SlideShare a Scribd company logo
http://www.iaeme.com/IJCET/index.asp 29 editor@iaeme.com
International Journal of Computer Engineering & Technology (IJCET)
Volume 6, Issue 6, Jun 2015, pp. 29-41, Article ID: IJCET_06_06_004
Available online at
http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=6
ISSN Print: 0976-6367 and ISSN Online: 0976–6375
© IAEME Publication
___________________________________________________________________________
SECURITY OF HEALTHCARE DATA AT
REST IN CLOUD WITH MOBILE HEALTH
MONITORING SYSTEM
Nikhita N. Nerkar
Department of Computer Engineering,
RMD Sinhgad School of Engineering, Warje, Pune-58, India
Prof. Vina M. Lomte
Assistant Professor, Department of Computer Engineering,
RMD Sinhgad School of Engineering, Warje, Pune-58, India
ABSTRACT
Mobile health (mHealth) monitoring using Cloud, applies the common
mobile communications and cloud computing technologies to provide
feedback decision support, which has been considered as a new approach to
improve the quality of healthcare service while lowering the healthcare cost.
Unfortunately it is also at a position of serious risk on both clients/ mobile
user’s privacy and intellectual property of monitoring service providers,
which could prevent the wide adoption of mHealth technology. Mobile health
monitoring system provides an ease of efficient information flow and security
to information from user to the company (our system) and vice versa. The
system is used to monitor the health parameters of the user and stratify the
user queries. The client, trusted authority, the company and server are
unaware of parameters passed in the network. For security purpose we
implemented Identity Based Encryption. Further in this paper we will see the
improvised usage of algorithm which we have implemented i.e. Hierarchical
Identity Based Encryption. The system promises authentication, ease of use
and cost effective. The goal of the proposed system to make it more users
friendly and provide salvation of the data.
Key words: Mobile Health Monitoring, Security, Identity Based Encryption,
Hierarchical Identity Based Encryption, Authentication
Cite this Article: Nerkar, N. N. and Prof. Lomte, V. M. Security of
Healthcare Data at Rest In Cloud with Mobile Health Monitoring System.
International Journal of Computer Engineering and Technology, 6(6), 2015,
pp. 29-41.
http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=6
_____________________________________________________________________
Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 30 editor@iaeme.com
1. INTRODUCTION
Personalization can be defined as the modification of the nature of an activity where a
user is busy in or wants to get busy in the unique characteristics of the user and the
context within which the user currently resides. Personalization in telemedicine is
important since every patient's demands are different. Personalization healthcare
provides an opportunity to achieve more ardent treatment where issues can be
superscripted and hopefully be protected at earliest possible wink.
In the previous years, the mobile devices were hindering multi-purpose machines
which needed mounting, installing and few other steps. These devices failed in real
world healthcare scenarios, due their less compatibility. But now days the mobile
device allow us quicker access to any information and has made our means of access
very easy. The mobiles are playing vital role when it comes to healthcare business.
The facilities support number of users/patients to store their health data, personal data
and access it as and when needed. As the healthcare companies are empowering the
use of mobile computing devices whereas the logical step is apply an emphatic
method to nail down the security of data which being accessed onto these devices.
This security method involves implementing strong access controls at both the ends
i.e. at device level and at network levels.
Conventionally, privacy protection apparatus were applied by simply removing
client’s personal identity information or by using anonymization technique which
generally failed to serve as an effective way to deal with privacy of mobile Health
systems due to the increasing amount and assortment of personal ascribable
information. Personal identifiable information (PII) is basically any information,
which is recorded relating to an identifiable individual. Whereas any information,
which if linked to an identifiable individual, becomes personal in nature, be it
biological, biographical, genealogical, reputational. As we know, the scope of PII
might not necessarily be restricted to SSN (such as names), name and address, which
are generally considered as PII traditionally. Undeniably, the art re-identification
techniques [5], [6] have shown that any attribute could become personal identifiable
information in practice [3].
In this paper, we design an Intelligent Mobile Health Monitoring System. We first
identified the design problems on privacy preservation and provided our solutions. To
affluence the understanding, in our paper we start with the basic scheme, so that we
can easily identify the possible privacy rupture. We then provide an improvised
scheme by addressing the identified privacy problems.
2. LITERATUE SURVEY
Anterior years there was healthcare crisis for the tribal communities as there were
very less doctors and more number of patients which made situation difficult for the
patients as they had to wait for days to get a single appointment. According to the
paper [5], there was a need to have a contemporary approach to manage this
healthcare crisis. There was one such approach discussed was using telemedicine,
where the health of the patient was monitored primitively to improve the durability
and quality of life of the patients.
As the advancement in the telemedicine approach, [2] made various modified
approaches to improvise the healthcare services. In this, the components that
accomplish four distinct functions i.e. data assemblage and depot, data acumen, alert
proclamation, feedback, and newscasting. The BP and glucose sensors were used to
measure the patient’s current details; these sensors used custom built software to
Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 31 editor@iaeme.com
transfer data from sensors to the mobile device of the patients. The Data which is
stored on the mobile was further transferred to the web server for further process. But
if the connection is low the data there itself is stored for the longer time waiting for
stronger connection to retransmit it.
According to [4], Parkinson’s disease (PD) is the second most common
neurodegenerative disorder after Alzheimer. The telemonitoring technique was also
used for PD, which heavily depends upon the design of simple tests that can be self-
conduction quickly and fortuitously. The data was collected using the Intel At-Home
Testing Device (AHTD), where telemonitoring system designed to aid remotely, and
Internet-enabled measurement of a variety of PD-related motor deterioration
symptoms. Then the data is collected at the patient’s home, disseminated over the
internet, and handled appropriately in the clinic to predict the UPDRS (Unified
Parkinson’s Disease Rating Scale) score.
In [10], the pervasive computing concept was considered. In this system, it
collected the patient’s physiological data through the bio-sensors. Then this data was
assembled in the sensor network and a curt of the collected data is diffused to the
patient's personal computer. The devices forwarded the respective data to the medical
servers for the further analysis. After the data was analyzed, the medical server
provided the feedback to the patient's personal computer. The patients could take
necessary actions depending upon the feedback. The system contains three
components: Wearable Body Sensor Network, Intelligent Medical Server and Patients
Personal Home Server.
All the telemonitoring system started making homes of the patient’s emplacement
of adding various flavor to the healthcare innovations. The increasing advancements
in the bio sensors, computing power and development of complexity algorithms are
simultaneously increasing the privacy problems of the patients. In [7] the author
discussed about the increasing of the patient’s emplacement of adding various flavor
to the healthcare innovations. The Intel Health Guide had integrated a considerable
number of privacy protections into the technology, providing security to both the
patient and health care provider. The concept Privacy protections begin with patient
consent to use the device. The security was developed into the health guide where
patient must enter 4 digit pin (personal identification number) before he/she uses the
cell phone/device. But the drawback was when the user received the device it was
booted by the provider of the device so the PIN was no more private. And even the
data shared between the user and the service provider was transmitted on the internet
which was encrypted using Secure Sockets Layer (SSL/TLS) technology.
Advancement to all this [1], the author discussed about storing the data on to the
cloud .The data stored on the cloud was in encrypted format and user was recognized
with the help of token generated for per user and supplied the respective tokens to the
user. The user could not access the data healthcare system until he enters the correct
token before every stride.
The above discussed systems had common problem where security was breached,
and the user details were not safe to be maintained, which might negatively influence
the user. These systems are overcome with the few more innovation in the concept of
healthcare and preserving data related to the user and the health related data in our
paper.
In this paper we design a mHealth system referring the concepts of described in
[1].To ease our understanding, we should start with basic scheme, so we can predict
the privacy breaches and provide an improved scheme to avoid these breach. The
Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 32 editor@iaeme.com
improved scheme allows the company (service provider) to work in offline or online
mode after the setup stage and supplies data to the cloud securely. We applied further
scheme by applying encryption technique once at the setup stage and then the
