This document discusses a mobile health monitoring system that securely stores patient healthcare data in the cloud. It proposes using identity-based encryption and hierarchical identity-based encryption to encrypt health data before storing it in the cloud. This helps address privacy and security issues. The system is designed to efficiently share information between patients and healthcare providers while keeping patient identities and data private.
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET Journal
This document proposes an Android-based healthcare monitoring and management system using the Internet of Things (IoT). The system uses a body sensor network (BSN) where sensors attached to a patient's body can monitor vital signs wirelessly. The sensor data is sent to a healthcare center via the BSN. The healthcare center then analyzes the data and provides real-time feedback and alerts to patients and their families. This ensures remote patient monitoring and management while improving comfort and healthcare quality. The document discusses the system functionality, literature review on similar systems, algorithms used and security analysis to show how the proposed system addresses security needs in BSN-based healthcare more effectively than previous systems.
This document summarizes a research paper about developing an intelligent medicine box system using IoT technologies. The system uses sensors and wireless communication to monitor patients' vital signs and medication adherence. If abnormal readings are detected, alerts would be sent via SMS to predefined caregivers. The system aims to provide personalized healthcare monitoring while patients are at home. It incorporates an ARM controller, wireless sensors, and WiFi to remotely track health data and environmental conditions in real-time. The feasibility of the system was proven through field testing, with the goal of improving home healthcare services.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
This document summarizes a research paper about securely hiding sensitive medical data using encryption. The paper proposes a system that distributes a patient's data across multiple encrypted data servers. It uses Paillier cryptosystems to allow statistical analysis of the encrypted patient data without compromising privacy. The system includes wireless medical sensors that monitor patients and transmit encrypted data to a database. It uses an access control system and statistical analysis protocols that employ Paillier encryption to allow authorized users like doctors to access and analyze the encrypted patient data without revealing its contents. The goal is to protect sensitive medical information from privacy breaches while still enabling useful analysis of aggregated patient data.
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
The document describes a proposed virtual assistant for medical emergencies using IoT. The system would involve a wearable device like a wristband with sensors to monitor vital signs. If the signs indicate a medical emergency, the device would alert emergency services and provide the patient's medical history. It would also notify family members. The system aims to reduce response times in medical emergencies to improve outcomes. Key challenges include accurately detecting emergencies, secure data transmission, and avoiding false alarms. The proposed solution involves continuous health monitoring, emergency detection and response, automatic medical history access in emergencies, and location tracking to direct responders.
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET Journal
This document proposes an Android-based healthcare monitoring and management system using the Internet of Things (IoT). The system uses a body sensor network (BSN) where sensors attached to a patient's body can monitor vital signs wirelessly. The sensor data is sent to a healthcare center via the BSN. The healthcare center then analyzes the data and provides real-time feedback and alerts to patients and their families. This ensures remote patient monitoring and management while improving comfort and healthcare quality. The document discusses the system functionality, literature review on similar systems, algorithms used and security analysis to show how the proposed system addresses security needs in BSN-based healthcare more effectively than previous systems.
This document summarizes a research paper about developing an intelligent medicine box system using IoT technologies. The system uses sensors and wireless communication to monitor patients' vital signs and medication adherence. If abnormal readings are detected, alerts would be sent via SMS to predefined caregivers. The system aims to provide personalized healthcare monitoring while patients are at home. It incorporates an ARM controller, wireless sensors, and WiFi to remotely track health data and environmental conditions in real-time. The feasibility of the system was proven through field testing, with the goal of improving home healthcare services.
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
This document proposes a security architecture for remote patient monitoring using a body sensor network. The key aspects of the proposed architecture are:
1) Sensors worn by patients measure vital signs and wirelessly transmit data to a home base station for consolidation and transmission to a remote hospital monitoring station.
2) The home base station collects patient data from multiple sensors and associates each set of readings with a unique patient ID to correctly identify the individual.
3) Encryption, authentication and replay protection are used to secure wireless transmission of sensor data between patients' wearable data acquisition units and the home base station within the home. Symmetric key encryption and elliptic curve cryptography are employed considering the sensors' limited resources.
4
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
This document summarizes a research paper about securely hiding sensitive medical data using encryption. The paper proposes a system that distributes a patient's data across multiple encrypted data servers. It uses Paillier cryptosystems to allow statistical analysis of the encrypted patient data without compromising privacy. The system includes wireless medical sensors that monitor patients and transmit encrypted data to a database. It uses an access control system and statistical analysis protocols that employ Paillier encryption to allow authorized users like doctors to access and analyze the encrypted patient data without revealing its contents. The goal is to protect sensitive medical information from privacy breaches while still enabling useful analysis of aggregated patient data.
IRJET- Virtual Assistant for Medical EmergencyIRJET Journal
The document describes a proposed virtual assistant for medical emergencies using IoT. The system would involve a wearable device like a wristband with sensors to monitor vital signs. If the signs indicate a medical emergency, the device would alert emergency services and provide the patient's medical history. It would also notify family members. The system aims to reduce response times in medical emergencies to improve outcomes. Key challenges include accurately detecting emergencies, secure data transmission, and avoiding false alarms. The proposed solution involves continuous health monitoring, emergency detection and response, automatic medical history access in emergencies, and location tracking to direct responders.
There are a number of scopes for IoT in order to make a difference in lives of patients. The devices can capture as well as monitor related data regarding patient and allows the providers to obtain the insights without bringing the patients visiting. The procedure can assist the patient results as well as preventing the possible communications for the process that involves risk. However, lack of electronic health record (EHR) system integration is one of the major issues faced while using IoT in healthcare. Some of the EHR systems allow the patients importing data into the record. However, it remains limited to a few dominant where the EHR players as well as leaves providers unspecific of the processing data that can be helpful for the organization to use the process. The challenges for interoperability in order to keep data in distinctive medical devices depend on the purpose and ordering physician. by Vishal Dineshkumar Soni 2018. An IoT Based Patient Health Monitoring System. International Journal on Integrated Education. 1, 1 (Dec. 2018), 43-48. DOI:https://doi.org/10.31149/ijie.v1i1.481. https://journals.researchparks.org/index.php/IJIE/article/view/481/458 https://journals.researchparks.org/index.php/IJIE/article/view/481
Security and Privacy Protection of Medical Sensor Data of Patient using IOTIRJET Journal
This document proposes a patient health monitoring system using medical sensors and encryption to protect sensitive patient data. Key points:
- Medical sensors would collect physiological data like heartbeat from patients and send it over wireless networks to be stored.
- The system would encrypt each patient's data with RSA before sending it to separate files on a server. Only authorized doctors and administrators could access the encrypted data.
- The proposal compares the encryption algorithms RSA and Pailier to analyze their time complexities for securing medical sensor data transmitted over wireless networks.
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET Journal
This document describes a mobile application that provides remote healthcare services using data mining techniques. The application allows users to input symptoms and will then predict potential diseases, provide first aid recommendations, locate nearby hospitals, and book appointments with doctors. It is intended to help patients, health workers, and those in remote areas access healthcare services. The application protects patient privacy and includes access controls for data. It uses a knowledge-based model stored as a graph database to make diagnoses and recommendations by identifying relationships between diseases, symptoms, and information.
IRJET- IoT based Patient Health Monitoring using ESP8266IRJET Journal
This document describes an IoT-based patient health monitoring system using ESP8266 and Arduino. The system measures a patient's pulse rate using a pulse sensor and surrounding temperature using a temperature sensor. It continuously monitors these values and updates them to the IoT platform ThingSpeak. The sensor readings are also displayed on an LCD screen. The system aims to remotely monitor patient health and detect any abnormalities. This can help reduce strain on medical staff and improve access to healthcare.
IRJET- MedBlock System for Securing Medical RecordsIRJET Journal
This document proposes a blockchain-based system called MedBlock to securely store and share medical records. The system aims to address limitations in current healthcare record systems related to privacy, security and data sharing. MedBlock uses blockchain technology and encryption to securely record medical transactions in an immutable ledger. It allows doctors to upload encrypted medical records and patients to access and share records through decryption keys. The system architecture includes modules for doctors and patients. If implemented, MedBlock could provide more secure, private and tamper-proof management of healthcare data compared to traditional electronic medical record systems.
