SlideShare a Scribd company logo
1 of 15
Global Academy Of Technology
Rajarajeshwari Nagar,
Bengaluru-560098
Department of Electronics and Communication
Engineering
Technical Seminar on.
Enchancing Security of Helath Information using
Modular Encryption Standard in
Mobile Cloud Computing
Presented by:
Sagar AN
1GA19EC129
Under the guidance of:
Mrs. Ramya KV
INTRODUCTION
1
LITERATURE SURVEY
OBJECTIVES
CONTENTS
2
METHODOLOGY
RESULTS
CONCLUSIONS
REFRENCES
3
4
5
6
7
INTRODUCTION
• Mobile cloud computing is a technology
that allows mobile devices, such as smartphones and
tablets, to access cloud-based services and resources .
• The concept behind mobile cloud computing is to
offload computation and storage tasks from
mobile devices to the cloud, which can handle
these tasks more efficiently and effectively.
• By leveraging the power of the cloud, mobile
users can access a wide range of applications
and services without the need for powerful hardware
or extensive storage space on their devices.
• This technology has numerous benefits, including
improved performance, increased storage capacity,
and reduced battery consumption on mobile devices.
LITERATURE SURVEY
Sl No Authors Title of article Analysis
1 Research on mobile
cloud computing:
Review, trend and
perspectives.
The paper provides a comprehensive review of the
literature on mobile cloud computing, covering key
concepts, challenges, and opportunities. It identifies
and discusses the latest trends and developments,
such as edge computing and serverless computing.
The analysis provides valuable insights for
researchers, practitioners in the field.
2 A. Nirabi ,
S. A. Hameed
Mobile cloud
computing for
emergency
healthcare model.
The paper proposes a mobile cloud computing-based
healthcare model for emergency situations. It
provides a detailed description of the proposed
model, including its architecture and functionalities.
The authors argue that this model can improve the
speed and efficiency of emergency healthcare,
offering a promising approach to public health and
safety.
H. Qi , A. Gani
LITERATURE SURVEY
Sl No Authors Title of article Analysis
3 L. A. Tawalbeh,
Mehmood,
E. Benkhlifa,
and H. Song.
Mobile cloud
computing model and
big data analysis for
healthcare applications.
The paper proposes a mobile cloud computing-based
model for healthcare applications that utilizes big data
analysis. The model provides real-time analysis of
patient data and clinical information, offering a
promising approach to improving healthcare services.
The paper's focus on integrating mobile cloud
computing and big data analysis in healthcare provides
new opportunities for healthcare professionals to make
informed decisions and improve patient outcomes.
4 H. Jin, Y. Luo, P.
Li, and J. Mathew
A review of secure and
privacypreserving
medical data sharing
The paper proposes a mobile cloud computing-based
healthcare model for emergency situations. It provides
a detailed description of the proposed model, including
its architecture and functionalities. The authors argue
that this model can improve the speed and efficiency of
emergency healthcare, offering a promising approach to
public health and safety.
OBJECTIVES
• The proposed work provides secure HI storage
against ensuring the confidentiality of the cloud
service provider.
• It ensures the confidentiality of HI against any
hacker or third party/malicious outsider.
• Full control of the patient to their HI.
• Layered modeling with modularity support
against the intruder’s attacks to HI.
• Unwanted attempt to access the HI would be
restricted.
METHODOLOGY
MES includes three significant measures. These measures are‘‘
Identification (IDN)’’, ‘‘Classification (CLF)’’, and ‘‘Securing (SC)’’. IDN
and CLF are performed at the MCC userside. While the SC step is