company plays no role in encryption and decryption, as it shifts the further task to the
cloud and the client side. This reduces the communicational and computational
burden.
3. SYSTEM MODEL, PRELIMINARIES AND SECURITY
3.1. System Model
To add in our previous discussion, we elaborate our intelligent mHealth system. It
consists of four parties: the company who acts as the health care service provider, a
semi trusted authority (TA) ,the individual client , and the cloud server (we can
simply say cloud) . The service provider stores its data or we can say program in an
encrypted format in cloud server. Here the cloud just acts a storage device. Individual
client collects its data while getting registered to the system. While storing this data it
gets transformed into attribute vectors. A semi trusted authority is responsible for
authenticating the user to use the system and distributing the private keys and the
tokens to the respective user. We consider a cloud server a neutral server as it neither
combines with TA nor with the service provider.
Our system can be broadly introduced in basic 4 steps: setup, store, tokengen, and
query. At very first time when system is initialized, the setup phase runs and thus
system parameters are published. Then the service provider initiates the mHealth
monitoring program also known as branching program (see part B.).This branching
program is further encrypted and then resulting cipher text is delivered to cloud for
storage, which corresponds to store algorithm.
The client accesses the mHealth system, by raising query to the cloud. When
client registers to the system for the very first time, TA approves the client and runs
the tokengen algorithm. The next time when client wishes to raise the query (which is
the attribute vector represented by collected health data), he initially sends the key to
the TA and then inputs the query and TA inputs the master secret algorithm. The
client receives the token for the corresponding query whereas TA gets no useful
information regarding the query.
In the last phase, the client sends the token in order to receive the perception from
the cloud which comes under the query phase. The query is resolved and perception is
sent to client in semi decrypted cipher text. The client then performs the decryption
task on the partially decrypted cipher text and obtains the final decisions provided by
the monitoring program on the cloud’s input query. The cloud also obtains no useful
information from the query raised by the client.
3.2. Preliminaries: Branching Program
Here, we will formally describe the branching programs [16], which includes
decision tree. For our ease we have only considered the binary branching program. A
private query protocol can be easily derived using this decision tree [1]. Let v be set
of attribute vectors of the client, v= {v1, v2, v3, v4…. vn}. Branching program is a
set of triple <{p1,p2…pk} , L, R> , where p is set of nodes in the branching program.
Each decision node is again a set of pair (ai, ti), where ai is attribute index and ti is the
threshold value. The ti is compared with v(ai) is compared at the node. For each
decision node i, L (i) is the index of the next node if v(ai) ≤ti; R (i) is the index of the
next node if v(ai) > ti. The label nodes are attached with classification information. To
Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 33 editor@iaeme.com
evaluate the branching program on some attribute vector v, we start with p1. If v(a1)
≤t1, set h = L (1), else h = R(1). Repeat the process recursively for ph, and so on, until
one of the leaf nodes is reached with decision information [1].
To construct branching program introduced in MediNet project [17] [18].For
instance let us consider, “[Systolic BP: 150, Missed one medication=0 (indicating he
did miss the medication), Energy Expenditure: 900 kcal, salt intake: 1000
milligrams]” and the respective threshold is “t1 = 130,t2 = 0,t3 = 700 kcal,t4 = 1500”.
The recommendation returned from the monitoring program (Figure 2) would be “D4,
D5, D6” (by following the path through comparing each attribute element with the
respective threshold at each node), which indicates the clients need to “notify next
kin, modify daily diet, and take regular medication”. The health data related to the
input attribute vector can be sampled by the client.
Figure 1 Branching Program at the company level
3.3. Security: Encryption and Decryption technique
Encryption is a technique which is widely used to generate the cipher text.
Homomorphic encryption technique does the calculation on this encrypted data
without decrypting any of the cipher text. The Homomorphic encryption scheme was
proposed by Paillier cryptosystem [19], [20]. This encryption technique allows the
client to gain the token in response of the input of attribute vectors provided by TA.
Homomorphic encryption is generally used in cloud data storage as the data more
secure.
Decryption technique to MDRQ by using BF-IBE as shown in [22]. Using this
technique neither the TA nor the cloud gets any valuable information on client’s
decryption results.
3.4. Multi-dimensional range Query
We are using multi dimensional range query concept in our system, so that we can
access the data even if it is in encrypted format. The concept was firstly introduced by
Elaine Shi [21].In this system, the sender encrypts the message under range [r1,r2] or
even under the set of vector v, and a receiver can decrypt the message with the
Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 34 editor@iaeme.com
privacy key corresponding to the range [r1,r2]. The cipher text generated assures the
privacy of both the message content and the data under which the encryption was
performed.
In our system, we are using this concept similar to CAM [1], where MDRQ plays
a very important role. In this system we will be using BF-IBE [13] to develop MDRQ.
But MDRQ can also be build by using Anonymous Identity Based Encryption scheme
[14].If we compare normal IBE where only normal message is encrypted and made
secure, where as in A-IBE scheme it can hide the data as well as the sender receiver
information also. All the comparisons between the input vectors and the threshold at
an intermediate node are implemented by MDRQs. At every decision node attribute
vector ai, and their respective thresholds represented in two minimum root sets: [0, t1]
and [t1,max] as shown in Figure 1 .Every index of next decision node is encrypted
under the respective range.
3.5. Key private proxy re-encryption
We are using proxy re-encryption, which allows the proxy server to re-encryption key
to transform the cipher text (first level cipher text) encrypted for cloud storage into
second level cipher text, that could be decrypted by user without allowing proxy
obtain any useful information on the underlying message. In our system, the service
provider delivers the monitoring program to cloud in an encrypted format using
MDRQ scheme and then this cipher text is stored in an untrusted cloud. Than rekey
algorithm is run by TA instead of service provider and allows TA to encrypt the
cipher text stored in cloud.
4. PROPOSED WORK
4.1. Introduction
The MHM System tries to overcome the scenario which are discussed above in
literature survey where telemonitoring is done, the data is collected on the basis of
sensors, stored onto the device, transmitted to the service provider and accordingly the
feedback is reported to the user. To describe the fundamental idea we start with the
basic scheme and then show the flow of the system and final graphical representation
of the results and screenshots. The elite notion that buried the performance of the
system is the privacy which is very difficult to be breached in this system as
Hierarchical Identity based encryption is used to encrypt and decrypt the data. Using
this convoluted algorithm is one of the elite tasks to be performed. The system is
divided into multiple time slots generally known as “slots”. There can be N maximum
number of users, who are requesting to access the system. When a client attempts to
access the system, he is assigned an index, i ∈ [1, N] by Trusted authority.
4.2. System Architecture
4.2.1 Trusted Authority
The Trusted Authority (TA) is a web application where user is authenticated and
token is generated for every other user. Let us consider that user A is performing login
for the first time. The user won’t be able to access our monitoring system until the
he/she is not authenticated. We can say it acts as an arbiter between the user and the
data stored in cloud.
Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 35 editor@iaeme.com
4.2.2. Service Provider
Service Provider creates branching program and stores the monitoring data (branching
program) in the cloud server in an encrypted format.
4.2.3. Mobile Users
An Android application is developed for the user which is will be operated as per all
other play store applications. Through this application a GUI interface will be
developed which will help user to access our health monitoring system and efficiently
resolve the user query [23].
4.2.4. Cloud Server
The data stored on the cloud is the data which is supplied by the user while creating
an account, token generated for respective user, the branching program done by the
service provider. The data collected and stored will always be stored in an encrypted
format.
The below steps are referred from [1].
Setup: This step is performed by TA.
Store: This is performed by the service provider also known as company. For every
node Kj, whose child nodes are not at all leaf nodes, the service provider runs CL(j) =
AnonEnc(id,PP,L(j)) and CR(j) = AnonEnc(id,PP,R(j)) , to encrypt the left and the
right child nodes indices under id with either id ∈ S[0,tj] or id ∈ S[tj+1,Max],
respectively (where PP is known as System parameters). And when the child nodes of
Kj have leaf nodes, then the service provider generates the cipher text
CL(j)=AnonEnc (id,PP,mL(j)) and CR(j)=AnonEnc(id,PP,mR(j)), where mL(j) and
mR(j) denote the attached information at the two leaf nodes. All the generated cipher
texts are delivered and stored in the cloud.
Tokengen: To generate the private for the attribute vectors v= (v1,v2,v3vn).The