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
This document discusses providing security for wireless medical sensor data. It first reviews related work on securing wireless medical sensor networks using cryptosystems like Paillier and ElGamal. It then proposes a system that uses these cryptosystems to encrypt and distribute patient data across multiple data servers. This would preserve patient privacy as long as no single server is compromised. The system aims to allow medical analysis of distributed encrypted data without revealing individual patient information.
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
This document summarizes a research paper that proposes a cloud-based healthcare system for securely sharing medical data. It does the following:
1. It encrypts patient medical data using the NTRU encryption algorithm when transmitting it to nearby clouds for privacy.
2. It develops a trust model to help users select trustworthy partners to share stored medical data with in the cloud based on their similarity and compatibility.
3. It divides and encrypts users' medical data stored in the remote cloud into different categories to provide appropriate security protections.
4. It implements a deliberative intrusion detection system based on the cloud mesh structure to safeguard the large medical database in the remote cloud from malicious attacks.
This document discusses medical applications using IoT (Internet of Things) technology. It provides an overview of medical IoT, the need for medical IoT, and how it differs from e-health. It then discusses several medical IoT applications including personal health monitoring, smart hospitals, clinical data collection and integration, implants, remote health monitoring, smart health monitors, assistance for paralysis patients, and IoT applications in the pharmaceutical industry. Finally, it briefly describes a 4-layer healthcare model for IoT and some of the hardware and software used to implement this model.
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET Journal
This document summarizes a research paper on a health monitoring system using IoT and Arduino Uno. The system measures body temperature and pulse rate using sensors interfaced with an Arduino board. Wireless data transmission is done through an ESP8266 WiFi module to an IoT platform called ThingSpeak. The collected sensor data is stored on the ThingSpeak server and can be viewed by authorized users. The system aims to provide easy and affordable health monitoring to address issues like lack of resources and doctors in rural areas. It reduces the time and cost of regular health checkups.
This document provides an overview of Internet of Things (IoT) applications in healthcare. It discusses the dimensions and characteristics ("7 Vs") of IoT, healthcare networks and frameworks, technologies used in healthcare like cloud computing and big data, security considerations, example services and applications. Some benefits of IoT in healthcare include cost reduction, improved treatment, and faster disease diagnosis through continuous monitoring. Challenges include privacy, unauthorized access, and regulation. The scope of IoT in healthcare is growing as more hospitals invest in technology to help doctors and patients.
This document proposes an IoT-based smart ICU patient monitoring system that collects patient health data from various sensors. The system allows ICU supervisors to add patients and assign them doctors for treatment. It also allows doctors to view patient profiles and medical histories. Sensors measure vital signs like temperature, heart rate, oxygen levels and send this data to the cloud for analysis. The system is intended to help doctors monitor critically ill patients remotely and make timely treatment decisions. It aims to reduce workloads for medical staff and improve ICU patient care and safety.
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. .
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks.
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
This document discusses security issues in using mobile cloud computing for pervasive healthcare monitoring systems. It first introduces how mobile devices and cloud computing are being used to remotely monitor patient health metrics. However, transmitting sensitive patient data over networks poses security and privacy risks. The document then examines different approaches for securing such systems, including using encryption keys for authentication and communication protection between wireless sensor nodes, hospitals, and mobile apps. It also discusses challenges in securing data and devices across the various tiers of healthcare cloud and mobile computing architectures. Overall, the document analyzes how security can be improved for remote mobile healthcare monitoring systems that leverage cloud-based approaches.
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...IJECEIAES
This summarizes a document describing a real-time heart pulse monitoring system using a wireless sensor network and mobile application. The proposed system measures a patient's heart pulse using an infrared sensor. It then amplifies and filters the signal before sending it over a network using an Arduino board and Ethernet shield. The heart pulse values are displayed on both a computer-based and smartphone-based application in real-time. The system was tested on 10 people of varying ages, genders, and health statuses, and the results were within normal heart pulse ranges according to medical standards.
Depiction of Body area network in Cloud EnvironmentIdris Ahmed
This document discusses combining body area networks (BANs) with cloud computing for medical applications. BANs use sensors placed on the body to monitor health metrics and transmit the data wirelessly. Combining BANs with cloud computing could address issues with BANs like limited storage and security by storing data remotely in the cloud. The document outlines the components of BANs, challenges of integrating them with cloud computing like security and power consumption, and potential solutions and applications of this approach like remote healthcare monitoring and increased data access.
KARE – A Patent Protected AI based Technology into Hospital and Healthcare IIJSRJournal
Artificial Intelligence (AI) is a technology that, when linked with healthcare apps and smart wearable devices, can anticipate the onset of health issues in users by gathering and analyzing their health data. The integration of AI with smart wearable devices offers a wide range of potential applications in smart healthcare, however there is an issue with the black box operation of AI models' judgments, which has led in a lack of accountability and trust in the decisions made. In the field of healthcare, transparency, outcome tracing, and model improvement are all important. Healthcare providers can be more watchful and proactive in their interactions with patients thanks to the Internet of Things. Wheelchairs, defibrillators, nebulizers, oxygen pumps, and other monitoring devices are all tracked in real time utilizing IoT devices with sensors.
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET Journal
This document proposes a new IoT-based advanced healthcare architecture with remote monitoring capabilities. The architecture includes new sensors for data collection, a fog computing layer for efficient storage and real-time analysis, and disease prediction and location tracking features. Sensors continuously generate large amounts of heterogeneous data that is analyzed using machine learning algorithms to predict health conditions. Doctors and authorized users can monitor patients' health data through a website or mobile application. The system aims to improve healthcare quality by enabling real-time remote health monitoring, analysis, and automatic control of home appliances based on patients' needs.
Information technology in health care managementmohamedmoosa2
The document discusses various roles of information technology in healthcare management. It describes how IT helps with communication between devices, teams, patients and providers. It enables secure exchange of health information and establishes reputations as stewards of private data. The roles of IT include supporting accurate operations, quality care through reliable technology, and cost reductions through automation. IT specialists discussed include systems analysts, database managers, networking specialists and software programmers. Future IT jobs may involve areas like 3D printing, artificial intelligence and robotics. The document also lists major US and Indian healthcare information system companies.
This document discusses software reliability assessment in multi-cloud computing systems. It begins by defining multi-cloud computing and explaining the motivations for using multiple cloud providers. It then discusses the importance of software reliability and the impact failures can have. The document proposes a software reliability assessment lifecycle for multi-cloud systems including failure analysis, designing coping strategies, fault injection testing, monitoring live systems, and capturing unexpected faults. Finally, it provides recommendations for improving reliability in multi-cloud environments such as disaster recovery planning and security controls.
The document discusses an experimental study that investigated the effect of additives and raw rubber seed oil in biodiesel fuel blends used in a variable compression ratio diesel engine. Three fuel blends were tested: standard diesel, 20% jatropha biodiesel blended with diesel, and a mixture of 20% jatropha biodiesel, 5% diethyl ether additive, and 3ml raw rubber seed oil blended with diesel. The performance and exhaust emissions were evaluated and compared at different loads and a compression ratio of 16. The results showed that the biodiesel blends and mixture provided improvements in parameters like brake thermal efficiency and reductions in emissions like carbon monoxide and hydrocarbons compared to standard diesel.
Modified artificial immune system for single row facility layout problemIAEME Publication
The document describes a modified artificial immune system (MAIS) algorithm for solving the single row facility layout problem (SRFLP). The SRFLP involves arranging machines in a single row to minimize material handling costs. Existing artificial immune system (AIS) algorithms have slow convergence and weak stability. The proposed MAIS uses local search around memory antibodies to improve the AIS algorithm. Simulations show MAIS achieves better results than standard AIS. The MAIS is applied to three types of SRFLP - equal distance, zero distance, and different distance between machines. The objective is to minimize the total material handling cost.
