SlideShare a Scribd company logo
1 of 2
BIBLIOGRAPHY
[1] P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care
process for patients with diabetes and cardiovascular disease using mobile
telephony.” Conference Proceedings of the International Conference of IEEE
Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758.
[Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765
[2] A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of
parkinson’s disease progression by noninvasive speech tests,” Biomedical
Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884 – 893, 2010.
[3] G. Clifford and D. Clifton, “Wireless technology in disease management and
medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012.
[4] L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available:
http://tinyurl.com/4atsdlj,” 2010.
[5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. vanBeijnum, and P. D. Stefanis, “End-
user perception towards pervasive cardiac healthcare services: Benefits, acceptance,
adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484.
[6] M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready
for the clouds?” in SERVICES, 2011, pp. 371–378.
[7] N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009.
[8] E. B. Fernandez, “Security in data intensive computing systems,” in Handbook of
Data Intensive Computing, 2011, pp. 447–466.
[9] A. Narayanan and V. Shmatikov, “Myths and fallacies of personally identifiable
information,” Communications of the ACM, vol. 53, no. 6 , pp. 24–26, 2010.
[10] P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, “Countering gattaca:
efficient and secure testing of fully-sequenced human genomes,” in ACM
Conference on Computer and Communications Security, 2011, pp. 691–702.
APPENDIX
1) Indistinguishability of Encryptions under Chosen Ciphertext Attack:
The ID-IE-CCA security for the proposed key private proxy re-encryption scheme
is defined by the following chosen-cipher text attack game played between a challenger C
and an adversary A. Note that we have two types of cipher texts in the proposed key
private re-encryption scheme, and hence, there are two situations.
2) Indistinguishability of Keys under Chosen-Ciphertext Attack:
The ID-IK-CCA security for our proposed key private re-encryption scheme is
defined by the same method as for the ID-IE-CCA security. Note that we have two types
of challenges. One is for an original ciphertext, the other is for a re-encryption key. The
former is for the anonymity of the original ciphertext, and the latter is for the anonymity
of the re-encryption key.

More Related Content

Similar to A PROJECT REPORT ON CLOUD ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING

Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
TaunyaCoffman887
 
A Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record SystemA Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record System
poojaphddata
 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
IJNSA Journal
 

Similar to A PROJECT REPORT ON CLOUD ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING (20)

TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research TOP 5 Most View Article in Computer Science & Information Technology Research
TOP 5 Most View Article in Computer Science & Information Technology Research
 
June 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its ApplicationsJune 2021 - Top 10 Read Articles in Network Security and Its Applications
June 2021 - Top 10 Read Articles in Network Security and Its Applications
 
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
A Novel Approach for Tomato Diseases Classification Based on Deep Convolution...
 
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdfFebruary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
February_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
Develop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve thDevelop a 4-6 page holistic intervention plan design to improve th
Develop a 4-6 page holistic intervention plan design to improve th
 
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
Trends in Advanced Computing in 2020 - Advanced Computing: An International J...
 
A Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record SystemA Proposed Blockchain Based Secure Electronic Health Record System
A Proposed Blockchain Based Secure Electronic Health Record System
 
The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices The Application of Internet of Things on Microfluidic Devices
The Application of Internet of Things on Microfluidic Devices
 
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
EXPLORING CHALLENGES AND OPPORTUNITIES IN CYBERSECURITY RISK AND THREAT COMMU...
 
Top 10 cited articles for HIIJ
Top 10 cited articles for HIIJTop 10 cited articles for HIIJ
Top 10 cited articles for HIIJ
 
Top 10 cited articles for HIIJ
Top 10 cited articles for HIIJTop 10 cited articles for HIIJ
Top 10 cited articles for HIIJ
 
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...Top cited 2nd articles in 2017 - International Journal of Network Security & ...
Top cited 2nd articles in 2017 - International Journal of Network Security & ...
 
Top downloaded article in academia 2020 - International Journal of Computatio...
Top downloaded article in academia 2020 - International Journal of Computatio...Top downloaded article in academia 2020 - International Journal of Computatio...
Top downloaded article in academia 2020 - International Journal of Computatio...
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 
Contextual Analysis
Contextual AnalysisContextual Analysis
Contextual Analysis
 
Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...Top Download Article in Computer Science & Information Technology Research: O...
Top Download Article in Computer Science & Information Technology Research: O...
 
Apr 2023 - Top 10 cited articles for HIIJ.pdf
Apr 2023 - Top 10 cited articles for HIIJ.pdfApr 2023 - Top 10 cited articles for HIIJ.pdf
Apr 2023 - Top 10 cited articles for HIIJ.pdf
 
December 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its ApplicationsDecember 2023 - Top 10 Read Articles in Network Security & Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
 
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its ApplicationsMay 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
Health
 

Recently uploaded (20)

Air Compressor reciprocating single stage
Air Compressor reciprocating single stageAir Compressor reciprocating single stage
Air Compressor reciprocating single stage
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 

A PROJECT REPORT ON CLOUD ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING

  • 1. BIBLIOGRAPHY [1] P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765 [2] A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,” Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884 – 893, 2010. [3] G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012. [4] L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj,” 2010. [5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. vanBeijnum, and P. D. Stefanis, “End- user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484. [6] M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready for the clouds?” in SERVICES, 2011, pp. 371–378. [7] N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009. [8] E. B. Fernandez, “Security in data intensive computing systems,” in Handbook of Data Intensive Computing, 2011, pp. 447–466. [9] A. Narayanan and V. Shmatikov, “Myths and fallacies of personally identifiable information,” Communications of the ACM, vol. 53, no. 6 , pp. 24–26, 2010. [10] P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, “Countering gattaca: efficient and secure testing of fully-sequenced human genomes,” in ACM Conference on Computer and Communications Security, 2011, pp. 691–702.
  • 2. APPENDIX 1) Indistinguishability of Encryptions under Chosen Ciphertext Attack: The ID-IE-CCA security for the proposed key private proxy re-encryption scheme is defined by the following chosen-cipher text attack game played between a challenger C and an adversary A. Note that we have two types of cipher texts in the proposed key private re-encryption scheme, and hence, there are two situations. 2) Indistinguishability of Keys under Chosen-Ciphertext Attack: The ID-IK-CCA security for our proposed key private re-encryption scheme is defined by the same method as for the ID-IE-CCA security. Note that we have two types of challenges. One is for an original ciphertext, the other is for a re-encryption key. The former is for the anonymity of the original ciphertext, and the latter is for the anonymity of the re-encryption key.