user inputs every attribute which is represented in set v, and delivers all set to TA.
Than TA runs AnonExtract (id ,msk) function, through which all identity id ∈ Svi in
the identity set and delivers all the clients their respective private keys.
Query: A client raises the query, which is further sent to cloud to resolve. To run
the AnonDecryption algorithm on the ciphertext generated in the Store algorithm
client needs to send the private key set generated by TA to the cloud. The decryption
result decides which cipher text should be next decrypted to get proper results. The
decryption result decides whether next right node should be considered or the left one.
This process can be continued till it reaches the leaf node and gives the client attached
information.
4.3. Flow Diagram
The below diagram Figure 3, explains us the flow of our proposed system. The flow
explains us the flow of the data from user to TA to Cloud Server.
4.3.1. User Flow
The user registers himself through the GUI interface login page. If the user is
authenticated user he can easily raise the query in the system. But if the user is not
authenticated by the TA, he has to wait for it, till the TA logins and approves him as a
authenticated user.
Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 36 editor@iaeme.com
Figure 3 System Flow
4.3.2. Trusted Authority
When the setup is ready, and user registers for the very first time, the TA has to
approve the user and generate token for the respective user at least once. When the
user is authenticated user as we can see in the user flow that he is ready to access our
health monitoring system by raising the queries and other application details. The data
whichever is shared on the system is always stored on the Cloud Server in an
encrypted format .Also, whenever the user raises the query, with the help of branching
program stored on to cloud is responded back with the query results.
4.5. Algorithm
Algorithm: Proposed Algorithm
Setup (1⋋):
Output: PP(G,GT,q,g,y,Hi,i=1,2,3,4)
Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 37 editor@iaeme.com
PP -> System Parameters
G,GT -> public groups
g -> random primitive root from G
Hi -> Cryptographic hash function
Extract (id, msk):
Output: skid=H1(id)msk
Encrypt (id, PP, m):
m ∊ M
Output: C= (c1,c2,c3)
With r=H3(m||σ)
C1=gr
C2= σ ⊕H2(e(H1(id),y)r
)
C3=m⊕H4(σ)
σ -> random element from M
Decrypt (C,skid):
σ=c2⊕H2(e(skid, c1))
m= c3⊕ H4(σ).
5. SECURITY AND EVALUATION ANALYSIS
5.1. Security
Here, we evaluate our proposed MHM system. We observed that no information is
gained by the company from either of the clients query and in addition to that cloud
also does not obtain any information related to the branching program generated by
the company as proxy re encryption technique is been used.
When the company loads the branching program on the cloud, the key privacy
makes sure that the cloud is all together unknown about the node, leaf nodes,
threshold values and the nodes. This mask privacy defeats the attacks on cloud data.
In addition to this, only the client knows the decisions to his raised query as the
results are directly supplied to the client. Moreover, TA and company have no clue
regarding the raised query and cannot get any information from it as it is masked with
the keys. Even the attackers attack on TA and company to fetch the information
related to the query will fail.
5.2. Evaluation
To implement our MHM system, we used a laptop with 2.27 GHz processor with a
3GB of RAM to simulate the cloud server and the company, and a mobile phone
(Android platform) with 2GHz processor with 512MB of RAM to simulate a client.
Figure 4 explains us that the company and cloud requires only 6.23 ms for encryption
and 10.076 ms for decryption process respectively when number of nodes in
branching program is 15.
Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 38 editor@iaeme.com
Encryption Time of two algorithms in milliseconds
Decryption Time of two algorithms in milliseconds
Figure 4 Comparison of two algorithms used for encryption & decryption our design
Figure 5 Tokengen algorithm time cost for individual client
Timerequiredinmilliseconds
No. of nodes in branching program
TimeRequiredInMilliseconds
No. of nodes in branching program
Timerequiredin
Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 39 editor@iaeme.com
(a)
(b)
(c)
Figure 6 Some screenshots of the implementation (a) Creation of Branching program (b)
Uploading of Branching program in encrypted format(c) Decisions supplied to client on
raised query
Nikhita N. Nerkar and Prof. Vina M. Lomte
http://www.iaeme.com/IJCET/index.asp 40 editor@iaeme.com
6. CONCLUSION
In this paper, we proposed a improvised version of Mobile Health monitoring System,
which enables client to have an interactive application by providing various decisions
related to the disease symptoms raised in form of query. The system along with it
provides privacy to the user details and medical data. To apply privacy to the client
data we have used IBE and also the evaluated the security performance by applying
HIBE instead of IBE. We have highlighted what kind of encryption approach and
methods are reasonable for maintaining between the data security and performance
tradeoff. For both cloud user and provider’ perspective, our proposed integrated data
encryption architecture is practically helpful in reducing data security and privacy risk
in cloud environment.
REFERENCES
[1] Lin, H., Shao, J. Zhang, C. and Fang, Y. CAM: Cloud-Assisted Privacy
Preserving Mobile Health Monitoring. IEEE Tranasctions On Image Processing,
8(6), 2013.
[2] Mohan, P., Marin, D., Sultan, S. and Deen, A. Medinet: personalizing the self-
care process for patients with diabetes and cardiovascular disease using mobile
telephony. Conference Proceedings of the International Conference of IEEE
Engineering in Medicine and Biology Society, Vol. 2008 (3). Pp. 755–758.
http://www.ncbi.nlm.nih.gov/pubmed/19162765
[3] Clifford, G. and Clifton, D. Wireless technology in disease management and
medicine. Annual Review of Medicine, 63, 2012, pp. 479–492.
[4] Tsanas, A., Little, M. A., McSharry, P. E. and Ramig, L. O. Accurate
telemonitoring of Parkinson’s disease progression by non-invasive speech tests.
Non-invasive telemonitoring of Parkinson’s disease, Tsanas et al., 2009
[5] Becker, S. A., Sugumaran, R. and Northern, K. P. The Use of Mobile Technology
for Proactive Healthcare in Tribal Communities
[6] Kinshu, K., Chang, M. Graf, S. and Yang, G. Adaptivity and Personalization in
Mobile Learning © 2010 Old City Publishing, Inc. Published by license under the
OCP Science imprint, a member of the Old City Publishing Group Tech., Inst.,
Cognition and Learning, Vol. 8, pp. 163–174
[7] Cavoukian, A., Fisher, A., Killen, S. and Hoffman, D. Remote home health care
technologies: how to ensure privacy? build it in: Privacy by design. Identity in the
Information Society, 3(2), 2010 pp. 363–378.
[8] Fernandez, E. B. Security in data intensive computing systems, in Handbook of
Data Intensive Computing, 2011, pp. 447–466.
[9] Independently conducted by Ponemon Institute LLC, Data Loss Risks During
Downsizing As Employees Exit, so does Corporate Data Publication Date:
February 23, 2009 Sponsored by Symantec Corporation
[10] Shahriyar, R. Bari, M. F., Kundu, G., Ahamed, S. I. and Akbar, M. M. Intelligent
Mobile Health Monitoring System (IMHMS). International Journal of Control
and Automation, 2(3) September 2009.
[11] A White Paper by the HIMSS Mobile Security Work Group Security of Mobile
Computing Devices in the Healthcare Environment © 2011 Healthcare
Information and Management Systems Society (HIMSS)
[12] Mobile Computing in Healthcare: Privacy and Security Considerations and
Available Resources NIST/OCR Conference – June 6, 2012
Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System
http://www.iaeme.com/IJCET/index.asp 41 editor@iaeme.com
[13] Boneh, D. and Franklin, M. K. Identity-based encryption from the weil pairing, in
CRYPTO, 2001, pp. 213–229.
[14] Boyen, X. and Waters, B. Anonymous hierarchical identity-based encryption
(without random oracles), in CRYPTO, 2006, pp. 290–307.
[15] Narayanan, A. and Shmatikov, V. Myths and fallacies of personally identifiable
information. Communications of the ACM, 53(6), 2010 pp. 24–26.
[16] Brickell, J., Porter, D., Shmatikov, V. and Witchel, E. Privacy-preserving remote
diagnostics, in Proceedings of the 14th ACM conference on Computer and
communications security. ACM, 2007, pp. 498–507.
[17] Mohan, P., Marin, D., Sultan, S. and Deen, A. Medinet: personalizing the self-
care process for patients with diabetes and cardiovascular disease using mobile
telephony, in Engineering in Medicine and Biology Society, 2008. EMBS 2008.
30th Annual International Conference of the IEEE. IEEE, 2008, pp. 755–758.
[18] Farmer, A., Gibson, O., Hayton, P., Bryden, K., Dudley, C., Neil, A. and
Tarassenko, L. A real-time, mobile phone-based telemedicine system to support
young adults with type 1 diabetes. Informatics in primary care, 13(3), 2005, pp.
171–178.
[19] Paillier, P. Public-key cryptosystems based on composite degree residuosity
classes, in EUROCRYPT, 1999, pp. 223–238.
[20] Damgard, I. and Jurik, M. A generalisation, a simplification and some
applications of paillier’s probabilistic public-key system, in Public Key
Cryptography, ser. Lecture Notes in Computer Science, Kim, K., ed., Vol. 1992.
Springer, 2001, pp. 119–136.
[21] Shi, E., Bethencourt, J., Chan, H. T.-H., Song, D. X. and Perrig, A. Multi-
dimensional range query over encrypted data, in IEEE Symposium on Security
and Privacy, 2007, pp. 350–364.
[22] Green, M., Hohenberger, S. and Waters, B. Outsourcing the decryption of abe
ciphertexts, in Usenix Security, 2011.
[23] Ahmed, M. , Yousef, S. and Aboud, S. J. Bidirectional Search Routing Protocol
For Mobile Ad Hoc Networks. International Journal of Computer Engineering &
Technology, 4(1), 2013, pp. 229–243.
[24] Boneh, D., Boyen, X. and Goh, E. -J. Hierarchical Identity Based Encryption
with Constant Size Ciphertext, in Advances in Cryptology—EURO-CRYPT,
Springer, 2005, pages 440–456.
[25] Kumar, P. and Gahlan, P. A Minimum Process Synchronous Checkpointing
Algorithm For Mobile Distributed System International journal of Computer
Engineering & Technology, 1(1), 2010, pp. 72–81