There are a number of scopes for IoT in order to make a difference in lives of patients. The devices can capture as well as monitor related data regarding patient and allows the providers to obtain the insights without bringing the patients visiting. The procedure can assist the patient results as well as preventing the possible communications for the process that involves risk. However, lack of electronic health record (EHR) system integration is one of the major issues faced while using IoT in healthcare. Some of the EHR systems allow the patients importing data into the record. However, it remains limited to a few dominant where the EHR players as well as leaves providers unspecific of the processing data that can be helpful for the organization to use the process. The challenges for interoperability in order to keep data in distinctive medical devices depend on the purpose and ordering physician. by Vishal Dineshkumar Soni 2018. An IoT Based Patient Health Monitoring System. International Journal on Integrated Education. 1, 1 (Dec. 2018), 43-48. DOI:https://doi.org/10.31149/ijie.v1i1.481. https://journals.researchparks.org/index.php/IJIE/article/view/481/458 https://journals.researchparks.org/index.php/IJIE/article/view/481
Security and Privacy Protection of Medical Sensor Data of Patient using IOTIRJET Journal
This document proposes a patient health monitoring system using medical sensors and encryption to protect sensitive patient data. Key points:
- Medical sensors would collect physiological data like heartbeat from patients and send it over wireless networks to be stored.
- The system would encrypt each patient's data with RSA before sending it to separate files on a server. Only authorized doctors and administrators could access the encrypted data.
- The proposal compares the encryption algorithms RSA and Pailier to analyze their time complexities for securing medical sensor data transmitted over wireless networks.
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET Journal
This document describes a mobile application that provides remote healthcare services using data mining techniques. The application allows users to input symptoms and will then predict potential diseases, provide first aid recommendations, locate nearby hospitals, and book appointments with doctors. It is intended to help patients, health workers, and those in remote areas access healthcare services. The application protects patient privacy and includes access controls for data. It uses a knowledge-based model stored as a graph database to make diagnoses and recommendations by identifying relationships between diseases, symptoms, and information.
IRJET- IoT based Patient Health Monitoring using ESP8266IRJET Journal
This document describes an IoT-based patient health monitoring system using ESP8266 and Arduino. The system measures a patient's pulse rate using a pulse sensor and surrounding temperature using a temperature sensor. It continuously monitors these values and updates them to the IoT platform ThingSpeak. The sensor readings are also displayed on an LCD screen. The system aims to remotely monitor patient health and detect any abnormalities. This can help reduce strain on medical staff and improve access to healthcare.
IRJET- MedBlock System for Securing Medical RecordsIRJET Journal
This document proposes a blockchain-based system called MedBlock to securely store and share medical records. The system aims to address limitations in current healthcare record systems related to privacy, security and data sharing. MedBlock uses blockchain technology and encryption to securely record medical transactions in an immutable ledger. It allows doctors to upload encrypted medical records and patients to access and share records through decryption keys. The system architecture includes modules for doctors and patients. If implemented, MedBlock could provide more secure, private and tamper-proof management of healthcare data compared to traditional electronic medical record systems.
IRJET-A Survey on provide security to wireless medical sensor dataIRJET Journal
This document discusses providing security for wireless medical sensor data. It first reviews related work on securing wireless medical sensor networks using cryptosystems like Paillier and ElGamal. It then proposes a system that uses these cryptosystems to encrypt and distribute patient data across multiple data servers. This would preserve patient privacy as long as no single server is compromised. The system aims to allow medical analysis of distributed encrypted data without revealing individual patient information.
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
This document summarizes a research paper that proposes a cloud-based healthcare system for securely sharing medical data. It does the following:
1. It encrypts patient medical data using the NTRU encryption algorithm when transmitting it to nearby clouds for privacy.
2. It develops a trust model to help users select trustworthy partners to share stored medical data with in the cloud based on their similarity and compatibility.
3. It divides and encrypts users' medical data stored in the remote cloud into different categories to provide appropriate security protections.
4. It implements a deliberative intrusion detection system based on the cloud mesh structure to safeguard the large medical database in the remote cloud from malicious attacks.
This document discusses medical applications using IoT (Internet of Things) technology. It provides an overview of medical IoT, the need for medical IoT, and how it differs from e-health. It then discusses several medical IoT applications including personal health monitoring, smart hospitals, clinical data collection and integration, implants, remote health monitoring, smart health monitors, assistance for paralysis patients, and IoT applications in the pharmaceutical industry. Finally, it briefly describes a 4-layer healthcare model for IoT and some of the hardware and software used to implement this model.
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET Journal
This document summarizes a research paper on a health monitoring system using IoT and Arduino Uno. The system measures body temperature and pulse rate using sensors interfaced with an Arduino board. Wireless data transmission is done through an ESP8266 WiFi module to an IoT platform called ThingSpeak. The collected sensor data is stored on the ThingSpeak server and can be viewed by authorized users. The system aims to provide easy and affordable health monitoring to address issues like lack of resources and doctors in rural areas. It reduces the time and cost of regular health checkups.
This document provides an overview of Internet of Things (IoT) applications in healthcare. It discusses the dimensions and characteristics ("7 Vs") of IoT, healthcare networks and frameworks, technologies used in healthcare like cloud computing and big data, security considerations, example services and applications. Some benefits of IoT in healthcare include cost reduction, improved treatment, and faster disease diagnosis through continuous monitoring. Challenges include privacy, unauthorized access, and regulation. The scope of IoT in healthcare is growing as more hospitals invest in technology to help doctors and patients.
This document proposes an IoT-based smart ICU patient monitoring system that collects patient health data from various sensors. The system allows ICU supervisors to add patients and assign them doctors for treatment. It also allows doctors to view patient profiles and medical histories. Sensors measure vital signs like temperature, heart rate, oxygen levels and send this data to the cloud for analysis. The system is intended to help doctors monitor critically ill patients remotely and make timely treatment decisions. It aims to reduce workloads for medical staff and improve ICU patient care and safety.
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks. .
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEijdpsjournal
Internet of Things (IoT) technology is used to enhance the safety of the elderly living in smart home environments and to help their caregivers. The daily behaviour of the elderly people is collected using IoT sensors and then evaluated to detect any abnormal behaviour. This research paper analyzes the smart
home based anomaly detection system from a security perspective, to answer the question whether it is reliable and secure enough to leave elderly people alone in their smart homes. In this direction comparative analysis of literature is done to identify the potential security breaches on all layers of an IoT device. Further, this paper proposes a secure smart home model, built using Cisco Packet Tracer to simulate a network of IoT devices in a smart home environment. Consequently, a list of security countermeasures is proposed to protect the IoT devices from the identified attacks.
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET Journal
This document discusses security issues in using mobile cloud computing for pervasive healthcare monitoring systems. It first introduces how mobile devices and cloud computing are being used to remotely monitor patient health metrics. However, transmitting sensitive patient data over networks poses security and privacy risks. The document then examines different approaches for securing such systems, including using encryption keys for authentication and communication protection between wireless sensor nodes, hospitals, and mobile apps. It also discusses challenges in securing data and devices across the various tiers of healthcare cloud and mobile computing architectures. Overall, the document analyzes how security can be improved for remote mobile healthcare monitoring systems that leverage cloud-based approaches.
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...IJECEIAES
This summarizes a document describing a real-time heart pulse monitoring system using a wireless sensor network and mobile application. The proposed system measures a patient's heart pulse using an infrared sensor. It then amplifies and filters the signal before sending it over a network using an Arduino board and Ethernet shield. The heart pulse values are displayed on both a computer-based and smartphone-based application in real-time. The system was tested on 10 people of varying ages, genders, and health statuses, and the results were within normal heart pulse ranges according to medical standards.
Depiction of Body area network in Cloud EnvironmentIdris Ahmed
This document discusses combining body area networks (BANs) with cloud computing for medical applications. BANs use sensors placed on the body to monitor health metrics and transmit the data wirelessly. Combining BANs with cloud computing could address issues with BANs like limited storage and security by storing data remotely in the cloud. The document outlines the components of BANs, challenges of integrating them with cloud computing like security and power consumption, and potential solutions and applications of this approach like remote healthcare monitoring and increased data access.
KARE – A Patent Protected AI based Technology into Hospital and Healthcare IIJSRJournal
Artificial Intelligence (AI) is a technology that, when linked with healthcare apps and smart wearable devices, can anticipate the onset of health issues in users by gathering and analyzing their health data. The integration of AI with smart wearable devices offers a wide range of potential applications in smart healthcare, however there is an issue with the black box operation of AI models' judgments, which has led in a lack of accountability and trust in the decisions made. In the field of healthcare, transparency, outcome tracing, and model improvement are all important. Healthcare providers can be more watchful and proactive in their interactions with patients thanks to the Internet of Things. Wheelchairs, defibrillators, nebulizers, oxygen pumps, and other monitoring devices are all tracked in real time utilizing IoT devices with sensors.