performed at the Crypto-cloud.Crypto-cloud is the intermediary cloud that
is dedicated toperforming cryptography measures.
CLASSIFICATION
IDENTIFICATION SECURING
MODULAR
INTRACTION
HI storage at cloud using MES. HI storage sharing using MES.
MODULAR ENCRYPTION STANDARD
4
MODULARITY CHECK
• The module-based
processor utilization
of MES is processed.
• The more CPU used
in the enciphering
technique; the
higher the processor
load would be.
MEMORY UTILIZATION
• For performance
analysis, one of the
most critical
parametersis memory
utilization.
• The below graph
shows memory
utilization of AES,
Blowfish, RC5.
KEY VARIANCES
BASED ANALYSIS
• This is a qualitative
comparative approach.
KEY DATA COLLIGATION-
RATE FOR SINGLE ROUND
• The processor usage is
the analysis of the time
that a CPU takes to a
particular computation.
RESULTS
1
3
2
RESULTS
Modular analysis of MES. Processor utilization rate.
1 2
RESULTS
Degree of key-varieties.
3
Key-data colligation rate
4
CONCLUSION
Despite the prospective solutions offered by MCC in Health record monitoring,
numerous impediments restrain the key potentials of MCC. Among these obstacles,
security and privacy are the key hindrances in the utilization of MCC in healthcare.
This is one of the considerable research gaps. Accordingly, this research utilizes a
layered, modular, data nature-centric cryptography approach, for example, MES,
that utilizes secure HI sharing, and storage mechanisms. The Comparative results
show that this scheme outperforms other commonly used techniques in the MCC .
Currently, this approach is intended for the enciphering and deciphering of textual
data and there is no consideration of the image-oriented data-set yet. However, in
future work, this issue would be considered. Secondly, layered modeling may
sometimes result in lowering system efficiency. Accordingly, the efficiency of the
proposed work can be further improved by the integration of quantum computing to
make it more adaptable for mobile and smart devices. In the future, we may ensure
patient privacy using the block-chain.
FUTURE SCOPE
The proposed approach of using a layered, modular, data nature-centric cryptography
approach for secure health record monitoring through mobile cloud computing (MCC)
has promising future scope.In the short term, the proposed approach can be extended to
include the encryption and decryption of image-oriented data and can be tested in a
real-world setting. Additionally, the integration of quantum computing can be explored
to further enhance the efficiency of the system and its adaptability to mobile and smart
devices.In the long term, the proposed approach can be expanded to include other
types of healthcare data such as video and audio recordings. Additionally, the use of
block-chain technology can be explored for secure data sharing and storage, which can
further enhance patient privacy and data security.
REFRENCES
1. H. Qi and A. Gani, ‘‘Research on mobile cloud computing: Review, trend and perspectives,’’ in Proc. 2nd Int.
Conf. Digit. Inf. Commun. Technol. Appl. (DICTAP), May 2012, pp. 195–202.
2. A. Nirabi and S. A. Hameed, ‘‘Mobile cloud computing for emergency healthcare model: Framework,’’
in Proc. Int. Conf. Comput. Commun. Eng., 2018, pp. 375–379.
3. L. A. Tawalbeh, R. Mehmood, E. Benkhlifa, and H. Song, ‘‘Mobile cloud computing model and big data
analysis for healthcare applications,’’ IEEE Access, vol. 4, pp. 6171–6180, 2016.
4. H. Jin, Y. Luo, P. Li, and J. Mathew, ‘‘A review of secure and privacypreserving medical data sharing,’’ IEEE
Access, vol. 7, pp. 61656–61669, 2019.
5. D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, ‘‘A survey on secure data analytics in edge computing,’’ IEEE
Internet Things J., vol. 6, no. 3, pp. 4946–4967, Jun. 2019.
THANK YOU