More Related Content

What's hot

An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring System
SubmissionResearchpa
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
IRJET Journal
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare Service
IRJET Journal
 
IRJET- IoT based Patient Health Monitoring using ESP8266
IRJET-  	  IoT based Patient Health Monitoring using ESP8266IRJET-  	  IoT based Patient Health Monitoring using ESP8266
IRJET- IoT based Patient Health Monitoring using ESP8266
IRJET Journal
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
IRJET Journal
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
IRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
 
Medical applications using io t
Medical applications using io tMedical applications using io t
Medical applications using io t
KPR INSTITUE OF ENGINEERING AND TECHNOLOGY
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET Journal
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
khalidhassan105
 
IRJET- Smart ICU using IoT
IRJET- Smart ICU using IoTIRJET- Smart ICU using IoT
IRJET- Smart ICU using IoT
IRJET Journal
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
ijdpsjournal
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
ijdpsjournal
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET Journal
 
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
IJECEIAES
 
Depiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud EnvironmentDepiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud Environment
Idris Ahmed
 
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
IIJSRJournal
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET Journal
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
mohamedmoosa2
 

What's hot (19)

An IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring SystemAn IoT Based Patient Health Monitoring System
An IoT Based Patient Health Monitoring System
 
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOTSecurity and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare Service
 
IRJET- IoT based Patient Health Monitoring using ESP8266
IRJET-  	  IoT based Patient Health Monitoring using ESP8266IRJET-  	  IoT based Patient Health Monitoring using ESP8266
IRJET- IoT based Patient Health Monitoring using ESP8266
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
Medical applications using io t
Medical applications using io tMedical applications using io t
Medical applications using io t
 
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno MicrocontrollerIRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
IRJET- Health Monitoring System using IoT using Arduino Uno Microcontroller
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
 
IRJET- Smart ICU using IoT
IRJET- Smart ICU using IoTIRJET- Smart ICU using IoT
IRJET- Smart ICU using IoT
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLEDESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
DESIGN AND ANALYSIS OF SECURE SMART HOME FOR ELDERLY PEOPLE
 
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...IRJET-  	  A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
IRJET- A Survey on-Security for using Pervasive Healthcare Monitoring Sys...
 
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
Real-time Heart Pulse Monitoring Technique Using Wireless Sensor Network and ...
 
Depiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud EnvironmentDepiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud Environment
 
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare KARE – A Patent Protected AI based Technology into Hospital and Healthcare
KARE – A Patent Protected AI based Technology into Hospital and Healthcare
 
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New ApproachIRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
 
Information technology in health care management
Information technology in health care managementInformation technology in health care management
Information technology in health care management
 

Viewers also liked

Ijcet 06 07_005
Ijcet 06 07_005Ijcet 06 07_005
Ijcet 06 07_005
IAEME Publication
 
Ijaret 06 08_002
Ijaret 06 08_002Ijaret 06 08_002
Ijaret 06 08_002
IAEME Publication
 
Modified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemModified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problem
IAEME Publication
 
Ijcet 06 06_002
Ijcet 06 06_002Ijcet 06 06_002
Ijcet 06 06_002
IAEME Publication
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
IAEME Publication
 
Ijaret 06 07_010
Ijaret 06 07_010Ijaret 06 07_010
Ijaret 06 07_010
IAEME Publication
 
Ijmet 06 07_003
Ijmet 06 07_003Ijmet 06 07_003
Ijmet 06 07_003
IAEME Publication
 
Ijmet 06 08_002
Ijmet 06 08_002Ijmet 06 08_002
Ijmet 06 08_002
IAEME Publication
 
Ijciet 06 08_001
Ijciet 06 08_001Ijciet 06 08_001
Ijciet 06 08_001
IAEME Publication
 
Ijm 06 09_013
Ijm 06 09_013Ijm 06 09_013
Ijm 06 09_013
IAEME Publication
 
Ijmet 06 07_008
Ijmet 06 07_008Ijmet 06 07_008
Ijmet 06 07_008
IAEME Publication
 
Ijmet 06 07_007
Ijmet 06 07_007Ijmet 06 07_007
Ijmet 06 07_007
IAEME Publication
 
Ijciet 06 09_016
Ijciet 06 09_016Ijciet 06 09_016
Ijciet 06 09_016
IAEME Publication
 
Optimal reservoir operation for irrigation of crops using genetic algorithm a...
Optimal reservoir operation for irrigation of crops using genetic algorithm a...Optimal reservoir operation for irrigation of crops using genetic algorithm a...
Optimal reservoir operation for irrigation of crops using genetic algorithm a...
IAEME Publication
 
Ijeet 06 08_005
Ijeet 06 08_005Ijeet 06 08_005
Ijeet 06 08_005
IAEME Publication
 
Ijm 06 09_002
Ijm 06 09_002Ijm 06 09_002
Ijm 06 09_002
IAEME Publication
 
Ijmet 06 09_011
Ijmet 06 09_011Ijmet 06 09_011
Ijmet 06 09_011
IAEME Publication
 
Ijmet 06 09_005
Ijmet 06 09_005Ijmet 06 09_005
Ijmet 06 09_005
IAEME Publication
 
Ijaret 06 10_015
Ijaret 06 10_015Ijaret 06 10_015
Ijaret 06 10_015
IAEME Publication
 

Viewers also liked (19)