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET Journal
This document proposes a new IoT-based advanced healthcare architecture with remote monitoring capabilities. The architecture includes new sensors for data collection, a fog computing layer for efficient storage and real-time analysis, and disease prediction and location tracking features. Sensors continuously generate large amounts of heterogeneous data that is analyzed using machine learning algorithms to predict health conditions. Doctors and authorized users can monitor patients' health data through a website or mobile application. The system aims to improve healthcare quality by enabling real-time remote health monitoring, analysis, and automatic control of home appliances based on patients' needs.
Information technology in health care managementmohamedmoosa2
The document discusses various roles of information technology in healthcare management. It describes how IT helps with communication between devices, teams, patients and providers. It enables secure exchange of health information and establishes reputations as stewards of private data. The roles of IT include supporting accurate operations, quality care through reliable technology, and cost reductions through automation. IT specialists discussed include systems analysts, database managers, networking specialists and software programmers. Future IT jobs may involve areas like 3D printing, artificial intelligence and robotics. The document also lists major US and Indian healthcare information system companies.
This document discusses software reliability assessment in multi-cloud computing systems. It begins by defining multi-cloud computing and explaining the motivations for using multiple cloud providers. It then discusses the importance of software reliability and the impact failures can have. The document proposes a software reliability assessment lifecycle for multi-cloud systems including failure analysis, designing coping strategies, fault injection testing, monitoring live systems, and capturing unexpected faults. Finally, it provides recommendations for improving reliability in multi-cloud environments such as disaster recovery planning and security controls.
The document discusses an experimental study that investigated the effect of additives and raw rubber seed oil in biodiesel fuel blends used in a variable compression ratio diesel engine. Three fuel blends were tested: standard diesel, 20% jatropha biodiesel blended with diesel, and a mixture of 20% jatropha biodiesel, 5% diethyl ether additive, and 3ml raw rubber seed oil blended with diesel. The performance and exhaust emissions were evaluated and compared at different loads and a compression ratio of 16. The results showed that the biodiesel blends and mixture provided improvements in parameters like brake thermal efficiency and reductions in emissions like carbon monoxide and hydrocarbons compared to standard diesel.
Modified artificial immune system for single row facility layout problemIAEME Publication
The document describes a modified artificial immune system (MAIS) algorithm for solving the single row facility layout problem (SRFLP). The SRFLP involves arranging machines in a single row to minimize material handling costs. Existing artificial immune system (AIS) algorithms have slow convergence and weak stability. The proposed MAIS uses local search around memory antibodies to improve the AIS algorithm. Simulations show MAIS achieves better results than standard AIS. The MAIS is applied to three types of SRFLP - equal distance, zero distance, and different distance between machines. The objective is to minimize the total material handling cost.
This document proposes a dynamic data storage and placement system that divides data by category and stores it on nodes assigned to those categories. It then replicates data based on access history, popularity, and a calculated replication factor formula. This is intended to reduce access time, total storage costs, and improve memory utilization compared to the standard Hadoop distributed file system. The system architecture and algorithm for category-based storage and popularity-based replication are then described.
This document discusses the history and evolution of open source software. It begins by defining open source software as software with source code available under an open source license allowing anyone to use, modify, and distribute the software. It then summarizes the key events in open source software's history, including the development of the open source model in response to the free software movement and Netscape's 1998 release of source code for their Netscape Communicator browser. Finally, it discusses the founding of the Open Source Initiative in 1998 to promote open source principles and clarify the benefits of open development models over closed, proprietary software systems.
An expert system was designed to assist manufacturing industries in making make-or-buy decisions for parts and products. The system considers factors like available technology, production capacity, and the costs of in-house manufacturing versus outsourcing. It evaluates parts lists to determine which parts can be manufactured internally based on these constraints. The parts are sorted by potential cost savings, and capacity is allocated to the parts that provide the greatest savings. Parts that exceed remaining capacity are designated to be outsourced. The system was tested on a valve manufacturing industry and was able to make make-or-buy decisions in a timely manner based on the defined criteria.
1. Two similar double slope solar stills were constructed, with one having fins attached to the basin liner to enhance heat transfer.
2. It was observed that the daily distillate output of the finned basin solar still was 18% higher than the conventional still without fins.
3. Temperature differences between the basin and glass cover were also higher for the finned still, increasing both daytime and nighttime productivity compared to the conventional still.
1. The document describes the design, analysis, and fabrication of a pneumatic material handling system. It discusses various components of the system including feeders, blowers, conveying pipes, and filtration units.
2. Key factors in designing pneumatic conveying systems are discussed such as material properties, carrier medium properties, pipe material properties, and system geometry. Care must be taken to account for these parameters.
3. The working of pneumatic conveying systems is explained. Air movers supply air to move material through venturi feeders, pipes, and cyclones for filtration before being deposited. Different system types like induction, pressure, closed-loop, and vacuum are described.
This study investigated the use of washed bottom ash (WBA) as a partial replacement for fine aggregate in concrete. Cubes, cylinders, and prisms were cast with WBA replacing 0-50% of fine aggregate to test mechanical properties at 14 and 28 days. Results showed that compressive and flexural strengths increased up to 10-20% replacement of WBA but decreased with higher replacements. The 28 day strengths were generally higher than 14 day strengths. The study concluded that WBA can effectively replace up to 20% of fine aggregate in normal strength concrete.
This document examines the relationship between corporate entrepreneurship and dynamic capabilities in selected pharmaceutical firms in Nigeria. A survey was administered to 420 employees across pharmaceutical firms to assess levels of innovative prowess, proactiveness, and risk-taking (measures of corporate entrepreneurship) and their effects on the firms' ability to learn, reconfigure resources, coordinate resources, and integrate resources (measures of dynamic capabilities). Statistical analysis found a strong positive relationship between corporate entrepreneurship and dynamic capabilities. Specifically, higher levels of employee innovative prowess, proactiveness, and risk-taking were correlated with stronger dynamic capabilities in the firms to adapt to changing market conditions. The study concludes that corporate entrepreneurship stimulates the development of dynamic capabilities that allow firms to
This document discusses reinforced aluminum matrix composites (DRA materials). It begins by providing background on DRA materials, which consist of an aluminum alloy matrix reinforced with ceramic particles. The document then focuses on the properties of the aluminum alloy matrix (Al-Zn-Mg-Cu system) and reinforcing phase (typically SiC) used in sintered DRA materials. It describes the microstructure and strengthening mechanisms of the aluminum alloy matrix, and production techniques like powder metallurgy used to improve the alloy's properties. Finally, it introduces the concept of balancing reinforcing phase composition, morphology and volume fraction to optimize mechanical properties versus cost.
The document summarizes research conducted to optimize the design of a connecting rod for a vehicle engine. The connecting rod was modeled using Pro-E software and analyzed using ANSYS to compare stresses and strength between the original aluminum design and an optimized design made of PEEK composite material. The analysis found the PEEK design reduced weight by approximately 46.7% while improving strength, with von Mises stress reduced by 0.18% and factor of safety increased by 23.76%. The optimized connecting rod design demonstrated improvements in weight and strength.
This document analyzes the facades of 18 different types of historical railway station buildings in Turkey built by German companies in the early 1900s as part of the Berlin-Bagdad railway project. The researchers created software using fractal geometry methods to objectively analyze the facades and identify similarities, rather than relying on subjective interpretations. The analysis found that while the stations were built in different plans, sizes and styles, there was a definite proportion in their facade designs. The software and fractal geometry methods can be applied to other architectural analyses and classifications.
This document describes using a two-layer fuzzy logic controller with a unified power flow controller to dampen tie-line power oscillations in an interconnected thermal power system. Conventionally, automatic generation control is performed using primary governor control and a secondary proportional-integral controller. However, this can still result in frequency and tie-line power transients during load disturbances. The document proposes using a UPFC along with a two-layer fuzzy logic controller to further improve damping. Simulation results indicate this approach reduces transients and achieves faster settling times.