More Related Content

Similar to SAGAR PPT.pptx

Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
IJERA Editor
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
Zuhair Haroon khan
 

Similar to SAGAR PPT.pptx (20)

Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
 
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
Analysis of Homomorphic Technique and Secure Hash Technique for Multimedia Co...
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...IRJET-  	  Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTINGDATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
DATA STORAGE SECURITY CHALLENGES IN CLOUD COMPUTING
 
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud StorageIRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
 
A novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data applicationA novel cloud storage system with support of sensitive data application
A novel cloud storage system with support of sensitive data application
 
A Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloudA Novel privacy preserving public auditing for shared data in cloud
A Novel privacy preserving public auditing for shared data in cloud
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security on
 
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
An Efficient Cloud Scheduling Algorithm for the Conservation of Energy throug...
 
Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)Cloud Computing- Proposal (Autosaved)
Cloud Computing- Proposal (Autosaved)
 
Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...Secure cloud storage privacy preserving public auditing for data storage secu...
Secure cloud storage privacy preserving public auditing for data storage secu...
 
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
IEEE Projects 2013 For ME Cse Seabirds ( Trichy, Thanjavur, Karur, Perambalur )
 
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
Bulk Ieee Projects 2013 @ Seabirds ( Chennai, Trichy, Hyderabad, Pune, Mumbai )
 
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-students
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-studentsIeee projects-2013-2014-title-list-for-me-be-mphil-final-year-students
Ieee projects-2013-2014-title-list-for-me-be-mphil-final-year-students
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 