Ijcet 06 07_005
Ijcet 06 07_005Ijcet 06 07_005
Ijcet 06 07_005
 
Ijaret 06 08_002
Ijaret 06 08_002Ijaret 06 08_002
Ijaret 06 08_002
 
Modified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problemModified artificial immune system for single row facility layout problem
Modified artificial immune system for single row facility layout problem
 
Ijcet 06 06_002
Ijcet 06 06_002Ijcet 06 06_002
Ijcet 06 06_002
 
Ijcet 06 08_001
Ijcet 06 08_001Ijcet 06 08_001
Ijcet 06 08_001
 
Ijaret 06 07_010
Ijaret 06 07_010Ijaret 06 07_010
Ijaret 06 07_010
 
Ijmet 06 07_003
Ijmet 06 07_003Ijmet 06 07_003
Ijmet 06 07_003
 
Ijmet 06 08_002
Ijmet 06 08_002Ijmet 06 08_002
Ijmet 06 08_002
 
Ijciet 06 08_001
Ijciet 06 08_001Ijciet 06 08_001
Ijciet 06 08_001
 
Ijm 06 09_013
Ijm 06 09_013Ijm 06 09_013
Ijm 06 09_013
 
Ijmet 06 07_008
Ijmet 06 07_008Ijmet 06 07_008
Ijmet 06 07_008
 
Ijmet 06 07_007
Ijmet 06 07_007Ijmet 06 07_007
Ijmet 06 07_007
 
Ijciet 06 09_016
Ijciet 06 09_016Ijciet 06 09_016
Ijciet 06 09_016
 
Optimal reservoir operation for irrigation of crops using genetic algorithm a...
Optimal reservoir operation for irrigation of crops using genetic algorithm a...Optimal reservoir operation for irrigation of crops using genetic algorithm a...
Optimal reservoir operation for irrigation of crops using genetic algorithm a...
 
Ijeet 06 08_005
Ijeet 06 08_005Ijeet 06 08_005
Ijeet 06 08_005
 
Ijm 06 09_002
Ijm 06 09_002Ijm 06 09_002
Ijm 06 09_002
 
Ijmet 06 09_011
Ijmet 06 09_011Ijmet 06 09_011
Ijmet 06 09_011
 
Ijmet 06 09_005
Ijmet 06 09_005Ijmet 06 09_005
Ijmet 06 09_005
 
Ijaret 06 10_015
Ijaret 06 10_015Ijaret 06 10_015
Ijaret 06 10_015
 

Similar to Ijcet 06 06_004

Smart Pill Reminder and Monitoring System
Smart Pill Reminder and Monitoring SystemSmart Pill Reminder and Monitoring System
Smart Pill Reminder and Monitoring System
IRJET Journal
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
eSAT Journals
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
IRJET Journal
 
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRICEXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
AM Publications,India
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
KSAravindSrivastava
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
 
Advanced Patient Monitoring System with Diseases Prediction System using Mach...
Advanced Patient Monitoring System with Diseases Prediction System using Mach...Advanced Patient Monitoring System with Diseases Prediction System using Mach...
Advanced Patient Monitoring System with Diseases Prediction System using Mach...
Associate Professor in VSB Coimbatore
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET Journal
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
BRNSSPublicationHubI
 
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfJanuary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
IJCNCJournal
 
An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...
Made Artha
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
YogeshIJTSRD
 
Survey of IOT based Patient Health Monitoring System
Survey of IOT based Patient Health Monitoring SystemSurvey of IOT based Patient Health Monitoring System
Survey of IOT based Patient Health Monitoring System
dbpublications
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOT
IRJET Journal
 
Secure E- Health Care Model
Secure E- Health Care ModelSecure E- Health Care Model
Secure E- Health Care Model
IOSR Journals
 
2
22
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
IRJET Journal
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
ijcisjournal
 

Similar to Ijcet 06 06_004 (20)

Smart Pill Reminder and Monitoring System
Smart Pill Reminder and Monitoring SystemSmart Pill Reminder and Monitoring System
Smart Pill Reminder and Monitoring System
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRICEXTEMPORIZING HEALTHCARE USING SMART FABRIC
EXTEMPORIZING HEALTHCARE USING SMART FABRIC
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...IRJET -  	  IoT Based Smart Ambulance with Information Extraction and Traffic...
IRJET - IoT Based Smart Ambulance with Information Extraction and Traffic...
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Advanced Patient Monitoring System with Diseases Prediction System using Mach...
Advanced Patient Monitoring System with Diseases Prediction System using Mach...Advanced Patient Monitoring System with Diseases Prediction System using Mach...
Advanced Patient Monitoring System with Diseases Prediction System using Mach...
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
IRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and TelemedicineIRJET - IoT based Health Monitoring System and Telemedicine
IRJET - IoT based Health Monitoring System and Telemedicine
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
 
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdfJanuary_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
January_2024 Top 10 Read Articles in Computer Networks & Communications.pdf
 
An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Survey of IOT based Patient Health Monitoring System
Survey of IOT based Patient Health Monitoring SystemSurvey of IOT based Patient Health Monitoring System
Survey of IOT based Patient Health Monitoring System
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOT
 
Secure E- Health Care Model
Secure E- Health Care ModelSecure E- Health Care Model
Secure E- Health Care Model
 
2
22
2
 
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
FEDERAL LEARNING BASED SOLUTIONS FOR PRIVACY AND ANONYMITY IN INTERNET OF MED...
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
VICTOR MAESTRE RAMIREZ
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 

Recently uploaded (20)

Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student MemberIEEE Aerospace and Electronic Systems Society as a Graduate Student Member
IEEE Aerospace and Electronic Systems Society as a Graduate Student Member
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 