The document presents a model of a Lean Operations Management System (LOMS) intended to address the missing link between using Lean tools and achieving a sustainable, continuously improving organization. The proposed LOMS model is based on an extensive literature review of Lean Manufacturing, operations management, and performance management systems. It aims to define an operations management system adapted for daily shop floor control and animation that enhances Lean leadership and culture. The model incorporates five key elements: customer satisfaction, internal processes performance, problem solving and learning, continuous improvement, and Genchi Genbutsu (going to see the actual situation firsthand). The goal of the LOMS model is to provide managers with a useful daily agenda for monitoring and measuring operations performance to help organizations fully
1. Tire manufacturing involves preparing rubber components, assembling them into raw tires, and vulcanizing the tires through heating and curing them in molds.
2. A major energy user is rubber compounding where ingredients are intensively mixed. Electric motors used account for 35-55% of total factory energy.
3. In curing, green tires are placed in molds and heated to around 200°C for 10 minutes using steam or hot water, chemically transforming the rubber through vulcanization. This process accounts for significant energy use.
1. The document discusses numerical combustion analysis and ignition timing optimization of a 4-stroke SI engine using computational fluid dynamics (CFD) and genetic algorithm (GA) optimization.
2. The researchers modeled the 2D combustion chamber geometry of a single cylinder 4-stroke SI engine in ANSYS. They conducted CFD analysis at different ignition timings and identified the optimal timing using GA.
3. The results showed that maximum brake torque, or timing (MBT), occurred at a spark advance angle of 39° before top dead center (TDC), which corresponds to 681° crank angle. This optimal timing was identified as producing the greatest gas pressure and torque.
The document discusses a study that analyzed 300 Acinetobacter samples collected from clinical samples in hospitals in Chennai, India. The samples were isolated and identified as Acinetobacter baumannii using traditional biochemical testing and confirmation with Vitek 2 system. Real-time PCR was used to identify carbapenem resistance genes by targeting the blaOXA-51-like gene. The study aimed to identify acquired antibiotic resistance genes in nosocomial multi-drug resistant A. baumannii isolates.
Smart Pill Reminder and Monitoring SystemIRJET Journal
This document describes a proposed smart pill reminder and monitoring system using IoT technology. The system uses an Arduino microcontroller connected to an IR sensor to detect when medication is taken from a pill box. An ESP module and Android app are used to update the caregiver on medication adherence. The proposed system aims to address limitations of existing methods by integrating additional components like the ESP module and buzzer to send alerts and save data in the cloud. This allows caregivers to remotely monitor patients and ensures medication is taken on schedule.
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
A Survey on provide security to wireless medical sensor dataIRJET Journal
This document summarizes a survey on providing security for wireless medical sensor data. The survey examines existing approaches that use cryptosystems like Paillier and ElGamal to securely distribute patient data across multiple data servers. This prevents privacy compromises if a single data server is breached. The proposed system would use these cryptosystems to encrypt patient data captured by wireless medical sensors and split the encrypted data across several data servers. This would allow analysis of patient data without compromising privacy as long as not all servers are compromised.
The worldwide network of internet of things (IOT) combined with advancements in sensor networks, FID and software platform connects objects of various application fields and technology. IOT is most commonly described as an ecosystem of technologies but it requires necessary components to enable communication between devices and objects. Components being RFID and sensors. Many organization have already implemented IOT. Healthcare industry too have adopted IOT and can be extensively used in the future for the benefit of patients, elderly people and caregivers. A new concept named 'Health Internet of Things (HIOT)' was proposed to exploit sensor technologies and wireless networks in monitoring medical conditions. Also advancements in E textile technologies make the textile multifunctional, adaptive and responsive system which combined with IOT performs functions such as communication, computation and health care benefits. Cloud is used to store, control and retrieve or transform or classify information. The use of cloud based application in healthcare industries is constantly growing to benefit patients so that they can monitor their health, store and share records. This paper aims at developing a dependable, productive, high performance and assured smart healthcare system to deliver service to patients avoiding health risks using e textile technologies
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET Journal
This document proposes an IoT-based smart ambulance system with fingerprint identification, medical record extraction, and traffic control. The system uses fingerprint scanning to identify accident victims and access their electronic health records to provide important medical information to emergency responders quickly. It also integrates traffic light control to help ambulances reach the hospital faster. The system is designed to address current limitations in accessing patient medical data in emergency situations outside of hospitals. Fingerprint identification is chosen due to its ease and accuracy compared to other biometrics. The system aims to save precious time for patients by expediting identification and treatment using a mobile solution that gives emergency technicians secure access to necessary patient health attributes via fingerprint authentication.
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
The article discusses international issues. It mentions that globalization has increased economic interdependence between nations while also raising tensions over immigration and trade. Solutions will require cooperation and compromise and a recognition that isolationism is not a viable strategy in an interconnected world.
IoT and machine learning (ML) are becoming increasingly efficient in the medical and telemedicine areas all around the world. This article describes a system that employs latest technology to give a more accurate method of forecasting disease. This technology uses sensors to collect data from the body of the patient. The obtained sensor information is collected with NodeMcU before being transferred to the Cloud Platform "ThinkSpeak" through an ESP8266 Wi-Fi module. ThinkSpeak is a cloud server that provides real-time data streams in the cloud. For the best results, data currently saved in the cloud is evaluated by one of the machine learning algorithms, the KNN algorithm. Based on the findings of the analysis and compared with the data sets, the disease is predicted and a prescription for the relevant disease is issued.
This document proposes an e-health cloud solution to securely store patient health records and reports in the cloud. Previously, patient documents were stored physically taking up space and making it difficult to access old records. The cloud solution aims to address these issues by digitizing records and storing them securely in the cloud. This allows easy access to records from anywhere and saves space. The document discusses challenges with healthcare cloud computing like data security and privacy. It proposes using encryption and multi-factor authentication for cloud data and user access security.
IRJET - IoT based Health Monitoring System and TelemedicineIRJET Journal
This document describes an IoT-based health monitoring system and telemedicine. The system uses wearable sensors to monitor patient vital signs like temperature, blood pressure, and heart rate. The sensor data is sent wirelessly via WiFi module and stored in the cloud. Doctors can access this data to monitor patients remotely. An alert is triggered if a critical condition is detected, sending an SMS via GSM to doctors or relatives. The system uses RSA encryption to securely transmit the sensitive health data over the internet.
This document summarizes literature on health care monitoring systems using wireless sensors and cloud storage. It discusses technologies like ZigBee, embedded microcontrollers, and Bluetooth that are used in wireless sensor networks to monitor patient vitals. The data collected is stored in the cloud and can be accessed by doctors. Challenges discussed include ensuring reliability, quality of service, security, and privacy of patient data. The literature proposes systems for continuous remote patient monitoring, early warning systems, and alerting doctors and caregivers of any issues.
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
Survey of IOT based Patient Health Monitoring Systemdbpublications
The Internet of things has provided a promising opportunity and applications for medical services is one of the most important way or solution for taking care of population which is in rapid growth. Internet of things consists of communication and sensors; wireless body area network is highly suitable tool for the medical IOT device. In this survey we discuss mainly on practical issues for implementation of WBAN to health care service tool for the medical devices. The IoT applications are key enabling technologies in industries. A main aim of this survey paper is that it summarizes the present state-of-the-art IOT in industries and also in workflow hospitals systematically. In recent years wide range of opportunity and powerful of IOT applications are developed in industry. The health monitoring system is a big challenge for several researchers. In this paper introduced on the survey of different IOT applications are used for the health monitoring system. The IoT applications are used to decrease the problems which are related to health care system.
Patient Health Monitoring System using IOTIRJET Journal
This document describes a patient health monitoring system using the Internet of Things. The system uses sensors to measure a patient's temperature, heart rate, and other vital signs. The sensor data is sent via Bluetooth or WiFi to an Android smartphone app. The app monitors for any abnormalities and will send alerts to the patient's doctor and relatives if issues are detected. The system aims to allow for continuous at-home monitoring of patients after they leave the hospital to help prevent health issues and speed up response times in emergencies.
