, 1. Sensor nodes 2. Actuator nodes 3. Personal device 3.3.1 Sensor node Sensor nodes are used for gathering the physical information of the user and process the data. These sensors are attached to the patient s skin or to their dress or to the tissue. The number of sensor nodes are depends upon the application. The components included in sensor nodes are - 3.3.2 Actuator node Actuator nodes will receive the data from sensors and will act (Decide) according to the sensor s information and user s information. The components include in actuators are - 3.3.3 Personal device Sometimes these devices are referred as Body Control Unit (BDU), will collect the information from sensors and actuator and inform the retrieved information to user via an external gateway by a display or an LED. All the components contain the following sub-components for processing and access. a. Power unit b. Memory and Processor c. Transceiver It also uses some software for making interface with hardware component and to the application software. 4. CHALLENGES IN THIS NEW APPROACH 1. Security 2. Interoperability 3. Power consumption 4. Routing P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 59

5. SOLUTIONS AND DISCUSSION OF THE CHALLENGES 5.1 Power overwhelming For power consuming we may use the following methods: ZigBee Bluetooth WiFi Ultra Wide Band (UWB) Among all the above method ZigBee will consume low power but it is limited to 250Kbps. Bluetooth and WiFi is also used but for short range of coverage. Most of the case UWB and WiFi are used. 5.2 Security Security has to be maintained in the following aspects Authentication Integrity Confidentiality Communication link Protect data 1. An authentication has to be maintained for identifying the BAN patient, physician and other user. 2. Integrity between sensors and storage area. 3. Confidentiality of data and user information has to be maintained. 4. Communication link must be secure between the sensors and to other devices. 5. Protection of data in all the aspects such as during transmission and storing. For all the above security constraints, an effective cryptographic algorithm has to be used. Some examples of such algorithms are DES (Data Encryption Standard), Triple DES, and AES (Advanced Encryption Standard), IDE (Identity Based Encryption). P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 60

5.3 Interoperability Interoperability has to be maintained in the following constraints Memory Power Storage Plug-and-play Ease of use Interaction between devices. For the entire above problem Cloud Computing provides solution. 5.4 Routing Routing of data is a major problem in network but apart from that we have to concentrate in tissue heating of the patient. The solution for above routing includes, LEACH (Low Energy Adaptive Clustering Hierarchy) Cluster- based routing Cross-layer routing 5.5 Protocol Some protocols used are LBT (Listen before-talk) Drawback Not good for collision Not energy efficient Multi channel Management Advantage Channel is reserved. Aggregation of channels into single channel will be useful to reduce traffic. Other protocols used by MAC layer are TDMA but that has its own disadvantages. 6 APPLICATIONS OF THE NEW APPROACH Medical health care Wireless Audio Military P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 61

Gaming Sports monitoring Home area networks 7 CONCLUSION WAN and Cloud computing both are emerging technology and this paper which provides an overview about this combination. Yet there are few areas which have to be concentrated in this combination for improving the QoS of this combination. The major concentrations are to be made in security, power consumption, routing. The main advantage of this combination is low cost, high throughput and user friendly access, unlimited memory access using cloud. This article will be an inspiration for the researchers to make concentration in this area and will provide an efficient model to the user in rear future. REFERENCES [1] M. Chen et al., Body Area Networks: A Survey, ACM/Springer Mobile Networks and Applications, vol. 16, no. 2, 2011, pp. 171 193. [2] Jiafu Wan, Caifeng Zou, Chin-Feng Lai, Ming Zhou, Xiaofei Wang, Cloud Enabled Wireless Body Area Networks for Pervasive Healthcare, IEEE Networks September/October 2013. [3] Sangwon Lee, Murali Annavaram, Wireless Body Area Networks: Where Does Energy Go?, IISWC 2012: 25-35 [4] M. Li, W. Lou, and K. Ren, Data Security and Privacy in Wireless Body Area Networks, IEEE Wireless Communication, vol. 17, no. 1, 2010, pp. 51 58. [5] Suraj Pandey, William Voorsluys, Shang Niv, Ahsan Khandoker, Rajkumar Buyya, An Automatic Cloud Environment for Hosting ECG Data Analysis Services, Future Generation Computer System, 15 May 2011 pp. 147 154. [6] Jui-chien Hsieh, Meng-Wei Hsu, A cloud computing based 12-lead ECG Telemedicine service Hsieh and Hsu BMC Medical Informatics and Decision Making, 2012, 12:77. [7] J Xing, Y Zhu, A survey on body area network, in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 09),Beijing,China, (2009). [8] M.S. Balamurugan, Cloud Care: A Remote Health Monitoring System, IWBBIO 2013 Proceedings, Granada 18 20 March, 2013. [9] Hassan Ghasemzadeh, Vitali Loseu, Eric Guenterberg, Roozbeh Jafari, Sport Training Using Body Sensor Networks: A Statistical pproach to Measure Wrist Rotation for Golf Swing, BodyNets 09 April 1-3, 2009, Los Angeles, CA, USA. P.Sankardayal 1 et al. IJMEIT Vol 2 Issue 1 Jan. 2014 Page 62