Ijcet 06 06_004

  • 1. http://www.iaeme.com/IJCET/index.asp 29 editor@iaeme.com International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 6, Jun 2015, pp. 29-41, Article ID: IJCET_06_06_004 Available online at http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=6 ISSN Print: 0976-6367 and ISSN Online: 0976–6375 © IAEME Publication ___________________________________________________________________________ SECURITY OF HEALTHCARE DATA AT REST IN CLOUD WITH MOBILE HEALTH MONITORING SYSTEM Nikhita N. Nerkar Department of Computer Engineering, RMD Sinhgad School of Engineering, Warje, Pune-58, India Prof. Vina M. Lomte Assistant Professor, Department of Computer Engineering, RMD Sinhgad School of Engineering, Warje, Pune-58, India ABSTRACT Mobile health (mHealth) monitoring using Cloud, applies the common mobile communications and cloud computing technologies to provide feedback decision support, which has been considered as a new approach to improve the quality of healthcare service while lowering the healthcare cost. Unfortunately it is also at a position of serious risk on both clients/ mobile user’s privacy and intellectual property of monitoring service providers, which could prevent the wide adoption of mHealth technology. Mobile health monitoring system provides an ease of efficient information flow and security to information from user to the company (our system) and vice versa. The system is used to monitor the health parameters of the user and stratify the user queries. The client, trusted authority, the company and server are unaware of parameters passed in the network. For security purpose we implemented Identity Based Encryption. Further in this paper we will see the improvised usage of algorithm which we have implemented i.e. Hierarchical Identity Based Encryption. The system promises authentication, ease of use and cost effective. The goal of the proposed system to make it more users friendly and provide salvation of the data. Key words: Mobile Health Monitoring, Security, Identity Based Encryption, Hierarchical Identity Based Encryption, Authentication Cite this Article: Nerkar, N. N. and Prof. Lomte, V. M. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System. International Journal of Computer Engineering and Technology, 6(6), 2015, pp. 29-41. http://www.iaeme.com/IJCET/issues.asp?JTypeIJCET&VType=6&IType=6 _____________________________________________________________________
  • 2. Nikhita N. Nerkar and Prof. Vina M. Lomte http://www.iaeme.com/IJCET/index.asp 30 editor@iaeme.com 1. INTRODUCTION Personalization can be defined as the modification of the nature of an activity where a user is busy in or wants to get busy in the unique characteristics of the user and the context within which the user currently resides. Personalization in telemedicine is important since every patient's demands are different. Personalization healthcare provides an opportunity to achieve more ardent treatment where issues can be superscripted and hopefully be protected at earliest possible wink. In the previous years, the mobile devices were hindering multi-purpose machines which needed mounting, installing and few other steps. These devices failed in real world healthcare scenarios, due their less compatibility. But now days the mobile device allow us quicker access to any information and has made our means of access very easy. The mobiles are playing vital role when it comes to healthcare business. The facilities support number of users/patients to store their health data, personal data and access it as and when needed. As the healthcare companies are empowering the use of mobile computing devices whereas the logical step is apply an emphatic method to nail down the security of data which being accessed onto these devices. This security method involves implementing strong access controls at both the ends i.e. at device level and at network levels. Conventionally, privacy protection apparatus were applied by simply removing client’s personal identity information or by using anonymization technique which generally failed to serve as an effective way to deal with privacy of mobile Health systems due to the increasing amount and assortment of personal ascribable information. Personal identifiable information (PII) is basically any information, which is recorded relating to an identifiable individual. Whereas any information, which if linked to an identifiable individual, becomes personal in nature, be it biological, biographical, genealogical, reputational. As we know, the scope of PII might not necessarily be restricted to SSN (such as names), name and address, which are generally considered as PII traditionally. Undeniably, the art re-identification techniques [5], [6] have shown that any attribute could become personal identifiable information in practice [3]. In this paper, we design an Intelligent Mobile Health Monitoring System. We first identified the design problems on privacy preservation and provided our solutions. To affluence the understanding, in our paper we start with the basic scheme, so that we can easily identify the possible privacy rupture. We then provide an improvised scheme by addressing the identified privacy problems. 2. LITERATUE SURVEY Anterior years there was healthcare crisis for the tribal communities as there were very less doctors and more number of patients which made situation difficult for the patients as they had to wait for days to get a single appointment. According to the paper [5], there was a need to have a contemporary approach to manage this healthcare crisis. There was one such approach discussed was using telemedicine, where the health of the patient was monitored primitively to improve the durability and quality of life of the patients. As the advancement in the telemedicine approach, [2] made various modified approaches to improvise the healthcare services. In this, the components that accomplish four distinct functions i.e. data assemblage and depot, data acumen, alert proclamation, feedback, and newscasting. The BP and glucose sensors were used to measure the patient’s current details; these sensors used custom built software to
  • 3. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System http://www.iaeme.com/IJCET/index.asp 31 editor@iaeme.com transfer data from sensors to the mobile device of the patients. The Data which is stored on the mobile was further transferred to the web server for further process. But if the connection is low the data there itself is stored for the longer time waiting for stronger connection to retransmit it. According to [4], Parkinson’s disease (PD) is the second most common neurodegenerative disorder after Alzheimer. The telemonitoring technique was also used for PD, which heavily depends upon the design of simple tests that can be self- conduction quickly and fortuitously. The data was collected using the Intel At-Home Testing Device (AHTD), where telemonitoring system designed to aid remotely, and Internet-enabled measurement of a variety of PD-related motor deterioration symptoms. Then the data is collected at the patient’s home, disseminated over the internet, and handled appropriately in the clinic to predict the UPDRS (Unified Parkinson’s Disease Rating Scale) score. In [10], the pervasive computing concept was considered. In this system, it collected the patient’s physiological data through the bio-sensors. Then this data was assembled in the sensor network and a curt of the collected data is diffused to the patient's personal computer. The devices forwarded the respective data to the medical servers for the further analysis. After the data was analyzed, the medical server provided the feedback to the patient's personal computer. The patients could take necessary actions depending upon the feedback. The system contains three components: Wearable Body Sensor Network, Intelligent Medical Server and Patients Personal Home Server. All the telemonitoring system started making homes of the patient’s emplacement of adding various flavor to the healthcare innovations. The increasing advancements in the bio sensors, computing power and development of complexity algorithms are simultaneously increasing the privacy problems of the patients. In [7] the author discussed about the increasing of the patient’s emplacement of adding various flavor to the healthcare innovations. The Intel Health Guide had integrated a considerable number of privacy protections into the technology, providing security to both the patient and health care provider. The concept Privacy protections begin with patient consent to use the device. The security was developed into the health guide where patient must enter 4 digit pin (personal identification number) before he/she uses the cell phone/device. But the drawback was when the user received the device it was booted by the provider of the device so the PIN was no more private. And even the data shared between the user and the service provider was transmitted on the internet which was encrypted using Secure Sockets Layer (SSL/TLS) technology. Advancement to all this [1], the author discussed about storing the data on to the cloud .The data stored on the cloud was in encrypted format and user was recognized with the help of token generated for per user and supplied the respective tokens to the user. The user could not access the data healthcare system until he enters the correct token before every stride. The above discussed systems had common problem where security was breached, and the user details were not safe to be maintained, which might negatively influence the user. These systems are overcome with the few more innovation in the concept of healthcare and preserving data related to the user and the health related data in our paper. In this paper we design a mHealth system referring the concepts of described in [1].To ease our understanding, we should start with basic scheme, so we can predict the privacy breaches and provide an improved scheme to avoid these breach. The