This document proposes a secure e-health care system that allows registered users to analyze their health status, find disease details and treatment options. It involves a registration phase where patient data is encrypted and divided into two parts - one for photos and biometric information, and another for personal details. A digital health card is generated for each patient. Doctors can use decision trees to determine a patient's diagnosis or treatment. Hospitals can also use decision trees to help decide the best hospital for a patient's required treatment. The proposed system aims to securely share patient information over the web while maintaining privacy and confidentiality.
This document summarizes an intelligent mobile health monitoring system (IMHMS) that collects biomedical and environmental data from sensors, analyzes the data using an intelligent medical server, and provides medical feedback to patients through their mobile devices. The system aims to improve healthcare access and provide personalized health monitoring anywhere through integration of biosensors, wireless networks, and mobile computing. It discusses related works in mobile health monitoring and care. Key aspects of IMHMS include its system architecture, characteristics like long-term ambulatory monitoring and real-time updates, impact on healthcare research through data mining, and future directions like developing the intelligent medical server.
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...IRJET Journal
This document discusses the use of federated learning (FL) for privacy-preserving analysis of medical data from internet of things (IoT) devices. FL allows decentralized training of machine learning models on devices without moving sensitive patient data to a central location. The rise of IoT in healthcare is generating huge volumes of data but current AI approaches require aggregating data, raising privacy and security concerns. FL emerges as a solution by enabling decentralized and collaborative training while keeping data on devices. The document reviews literature on applying FL to clinical IoT applications and discusses how FL can address data isolation issues and perform AI tasks without compromising privacy.
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTijcisjournal
The emergence of the Internet of Things (IoT) has resulted in a significant increase in research on e-health.As the amount of patient data grows, it has become increasingly challenging to protect patients' privacy.Patient data is commonly stored in the cloud, making it difficult for users to control and protect their information. Moreover, the recent rise in security and surveillance breaches in the healthcare industry has
highlighted the need for a better approach to data storage and protection. Traditional models that rely on third-party control over patients' healthcare data are no longer reliable, as they have proven vulnerable to security breaches. To address these issues, blockchain technology has emerged as a promising solution.Blockchain-based protocols have the potential to provide a secure and efficient system for e-health applications that does not require trust in third-party intermediaries.
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSIJNSA Journal
The smart irrigation system represents an innovative approach to optimize water usage in agricultural and landscaping practices. The integration of cutting-edge technologies, including sensors, actuators, and data analysis, empowers this system to provide accurate monitoring and control of irrigation processes by leveraging real-time environmental conditions. The main objective of a smart irrigation system is to optimize water efficiency, minimize expenses, and foster the adoption of sustainable water management methods. This paper conducts a systematic risk assessment by exploring the key components/assets and their functionalities in the smart irrigation system. The crucial role of sensors in gathering data on soil moisture, weather patterns, and plant well-being is emphasized in this system. These sensors enable intelligent decision-making in irrigation scheduling and water distribution, leading to enhanced water efficiency and sustainable water management practices. Actuators enable automated control of irrigation devices, ensuring precise and targeted water delivery to plants. Additionally, the paper addresses the potential threat and vulnerabilities associated with smart irrigation systems. It discusses limitations of the system, such as power constraints and computational capabilities, and calculates the potential security risks. The paper suggests possible risk treatment methods for effective secure system operation. In conclusion, the paper emphasizes the significant benefits of implementing smart irrigation systems, including improved water conservation, increased crop yield, and reduced environmental impact. Additionally, based on the security analysis conducted, the paper recommends the implementation of countermeasures and security approaches to address vulnerabilities and ensure the integrity and reliability of the system. By incorporating these measures, smart irrigation technology can revolutionize water management practices in agriculture, promoting sustainability, resource efficiency, and safeguarding against potential security threats.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
2. Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 30 editor@iaeme.com
1. INTRODUCTION
Personalization can be defined as the modification of the nature of an activity where a
user is busy in or wants to get busy in the unique characteristics of the user and the
context within which the user currently resides. Personalization in telemedicine is
important since every patient's demands are different. Personalization healthcare
provides an opportunity to achieve more ardent treatment where issues can be
superscripted and hopefully be protected at earliest possible wink.
In the previous years, the mobile devices were hindering multi-purpose machines
which needed mounting, installing and few other steps. These devices failed in real
world healthcare scenarios, due their less compatibility. But now days the mobile
device allow us quicker access to any information and has made our means of access
very easy. The mobiles are playing vital role when it comes to healthcare business.
The facilities support number of users/patients to store their health data, personal data
and access it as and when needed. As the healthcare companies are empowering the
use of mobile computing devices whereas the logical step is apply an emphatic
method to nail down the security of data which being accessed onto these devices.
This security method involves implementing strong access controls at both the ends
i.e. at device level and at network levels.
Conventionally, privacy protection apparatus were applied by simply removing
client’s personal identity information or by using anonymization technique which
generally failed to serve as an effective way to deal with privacy of mobile Health
systems due to the increasing amount and assortment of personal ascribable
information. Personal identifiable information (PII) is basically any information,
which is recorded relating to an identifiable individual. Whereas any information,
which if linked to an identifiable individual, becomes personal in nature, be it
biological, biographical, genealogical, reputational. As we know, the scope of PII
might not necessarily be restricted to SSN (such as names), name and address, which
are generally considered as PII traditionally. Undeniably, the art re-identification
techniques [5], [6] have shown that any attribute could become personal identifiable
information in practice [3].
In this paper, we design an Intelligent Mobile Health Monitoring System. We first
identified the design problems on privacy preservation and provided our solutions. To
affluence the understanding, in our paper we start with the basic scheme, so that we
can easily identify the possible privacy rupture. We then provide an improvised
scheme by addressing the identified privacy problems.
2. LITERATUE SURVEY
Anterior years there was healthcare crisis for the tribal communities as there were
very less doctors and more number of patients which made situation difficult for the
patients as they had to wait for days to get a single appointment. According to the
paper [5], there was a need to have a contemporary approach to manage this
healthcare crisis. There was one such approach discussed was using telemedicine,
where the health of the patient was monitored primitively to improve the durability
and quality of life of the patients.
As the advancement in the telemedicine approach, [2] made various modified
approaches to improvise the healthcare services. In this, the components that
accomplish four distinct functions i.e. data assemblage and depot, data acumen, alert
proclamation, feedback, and newscasting. The BP and glucose sensors were used to
measure the patient’s current details; these sensors used custom built software to
3. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 31 editor@iaeme.com
transfer data from sensors to the mobile device of the patients. The Data which is
stored on the mobile was further transferred to the web server for further process. But
if the connection is low the data there itself is stored for the longer time waiting for
stronger connection to retransmit it.
According to [4], Parkinson’s disease (PD) is the second most common
neurodegenerative disorder after Alzheimer. The telemonitoring technique was also
used for PD, which heavily depends upon the design of simple tests that can be self-
conduction quickly and fortuitously. The data was collected using the Intel At-Home
Testing Device (AHTD), where telemonitoring system designed to aid remotely, and
Internet-enabled measurement of a variety of PD-related motor deterioration
symptoms. Then the data is collected at the patient’s home, disseminated over the
internet, and handled appropriately in the clinic to predict the UPDRS (Unified
Parkinson’s Disease Rating Scale) score.
In [10], the pervasive computing concept was considered. In this system, it
collected the patient’s physiological data through the bio-sensors. Then this data was
assembled in the sensor network and a curt of the collected data is diffused to the
patient's personal computer. The devices forwarded the respective data to the medical
servers for the further analysis. After the data was analyzed, the medical server
provided the feedback to the patient's personal computer. The patients could take
necessary actions depending upon the feedback. The system contains three
components: Wearable Body Sensor Network, Intelligent Medical Server and Patients
Personal Home Server.
All the telemonitoring system started making homes of the patient’s emplacement
of adding various flavor to the healthcare innovations. The increasing advancements
in the bio sensors, computing power and development of complexity algorithms are
simultaneously increasing the privacy problems of the patients. In [7] the author
discussed about the increasing of the patient’s emplacement of adding various flavor
to the healthcare innovations. The Intel Health Guide had integrated a considerable
number of privacy protections into the technology, providing security to both the
patient and health care provider. The concept Privacy protections begin with patient
consent to use the device. The security was developed into the health guide where
patient must enter 4 digit pin (personal identification number) before he/she uses the
cell phone/device. But the drawback was when the user received the device it was
booted by the provider of the device so the PIN was no more private. And even the
data shared between the user and the service provider was transmitted on the internet
which was encrypted using Secure Sockets Layer (SSL/TLS) technology.