SAGAR PPT.pptx

  • 1. Global Academy Of Technology Rajarajeshwari Nagar, Bengaluru-560098 Department of Electronics and Communication Engineering Technical Seminar on. Enchancing Security of Helath Information using Modular Encryption Standard in Mobile Cloud Computing Presented by: Sagar AN 1GA19EC129 Under the guidance of: Mrs. Ramya KV
  • 3. INTRODUCTION • Mobile cloud computing is a technology that allows mobile devices, such as smartphones and tablets, to access cloud-based services and resources . • The concept behind mobile cloud computing is to offload computation and storage tasks from mobile devices to the cloud, which can handle these tasks more efficiently and effectively. • By leveraging the power of the cloud, mobile users can access a wide range of applications and services without the need for powerful hardware or extensive storage space on their devices. • This technology has numerous benefits, including improved performance, increased storage capacity, and reduced battery consumption on mobile devices.
  • 4. LITERATURE SURVEY Sl No Authors Title of article Analysis 1 Research on mobile cloud computing: Review, trend and perspectives. The paper provides a comprehensive review of the literature on mobile cloud computing, covering key concepts, challenges, and opportunities. It identifies and discusses the latest trends and developments, such as edge computing and serverless computing. The analysis provides valuable insights for researchers, practitioners in the field. 2 A. Nirabi , S. A. Hameed Mobile cloud computing for emergency healthcare model. The paper proposes a mobile cloud computing-based healthcare model for emergency situations. It provides a detailed description of the proposed model, including its architecture and functionalities. The authors argue that this model can improve the speed and efficiency of emergency healthcare, offering a promising approach to public health and safety. H. Qi , A. Gani
  • 5. LITERATURE SURVEY Sl No Authors Title of article Analysis 3 L. A. Tawalbeh, Mehmood, E. Benkhlifa, and H. Song. Mobile cloud computing model and big data analysis for healthcare applications. The paper proposes a mobile cloud computing-based model for healthcare applications that utilizes big data analysis. The model provides real-time analysis of patient data and clinical information, offering a promising approach to improving healthcare services. The paper's focus on integrating mobile cloud computing and big data analysis in healthcare provides new opportunities for healthcare professionals to make informed decisions and improve patient outcomes. 4 H. Jin, Y. Luo, P. Li, and J. Mathew A review of secure and privacypreserving medical data sharing The paper proposes a mobile cloud computing-based healthcare model for emergency situations. It provides a detailed description of the proposed model, including its architecture and functionalities. The authors argue that this model can improve the speed and efficiency of emergency healthcare, offering a promising approach to public health and safety.
  • 6. OBJECTIVES • The proposed work provides secure HI storage against ensuring the confidentiality of the cloud service provider. • It ensures the confidentiality of HI against any hacker or third party/malicious outsider. • Full control of the patient to their HI. • Layered modeling with modularity support against the intruder’s attacks to HI. • Unwanted attempt to access the HI would be restricted.
  • 7. METHODOLOGY MES includes three significant measures. These measures are‘‘ Identification (IDN)’’, ‘‘Classification (CLF)’’, and ‘‘Securing (SC)’’. IDN and CLF are performed at the MCC userside. While the SC step is performed at the Crypto-cloud.Crypto-cloud is the intermediary cloud that is dedicated toperforming cryptography measures. CLASSIFICATION IDENTIFICATION SECURING MODULAR INTRACTION
  • 8. HI storage at cloud using MES. HI storage sharing using MES. MODULAR ENCRYPTION STANDARD
  • 9. 4 MODULARITY CHECK • The module-based processor utilization of MES is processed. • The more CPU used in the enciphering technique; the higher the processor load would be. MEMORY UTILIZATION • For performance analysis, one of the most critical parametersis memory utilization. • The below graph shows memory utilization of AES, Blowfish, RC5. KEY VARIANCES BASED ANALYSIS • This is a qualitative comparative approach. KEY DATA COLLIGATION- RATE FOR SINGLE ROUND • The processor usage is the analysis of the time that a CPU takes to a particular computation. RESULTS 1 3 2
  • 10. RESULTS Modular analysis of MES. Processor utilization rate. 1 2
  • 12. CONCLUSION Despite the prospective solutions offered by MCC in Health record monitoring, numerous impediments restrain the key potentials of MCC. Among these obstacles, security and privacy are the key hindrances in the utilization of MCC in healthcare. This is one of the considerable research gaps. Accordingly, this research utilizes a layered, modular, data nature-centric cryptography approach, for example, MES, that utilizes secure HI sharing, and storage mechanisms. The Comparative results show that this scheme outperforms other commonly used techniques in the MCC . Currently, this approach is intended for the enciphering and deciphering of textual data and there is no consideration of the image-oriented data-set yet. However, in future work, this issue would be considered. Secondly, layered modeling may sometimes result in lowering system efficiency. Accordingly, the efficiency of the proposed work can be further improved by the integration of quantum computing to make it more adaptable for mobile and smart devices. In the future, we may ensure patient privacy using the block-chain.
  • 13. FUTURE SCOPE The proposed approach of using a layered, modular, data nature-centric cryptography approach for secure health record monitoring through mobile cloud computing (MCC) has promising future scope.In the short term, the proposed approach can be extended to include the encryption and decryption of image-oriented data and can be tested in a real-world setting. Additionally, the integration of quantum computing can be explored to further enhance the efficiency of the system and its adaptability to mobile and smart devices.In the long term, the proposed approach can be expanded to include other types of healthcare data such as video and audio recordings. Additionally, the use of block-chain technology can be explored for secure data sharing and storage, which can further enhance patient privacy and data security.
  • 14. REFRENCES 1. H. Qi and A. Gani, ‘‘Research on mobile cloud computing: Review, trend and perspectives,’’ in Proc. 2nd Int. Conf. Digit. Inf. Commun. Technol. Appl. (DICTAP), May 2012, pp. 195–202. 2. A. Nirabi and S. A. Hameed, ‘‘Mobile cloud computing for emergency healthcare model: Framework,’’ in Proc. Int. Conf. Comput. Commun. Eng., 2018, pp. 375–379. 3. L. A. Tawalbeh, R. Mehmood, E. Benkhlifa, and H. Song, ‘‘Mobile cloud computing model and big data analysis for healthcare applications,’’ IEEE Access, vol. 4, pp. 6171–6180, 2016. 4. H. Jin, Y. Luo, P. Li, and J. Mathew, ‘‘A review of secure and privacypreserving medical data sharing,’’ IEEE Access, vol. 7, pp. 61656–61669, 2019. 5. D. Liu, Z. Yan, W. Ding, and M. Atiquzzaman, ‘‘A survey on secure data analytics in edge computing,’’ IEEE Internet Things J., vol. 6, no. 3, pp. 4946–4967, Jun. 2019.