  • 4. Nikhita N. Nerkar and Prof. Vina M. Lomte http://www.iaeme.com/IJCET/index.asp 32 editor@iaeme.com improved scheme allows the company (service provider) to work in offline or online mode after the setup stage and supplies data to the cloud securely. We applied further scheme by applying encryption technique once at the setup stage and then the company plays no role in encryption and decryption, as it shifts the further task to the cloud and the client side. This reduces the communicational and computational burden. 3. SYSTEM MODEL, PRELIMINARIES AND SECURITY 3.1. System Model To add in our previous discussion, we elaborate our intelligent mHealth system. It consists of four parties: the company who acts as the health care service provider, a semi trusted authority (TA) ,the individual client , and the cloud server (we can simply say cloud) . The service provider stores its data or we can say program in an encrypted format in cloud server. Here the cloud just acts a storage device. Individual client collects its data while getting registered to the system. While storing this data it gets transformed into attribute vectors. A semi trusted authority is responsible for authenticating the user to use the system and distributing the private keys and the tokens to the respective user. We consider a cloud server a neutral server as it neither combines with TA nor with the service provider. Our system can be broadly introduced in basic 4 steps: setup, store, tokengen, and query. At very first time when system is initialized, the setup phase runs and thus system parameters are published. Then the service provider initiates the mHealth monitoring program also known as branching program (see part B.).This branching program is further encrypted and then resulting cipher text is delivered to cloud for storage, which corresponds to store algorithm. The client accesses the mHealth system, by raising query to the cloud. When client registers to the system for the very first time, TA approves the client and runs the tokengen algorithm. The next time when client wishes to raise the query (which is the attribute vector represented by collected health data), he initially sends the key to the TA and then inputs the query and TA inputs the master secret algorithm. The client receives the token for the corresponding query whereas TA gets no useful information regarding the query. In the last phase, the client sends the token in order to receive the perception from the cloud which comes under the query phase. The query is resolved and perception is sent to client in semi decrypted cipher text. The client then performs the decryption task on the partially decrypted cipher text and obtains the final decisions provided by the monitoring program on the cloud’s input query. The cloud also obtains no useful information from the query raised by the client. 3.2. Preliminaries: Branching Program Here, we will formally describe the branching programs [16], which includes decision tree. For our ease we have only considered the binary branching program. A private query protocol can be easily derived using this decision tree [1]. Let v be set of attribute vectors of the client, v= {v1, v2, v3, v4…. vn}. Branching program is a set of triple <{p1,p2…pk} , L, R> , where p is set of nodes in the branching program. Each decision node is again a set of pair (ai, ti), where ai is attribute index and ti is the threshold value. The ti is compared with v(ai) is compared at the node. For each decision node i, L (i) is the index of the next node if v(ai) ≤ti; R (i) is the index of the next node if v(ai) > ti. The label nodes are attached with classification information. To
  • 5. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System http://www.iaeme.com/IJCET/index.asp 33 editor@iaeme.com evaluate the branching program on some attribute vector v, we start with p1. If v(a1) ≤t1, set h = L (1), else h = R(1). Repeat the process recursively for ph, and so on, until one of the leaf nodes is reached with decision information [1]. To construct branching program introduced in MediNet project [17] [18].For instance let us consider, “[Systolic BP: 150, Missed one medication=0 (indicating he did miss the medication), Energy Expenditure: 900 kcal, salt intake: 1000 milligrams]” and the respective threshold is “t1 = 130,t2 = 0,t3 = 700 kcal,t4 = 1500”. The recommendation returned from the monitoring program (Figure 2) would be “D4, D5, D6” (by following the path through comparing each attribute element with the respective threshold at each node), which indicates the clients need to “notify next kin, modify daily diet, and take regular medication”. The health data related to the input attribute vector can be sampled by the client. Figure 1 Branching Program at the company level 3.3. Security: Encryption and Decryption technique Encryption is a technique which is widely used to generate the cipher text. Homomorphic encryption technique does the calculation on this encrypted data without decrypting any of the cipher text. The Homomorphic encryption scheme was proposed by Paillier cryptosystem [19], [20]. This encryption technique allows the client to gain the token in response of the input of attribute vectors provided by TA. Homomorphic encryption is generally used in cloud data storage as the data more secure. Decryption technique to MDRQ by using BF-IBE as shown in [22]. Using this technique neither the TA nor the cloud gets any valuable information on client’s decryption results. 3.4. Multi-dimensional range Query We are using multi dimensional range query concept in our system, so that we can access the data even if it is in encrypted format. The concept was firstly introduced by Elaine Shi [21].In this system, the sender encrypts the message under range [r1,r2] or even under the set of vector v, and a receiver can decrypt the message with the
  • 6. Nikhita N. Nerkar and Prof. Vina M. Lomte http://www.iaeme.com/IJCET/index.asp 34 editor@iaeme.com privacy key corresponding to the range [r1,r2]. The cipher text generated assures the privacy of both the message content and the data under which the encryption was performed. In our system, we are using this concept similar to CAM [1], where MDRQ plays a very important role. In this system we will be using BF-IBE [13] to develop MDRQ. But MDRQ can also be build by using Anonymous Identity Based Encryption scheme [14].If we compare normal IBE where only normal message is encrypted and made secure, where as in A-IBE scheme it can hide the data as well as the sender receiver information also. All the comparisons between the input vectors and the threshold at an intermediate node are implemented by MDRQs. At every decision node attribute vector ai, and their respective thresholds represented in two minimum root sets: [0, t1] and [t1,max] as shown in Figure 1 .Every index of next decision node is encrypted under the respective range. 3.5. Key private proxy re-encryption We are using proxy re-encryption, which allows the proxy server to re-encryption key to transform the cipher text (first level cipher text) encrypted for cloud storage into second level cipher text, that could be decrypted by user without allowing proxy obtain any useful information on the underlying message. In our system, the service provider delivers the monitoring program to cloud in an encrypted format using MDRQ scheme and then this cipher text is stored in an untrusted cloud. Than rekey algorithm is run by TA instead of service provider and allows TA to encrypt the cipher text stored in cloud. 4. PROPOSED WORK 4.1. Introduction The MHM System tries to overcome the scenario which are discussed above in literature survey where telemonitoring is done, the data is collected on the basis of sensors, stored onto the device, transmitted to the service provider and accordingly the feedback is reported to the user. To describe the fundamental idea we start with the basic scheme and then show the flow of the system and final graphical representation of the results and screenshots. The elite notion that buried the performance of the system is the privacy which is very difficult to be breached in this system as Hierarchical Identity based encryption is used to encrypt and decrypt the data. Using this convoluted algorithm is one of the elite tasks to be performed. The system is divided into multiple time slots generally known as “slots”. There can be N maximum number of users, who are requesting to access the system. When a client attempts to access the system, he is assigned an index, i ∈ [1, N] by Trusted authority. 4.2. System Architecture 4.2.1 Trusted Authority The Trusted Authority (TA) is a web application where user is authenticated and token is generated for every other user. Let us consider that user A is performing login for the first time. The user won’t be able to access our monitoring system until the he/she is not authenticated. We can say it acts as an arbiter between the user and the data stored in cloud.
  • 7. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System http://www.iaeme.com/IJCET/index.asp 35 editor@iaeme.com 4.2.2. Service Provider Service Provider creates branching program and stores the monitoring data (branching program) in the cloud server in an encrypted format. 4.2.3. Mobile Users An Android application is developed for the user which is will be operated as per all other play store applications. Through this application a GUI interface will be developed which will help user to access our health monitoring system and efficiently resolve the user query [23]. 4.2.4. Cloud Server The data stored on the cloud is the data which is supplied by the user while creating an account, token generated for respective user, the branching program done by the service provider. The data collected and stored will always be stored in an encrypted format. The below steps are referred from [1]. Setup: This step is performed by TA. Store: This is performed by the service provider also known as company. For every node Kj, whose child nodes are not at all leaf nodes, the service provider runs CL(j) = AnonEnc(id,PP,L(j)) and CR(j) = AnonEnc(id,PP,R(j)) , to encrypt the left and the right child nodes indices under id with either id ∈ S[0,tj] or id ∈ S[tj+1,Max], respectively (where PP is known as System parameters). And when the child nodes of Kj have leaf nodes, then the service provider generates the cipher text CL(j)=AnonEnc (id,PP,mL(j)) and CR(j)=AnonEnc(id,PP,mR(j)), where mL(j) and mR(j) denote the attached information at the two leaf nodes. All the generated cipher texts are delivered and stored in the cloud. Tokengen: To generate the private for the attribute vectors v= (v1,v2,v3vn).The user inputs every attribute which is represented in set v, and delivers all set to TA. Than TA runs AnonExtract (id ,msk) function, through which all identity id ∈ Svi in the identity set and delivers all the clients their respective private keys. Query: A client raises the query, which is further sent to cloud to resolve. To run the AnonDecryption algorithm on the ciphertext generated in the Store algorithm client needs to send the private key set generated by TA to the cloud. The decryption result decides which cipher text should be next decrypted to get proper results. The decryption result decides whether next right node should be considered or the left one. This process can be continued till it reaches the leaf node and gives the client attached information. 4.3. Flow Diagram The below diagram Figure 3, explains us the flow of our proposed system. The flow explains us the flow of the data from user to TA to Cloud Server. 4.3.1. User Flow The user registers himself through the GUI interface login page. If the user is authenticated user he can easily raise the query in the system. But if the user is not authenticated by the TA, he has to wait for it, till the TA logins and approves him as a authenticated user.