Advancement to all this [1], the author discussed about storing the data on to the
cloud .The data stored on the cloud was in encrypted format and user was recognized
with the help of token generated for per user and supplied the respective tokens to the
user. The user could not access the data healthcare system until he enters the correct
token before every stride.
The above discussed systems had common problem where security was breached,
and the user details were not safe to be maintained, which might negatively influence
the user. These systems are overcome with the few more innovation in the concept of
healthcare and preserving data related to the user and the health related data in our
paper.
In this paper we design a mHealth system referring the concepts of described in
[1].To ease our understanding, we should start with basic scheme, so we can predict
the privacy breaches and provide an improved scheme to avoid these breach. The
4. Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 32 editor@iaeme.com
improved scheme allows the company (service provider) to work in offline or online
mode after the setup stage and supplies data to the cloud securely. We applied further
scheme by applying encryption technique once at the setup stage and then the
company plays no role in encryption and decryption, as it shifts the further task to the
cloud and the client side. This reduces the communicational and computational
burden.
3. SYSTEM MODEL, PRELIMINARIES AND SECURITY
3.1. System Model
To add in our previous discussion, we elaborate our intelligent mHealth system. It
consists of four parties: the company who acts as the health care service provider, a
semi trusted authority (TA) ,the individual client , and the cloud server (we can
simply say cloud) . The service provider stores its data or we can say program in an
encrypted format in cloud server. Here the cloud just acts a storage device. Individual
client collects its data while getting registered to the system. While storing this data it
gets transformed into attribute vectors. A semi trusted authority is responsible for
authenticating the user to use the system and distributing the private keys and the
tokens to the respective user. We consider a cloud server a neutral server as it neither
combines with TA nor with the service provider.
Our system can be broadly introduced in basic 4 steps: setup, store, tokengen, and
query. At very first time when system is initialized, the setup phase runs and thus
system parameters are published. Then the service provider initiates the mHealth
monitoring program also known as branching program (see part B.).This branching
program is further encrypted and then resulting cipher text is delivered to cloud for
storage, which corresponds to store algorithm.
The client accesses the mHealth system, by raising query to the cloud. When
client registers to the system for the very first time, TA approves the client and runs
the tokengen algorithm. The next time when client wishes to raise the query (which is
the attribute vector represented by collected health data), he initially sends the key to
the TA and then inputs the query and TA inputs the master secret algorithm. The
client receives the token for the corresponding query whereas TA gets no useful
information regarding the query.
In the last phase, the client sends the token in order to receive the perception from
the cloud which comes under the query phase. The query is resolved and perception is
sent to client in semi decrypted cipher text. The client then performs the decryption
task on the partially decrypted cipher text and obtains the final decisions provided by
the monitoring program on the cloud’s input query. The cloud also obtains no useful
information from the query raised by the client.
3.2. Preliminaries: Branching Program
Here, we will formally describe the branching programs [16], which includes
decision tree. For our ease we have only considered the binary branching program. A
private query protocol can be easily derived using this decision tree [1]. Let v be set
of attribute vectors of the client, v= {v1, v2, v3, v4…. vn}. Branching program is a
set of triple <{p1,p2…pk} , L, R> , where p is set of nodes in the branching program.
Each decision node is again a set of pair (ai, ti), where ai is attribute index and ti is the
threshold value. The ti is compared with v(ai) is compared at the node. For each
decision node i, L (i) is the index of the next node if v(ai) ≤ti; R (i) is the index of the
next node if v(ai) > ti. The label nodes are attached with classification information. To
5. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 33 editor@iaeme.com
evaluate the branching program on some attribute vector v, we start with p1. If v(a1)
≤t1, set h = L (1), else h = R(1). Repeat the process recursively for ph, and so on, until
one of the leaf nodes is reached with decision information [1].
To construct branching program introduced in MediNet project [17] [18].For
instance let us consider, “[Systolic BP: 150, Missed one medication=0 (indicating he
did miss the medication), Energy Expenditure: 900 kcal, salt intake: 1000
milligrams]” and the respective threshold is “t1 = 130,t2 = 0,t3 = 700 kcal,t4 = 1500”.
The recommendation returned from the monitoring program (Figure 2) would be “D4,
D5, D6” (by following the path through comparing each attribute element with the
respective threshold at each node), which indicates the clients need to “notify next
kin, modify daily diet, and take regular medication”. The health data related to the
input attribute vector can be sampled by the client.
Figure 1 Branching Program at the company level
3.3. Security: Encryption and Decryption technique
Encryption is a technique which is widely used to generate the cipher text.
Homomorphic encryption technique does the calculation on this encrypted data
without decrypting any of the cipher text. The Homomorphic encryption scheme was
proposed by Paillier cryptosystem [19], [20]. This encryption technique allows the
client to gain the token in response of the input of attribute vectors provided by TA.
Homomorphic encryption is generally used in cloud data storage as the data more
secure.
Decryption technique to MDRQ by using BF-IBE as shown in [22]. Using this
technique neither the TA nor the cloud gets any valuable information on client’s
decryption results.
3.4. Multi-dimensional range Query
We are using multi dimensional range query concept in our system, so that we can
access the data even if it is in encrypted format. The concept was firstly introduced by
Elaine Shi [21].In this system, the sender encrypts the message under range [r1,r2] or
even under the set of vector v, and a receiver can decrypt the message with the
6. Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 34 editor@iaeme.com
privacy key corresponding to the range [r1,r2]. The cipher text generated assures the
privacy of both the message content and the data under which the encryption was
performed.
In our system, we are using this concept similar to CAM [1], where MDRQ plays
a very important role. In this system we will be using BF-IBE [13] to develop MDRQ.
But MDRQ can also be build by using Anonymous Identity Based Encryption scheme
[14].If we compare normal IBE where only normal message is encrypted and made
secure, where as in A-IBE scheme it can hide the data as well as the sender receiver
information also. All the comparisons between the input vectors and the threshold at
an intermediate node are implemented by MDRQs. At every decision node attribute
vector ai, and their respective thresholds represented in two minimum root sets: [0, t1]
and [t1,max] as shown in Figure 1 .Every index of next decision node is encrypted
under the respective range.
3.5. Key private proxy re-encryption
We are using proxy re-encryption, which allows the proxy server to re-encryption key
to transform the cipher text (first level cipher text) encrypted for cloud storage into
second level cipher text, that could be decrypted by user without allowing proxy
obtain any useful information on the underlying message. In our system, the service
provider delivers the monitoring program to cloud in an encrypted format using
MDRQ scheme and then this cipher text is stored in an untrusted cloud. Than rekey
algorithm is run by TA instead of service provider and allows TA to encrypt the
cipher text stored in cloud.
4. PROPOSED WORK
4.1. Introduction
The MHM System tries to overcome the scenario which are discussed above in
literature survey where telemonitoring is done, the data is collected on the basis of
sensors, stored onto the device, transmitted to the service provider and accordingly the
feedback is reported to the user. To describe the fundamental idea we start with the
basic scheme and then show the flow of the system and final graphical representation
of the results and screenshots. The elite notion that buried the performance of the
system is the privacy which is very difficult to be breached in this system as
Hierarchical Identity based encryption is used to encrypt and decrypt the data. Using
this convoluted algorithm is one of the elite tasks to be performed. The system is
divided into multiple time slots generally known as “slots”. There can be N maximum
number of users, who are requesting to access the system. When a client attempts to
access the system, he is assigned an index, i ∈ [1, N] by Trusted authority.
4.2. System Architecture
4.2.1 Trusted Authority
The Trusted Authority (TA) is a web application where user is authenticated and
token is generated for every other user. Let us consider that user A is performing login
for the first time. The user won’t be able to access our monitoring system until the
he/she is not authenticated. We can say it acts as an arbiter between the user and the
data stored in cloud.
7. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 35 editor@iaeme.com
4.2.2. Service Provider
Service Provider creates branching program and stores the monitoring data (branching
program) in the cloud server in an encrypted format.
4.2.3. Mobile Users
An Android application is developed for the user which is will be operated as per all
other play store applications. Through this application a GUI interface will be
developed which will help user to access our health monitoring system and efficiently
resolve the user query [23].
4.2.4. Cloud Server
The data stored on the cloud is the data which is supplied by the user while creating
an account, token generated for respective user, the branching program done by the
service provider. The data collected and stored will always be stored in an encrypted
format.
The below steps are referred from [1].
Setup: This step is performed by TA.
Store: This is performed by the service provider also known as company. For every
node Kj, whose child nodes are not at all leaf nodes, the service provider runs CL(j) =
AnonEnc(id,PP,L(j)) and CR(j) = AnonEnc(id,PP,R(j)) , to encrypt the left and the
right child nodes indices under id with either id ∈ S[0,tj] or id ∈ S[tj+1,Max],
respectively (where PP is known as System parameters). And when the child nodes of
Kj have leaf nodes, then the service provider generates the cipher text
CL(j)=AnonEnc (id,PP,mL(j)) and CR(j)=AnonEnc(id,PP,mR(j)), where mL(j) and
mR(j) denote the attached information at the two leaf nodes. All the generated cipher
texts are delivered and stored in the cloud.
Tokengen: To generate the private for the attribute vectors v= (v1,v2,v3vn).The
user inputs every attribute which is represented in set v, and delivers all set to TA.
Than TA runs AnonExtract (id ,msk) function, through which all identity id ∈ Svi in
the identity set and delivers all the clients their respective private keys.
Query: A client raises the query, which is further sent to cloud to resolve. To run
the AnonDecryption algorithm on the ciphertext generated in the Store algorithm
client needs to send the private key set generated by TA to the cloud. The decryption
result decides which cipher text should be next decrypted to get proper results. The
decryption result decides whether next right node should be considered or the left one.
This process can be continued till it reaches the leaf node and gives the client attached
information.
4.3. Flow Diagram
The below diagram Figure 3, explains us the flow of our proposed system. The flow
explains us the flow of the data from user to TA to Cloud Server.
4.3.1. User Flow
The user registers himself through the GUI interface login page. If the user is
authenticated user he can easily raise the query in the system. But if the user is not
authenticated by the TA, he has to wait for it, till the TA logins and approves him as a
authenticated user.
8. Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 36 editor@iaeme.com
Figure 3 System Flow
4.3.2. Trusted Authority
When the setup is ready, and user registers for the very first time, the TA has to
approve the user and generate token for the respective user at least once. When the
user is authenticated user as we can see in the user flow that he is ready to access our
health monitoring system by raising the queries and other application details. The data
whichever is shared on the system is always stored on the Cloud Server in an
encrypted format .Also, whenever the user raises the query, with the help of branching
program stored on to cloud is responded back with the query results.
4.5. Algorithm
Algorithm: Proposed Algorithm
Setup (1⋋):
Output: PP(G,GT,q,g,y,Hi,i=1,2,3,4)
9. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 37 editor@iaeme.com
PP -> System Parameters
G,GT -> public groups
g -> random primitive root from G
Hi -> Cryptographic hash function
Extract (id, msk):
Output: skid=H1(id)msk
Encrypt (id, PP, m):
m ∊ M
Output: C= (c1,c2,c3)
With r=H3(m||σ)
C1=gr
C2= σ ⊕H2(e(H1(id),y)r
)
C3=m⊕H4(σ)
σ -> random element from M
Decrypt (C,skid):
σ=c2⊕H2(e(skid, c1))
m= c3⊕ H4(σ).
5. SECURITY AND EVALUATION ANALYSIS
5.1. Security
Here, we evaluate our proposed MHM system. We observed that no information is
gained by the company from either of the clients query and in addition to that cloud
also does not obtain any information related to the branching program generated by
the company as proxy re encryption technique is been used.
When the company loads the branching program on the cloud, the key privacy
makes sure that the cloud is all together unknown about the node, leaf nodes,
threshold values and the nodes. This mask privacy defeats the attacks on cloud data.
In addition to this, only the client knows the decisions to his raised query as the
results are directly supplied to the client. Moreover, TA and company have no clue
regarding the raised query and cannot get any information from it as it is masked with
the keys. Even the attackers attack on TA and company to fetch the information
related to the query will fail.
5.2. Evaluation
To implement our MHM system, we used a laptop with 2.27 GHz processor with a
3GB of RAM to simulate the cloud server and the company, and a mobile phone
(Android platform) with 2GHz processor with 512MB of RAM to simulate a client.
Figure 4 explains us that the company and cloud requires only 6.23 ms for encryption
and 10.076 ms for decryption process respectively when number of nodes in
branching program is 15.
10. Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 38 editor@iaeme.com
Encryption Time of two algorithms in milliseconds
Decryption Time of two algorithms in milliseconds
Figure 4 Comparison of two algorithms used for encryption & decryption our design
Figure 5 Tokengen algorithm time cost for individual client
Timerequiredinmilliseconds
No. of nodes in branching program
TimeRequiredInMilliseconds
No. of nodes in branching program
Timerequiredin
11. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 39 editor@iaeme.com
(a)
(b)
(c)
Figure 6 Some screenshots of the implementation (a) Creation of Branching program (b)
Uploading of Branching program in encrypted format(c) Decisions supplied to client on
raised query
13. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 41 editor@iaeme.com
[13] Boneh, D. and Franklin, M. K. Identity-based encryption from the weil pairing, in
CRYPTO, 2001, pp. 213–229.
[14] Boyen, X. and Waters, B. Anonymous hierarchical identity-based encryption
(without random oracles), in CRYPTO, 2006, pp. 290–307.
[15] Narayanan, A. and Shmatikov, V. Myths and fallacies of personally identifiable
information. Communications of the ACM, 53(6), 2010 pp. 24–26.
[16] Brickell, J., Porter, D., Shmatikov, V. and Witchel, E. Privacy-preserving remote
diagnostics, in Proceedings of the 14th ACM conference on Computer and
communications security. ACM, 2007, pp. 498–507.
[17] Mohan, P., Marin, D., Sultan, S. and Deen, A. Medinet: personalizing the self-
care process for patients with diabetes and cardiovascular disease using mobile
telephony, in Engineering in Medicine and Biology Society, 2008. EMBS 2008.
30th Annual International Conference of the IEEE. IEEE, 2008, pp. 755–758.
[18] Farmer, A., Gibson, O., Hayton, P., Bryden, K., Dudley, C., Neil, A. and
Tarassenko, L. A real-time, mobile phone-based telemedicine system to support
young adults with type 1 diabetes. Informatics in primary care, 13(3), 2005, pp.
171–178.
[19] Paillier, P. Public-key cryptosystems based on composite degree residuosity
classes, in EUROCRYPT, 1999, pp. 223–238.
[20] Damgard, I. and Jurik, M. A generalisation, a simplification and some
applications of paillier’s probabilistic public-key system, in Public Key
Cryptography, ser. Lecture Notes in Computer Science, Kim, K., ed., Vol. 1992.
Springer, 2001, pp. 119–136.
[21] Shi, E., Bethencourt, J., Chan, H. T.-H., Song, D. X. and Perrig, A. Multi-
dimensional range query over encrypted data, in IEEE Symposium on Security
and Privacy, 2007, pp. 350–364.
[22] Green, M., Hohenberger, S. and Waters, B. Outsourcing the decryption of abe
ciphertexts, in Usenix Security, 2011.
[23] Ahmed, M. , Yousef, S. and Aboud, S. J. Bidirectional Search Routing Protocol
For Mobile Ad Hoc Networks. International Journal of Computer Engineering &
Technology, 4(1), 2013, pp. 229–243.
[24] Boneh, D., Boyen, X. and Goh, E. -J. Hierarchical Identity Based Encryption
with Constant Size Ciphertext, in Advances in Cryptology—EURO-CRYPT,
Springer, 2005, pages 440–456.
[25] Kumar, P. and Gahlan, P. A Minimum Process Synchronous Checkpointing
Algorithm For Mobile Distributed System International journal of Computer
Engineering & Technology, 1(1), 2010, pp. 72–81