  • 8. Nikhita N. Nerkar and Prof. Vina M. Lomte http://www.iaeme.com/IJCET/index.asp 36 editor@iaeme.com Figure 3 System Flow 4.3.2. Trusted Authority When the setup is ready, and user registers for the very first time, the TA has to approve the user and generate token for the respective user at least once. When the user is authenticated user as we can see in the user flow that he is ready to access our health monitoring system by raising the queries and other application details. The data whichever is shared on the system is always stored on the Cloud Server in an encrypted format .Also, whenever the user raises the query, with the help of branching program stored on to cloud is responded back with the query results. 4.5. Algorithm Algorithm: Proposed Algorithm Setup (1⋋): Output: PP(G,GT,q,g,y,Hi,i=1,2,3,4)
  • 9. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System http://www.iaeme.com/IJCET/index.asp 37 editor@iaeme.com PP -> System Parameters G,GT -> public groups g -> random primitive root from G Hi -> Cryptographic hash function Extract (id, msk): Output: skid=H1(id)msk Encrypt (id, PP, m): m ∊ M Output: C= (c1,c2,c3) With r=H3(m||σ) C1=gr C2= σ ⊕H2(e(H1(id),y)r ) C3=m⊕H4(σ) σ -> random element from M Decrypt (C,skid): σ=c2⊕H2(e(skid, c1)) m= c3⊕ H4(σ). 5. SECURITY AND EVALUATION ANALYSIS 5.1. Security Here, we evaluate our proposed MHM system. We observed that no information is gained by the company from either of the clients query and in addition to that cloud also does not obtain any information related to the branching program generated by the company as proxy re encryption technique is been used. When the company loads the branching program on the cloud, the key privacy makes sure that the cloud is all together unknown about the node, leaf nodes, threshold values and the nodes. This mask privacy defeats the attacks on cloud data. In addition to this, only the client knows the decisions to his raised query as the results are directly supplied to the client. Moreover, TA and company have no clue regarding the raised query and cannot get any information from it as it is masked with the keys. Even the attackers attack on TA and company to fetch the information related to the query will fail. 5.2. Evaluation To implement our MHM system, we used a laptop with 2.27 GHz processor with a 3GB of RAM to simulate the cloud server and the company, and a mobile phone (Android platform) with 2GHz processor with 512MB of RAM to simulate a client. Figure 4 explains us that the company and cloud requires only 6.23 ms for encryption and 10.076 ms for decryption process respectively when number of nodes in branching program is 15.
  • 10. Nikhita N. Nerkar and Prof. Vina M. Lomte http://www.iaeme.com/IJCET/index.asp 38 editor@iaeme.com Encryption Time of two algorithms in milliseconds Decryption Time of two algorithms in milliseconds Figure 4 Comparison of two algorithms used for encryption & decryption our design Figure 5 Tokengen algorithm time cost for individual client Timerequiredinmilliseconds No. of nodes in branching program TimeRequiredInMilliseconds No. of nodes in branching program Timerequiredin
  • 11. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System http://www.iaeme.com/IJCET/index.asp 39 editor@iaeme.com (a) (b) (c) Figure 6 Some screenshots of the implementation (a) Creation of Branching program (b) Uploading of Branching program in encrypted format(c) Decisions supplied to client on raised query
  • 12. Nikhita N. Nerkar and Prof. Vina M. Lomte http://www.iaeme.com/IJCET/index.asp 40 editor@iaeme.com 6. CONCLUSION In this paper, we proposed a improvised version of Mobile Health monitoring System, which enables client to have an interactive application by providing various decisions related to the disease symptoms raised in form of query. The system along with it provides privacy to the user details and medical data. To apply privacy to the client data we have used IBE and also the evaluated the security performance by applying HIBE instead of IBE. We have highlighted what kind of encryption approach and methods are reasonable for maintaining between the data security and performance tradeoff. For both cloud user and provider’ perspective, our proposed integrated data encryption architecture is practically helpful in reducing data security and privacy risk in cloud environment. REFERENCES [1] Lin, H., Shao, J. Zhang, C. and Fang, Y. CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring. IEEE Tranasctions On Image Processing, 8(6), 2013. [2] Mohan, P., Marin, D., Sultan, S. and Deen, A. Medinet: personalizing the self- care process for patients with diabetes and cardiovascular disease using mobile telephony. Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, Vol. 2008 (3). Pp. 755–758. http://www.ncbi.nlm.nih.gov/pubmed/19162765 [3] Clifford, G. and Clifton, D. Wireless technology in disease management and medicine. Annual Review of Medicine, 63, 2012, pp. 479–492. [4] Tsanas, A., Little, M. A., McSharry, P. E. and Ramig, L. O. Accurate telemonitoring of Parkinson’s disease progression by non-invasive speech tests. Non-invasive telemonitoring of Parkinson’s disease, Tsanas et al., 2009 [5] Becker, S. A., Sugumaran, R. and Northern, K. P. The Use of Mobile Technology for Proactive Healthcare in Tribal Communities [6] Kinshu, K., Chang, M. Graf, S. and Yang, G. Adaptivity and Personalization in Mobile Learning © 2010 Old City Publishing, Inc. Published by license under the OCP Science imprint, a member of the Old City Publishing Group Tech., Inst., Cognition and Learning, Vol. 8, pp. 163–174 [7] Cavoukian, A., Fisher, A., Killen, S. and Hoffman, D. Remote home health care technologies: how to ensure privacy? build it in: Privacy by design. Identity in the Information Society, 3(2), 2010 pp. 363–378. [8] Fernandez, E. B. Security in data intensive computing systems, in Handbook of Data Intensive Computing, 2011, pp. 447–466. [9] Independently conducted by Ponemon Institute LLC, Data Loss Risks During Downsizing As Employees Exit, so does Corporate Data Publication Date: February 23, 2009 Sponsored by Symantec Corporation [10] Shahriyar, R. Bari, M. F., Kundu, G., Ahamed, S. I. and Akbar, M. M. Intelligent Mobile Health Monitoring System (IMHMS). International Journal of Control and Automation, 2(3) September 2009. [11] A White Paper by the HIMSS Mobile Security Work Group Security of Mobile Computing Devices in the Healthcare Environment © 2011 Healthcare Information and Management Systems Society (HIMSS) [12] Mobile Computing in Healthcare: Privacy and Security Considerations and Available Resources NIST/OCR Conference – June 6, 2012
  • 13. Security of Healthcare Data at Rest In Cloud with Mobile Health Monitoring System http://www.iaeme.com/IJCET/index.asp 41 editor@iaeme.com [13] Boneh, D. and Franklin, M. K. Identity-based encryption from the weil pairing, in CRYPTO, 2001, pp. 213–229. [14] Boyen, X. and Waters, B. Anonymous hierarchical identity-based encryption (without random oracles), in CRYPTO, 2006, pp. 290–307. [15] Narayanan, A. and Shmatikov, V. Myths and fallacies of personally identifiable information. Communications of the ACM, 53(6), 2010 pp. 24–26. [16] Brickell, J., Porter, D., Shmatikov, V. and Witchel, E. Privacy-preserving remote diagnostics, in Proceedings of the 14th ACM conference on Computer and communications security. ACM, 2007, pp. 498–507. [17] Mohan, P., Marin, D., Sultan, S. and Deen, A. Medinet: personalizing the self- care process for patients with diabetes and cardiovascular disease using mobile telephony, in Engineering in Medicine and Biology Society, 2008. EMBS 2008. 30th Annual International Conference of the IEEE. IEEE, 2008, pp. 755–758. [18] Farmer, A., Gibson, O., Hayton, P., Bryden, K., Dudley, C., Neil, A. and Tarassenko, L. A real-time, mobile phone-based telemedicine system to support young adults with type 1 diabetes. Informatics in primary care, 13(3), 2005, pp. 171–178. [19] Paillier, P. Public-key cryptosystems based on composite degree residuosity classes, in EUROCRYPT, 1999, pp. 223–238. [20] Damgard, I. and Jurik, M. A generalisation, a simplification and some applications of paillier’s probabilistic public-key system, in Public Key Cryptography, ser. Lecture Notes in Computer Science, Kim, K., ed., Vol. 1992. Springer, 2001, pp. 119–136. [21] Shi, E., Bethencourt, J., Chan, H. T.-H., Song, D. X. and Perrig, A. Multi- dimensional range query over encrypted data, in IEEE Symposium on Security and Privacy, 2007, pp. 350–364. [22] Green, M., Hohenberger, S. and Waters, B. Outsourcing the decryption of abe ciphertexts, in Usenix Security, 2011. [23] Ahmed, M. , Yousef, S. and Aboud, S. J. Bidirectional Search Routing Protocol For Mobile Ad Hoc Networks. International Journal of Computer Engineering & Technology, 4(1), 2013, pp. 229–243. [24] Boneh, D., Boyen, X. and Goh, E. -J. Hierarchical Identity Based Encryption with Constant Size Ciphertext, in Advances in Cryptology—EURO-CRYPT, Springer, 2005, pages 440–456. [25] Kumar, P. and Gahlan, P. A Minimum Process Synchronous Checkpointing Algorithm For Mobile Distributed System International journal of Computer Engineering & Technology, 1(1), 2010, pp. 72–81