Submit Search
Upload
Enhancing IoT healthcare data security using fog computing and AES
•
0 likes
•
25 views
AI-enhanced title
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i12/IRJET-V6I12126.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 3
Download now
Download to read offline
Recommended
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET Journal
Enhancing the Security for Clinical Document Architecture Generating System u...
Enhancing the Security for Clinical Document Architecture Generating System u...
IRJET Journal
Depiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud Environment
Idris Ahmed
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
Predicting the Maintenance of Aircraft Engines using LSTM
Predicting the Maintenance of Aircraft Engines using LSTM
ijtsrd
Hybrid deep learning model using recurrent neural network and gated recurrent...
Hybrid deep learning model using recurrent neural network and gated recurrent...
IJECEIAES
Recommended
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET- IoT based Advanced Healthcare Architecture: A New Approach
IRJET Journal
Enhancing the Security for Clinical Document Architecture Generating System u...
Enhancing the Security for Clinical Document Architecture Generating System u...
IRJET Journal
Depiction of Body area network in Cloud Environment
Depiction of Body area network in Cloud Environment
Idris Ahmed
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET- Latency and Power Optimized AES Cryptography System using Scan Cha...
IRJET Journal
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
IRJET Journal
Predicting the Maintenance of Aircraft Engines using LSTM
Predicting the Maintenance of Aircraft Engines using LSTM
ijtsrd
Hybrid deep learning model using recurrent neural network and gated recurrent...
Hybrid deep learning model using recurrent neural network and gated recurrent...
IJECEIAES
Real-time monitoring of the prototype design of electric system by the ubido...
Real-time monitoring of the prototype design of electric system by the ubido...
IJECEIAES
Using Learning Vector Quantization in IDS Alert Management System
Using Learning Vector Quantization in IDS Alert Management System
CSCJournals
An efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machine
IAEME Publication
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
IRJET Journal
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET Journal
50120140506001
50120140506001
IAEME Publication
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
IJECEIAES
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET Journal
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
IRJET Journal
Ijcet 06 06_004
Ijcet 06 06_004
IAEME Publication
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis System
IRJET Journal
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
IRJET Journal
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
IJECEIAES
Ijecet 06 06_006
Ijecet 06 06_006
IAEME Publication
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IJET - International Journal of Engineering and Techniques
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
IRJET Journal
IRJET- Hybrid Architecture of Heart Disease Prediction System using Genetic N...
IRJET- Hybrid Architecture of Heart Disease Prediction System using Genetic N...
IRJET Journal
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
Smart Storage for Home Application
Smart Storage for Home Application
IRJET Journal
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
More Related Content
What's hot
Real-time monitoring of the prototype design of electric system by the ubido...
Real-time monitoring of the prototype design of electric system by the ubido...
IJECEIAES
Using Learning Vector Quantization in IDS Alert Management System
Using Learning Vector Quantization in IDS Alert Management System
CSCJournals
An efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machine
IAEME Publication
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
IRJET Journal
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET Journal
50120140506001
50120140506001
IAEME Publication
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
IRJET Journal
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
IJECEIAES
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET Journal
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
IRJET Journal
Ijcet 06 06_004
Ijcet 06 06_004
IAEME Publication
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis System
IRJET Journal
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
IRJET Journal
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
IJECEIAES
Ijecet 06 06_006
Ijecet 06 06_006
IAEME Publication
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
IJET - International Journal of Engineering and Techniques
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
IRJET Journal
IRJET- Hybrid Architecture of Heart Disease Prediction System using Genetic N...
IRJET- Hybrid Architecture of Heart Disease Prediction System using Genetic N...
IRJET Journal
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
IJET - International Journal of Engineering and Techniques
Smart Storage for Home Application
Smart Storage for Home Application
IRJET Journal
What's hot
(20)
Real-time monitoring of the prototype design of electric system by the ubido...
Real-time monitoring of the prototype design of electric system by the ubido...
Using Learning Vector Quantization in IDS Alert Management System
Using Learning Vector Quantization in IDS Alert Management System
An efficient intrusion detection using relevance vector machine
An efficient intrusion detection using relevance vector machine
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
IRJET- Fish Recognition and Detection Based on Deep Learning
IRJET- Fish Recognition and Detection Based on Deep Learning
50120140506001
50120140506001
IRJET- Proximity Detection Warning System using Ray Casting
IRJET- Proximity Detection Warning System using Ray Casting
A data estimation for failing nodes using fuzzy logic with integrated microco...
A data estimation for failing nodes using fuzzy logic with integrated microco...
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- Enhanced Private and Secured Medical Data Transmission
IRJET- GDPS - General Disease Prediction System
IRJET- GDPS - General Disease Prediction System
Ijcet 06 06_004
Ijcet 06 06_004
IRJET - IoT based E-Prognosis System
IRJET - IoT based E-Prognosis System
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Designing an Architecture for Monitoring Patients at Home: Ontologies and We...
Face recognition for presence system by using residual networks-50 architectu...
Face recognition for presence system by using residual networks-50 architectu...
Ijecet 06 06_006
Ijecet 06 06_006
verifiable and multi-keyword searchable attribute-based encryption scheme for...
verifiable and multi-keyword searchable attribute-based encryption scheme for...
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
Security and Privacy Protection of Medical Sensor Data of Patient using IOT
IRJET- Hybrid Architecture of Heart Disease Prediction System using Genetic N...
IRJET- Hybrid Architecture of Heart Disease Prediction System using Genetic N...
healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
Smart Storage for Home Application
Smart Storage for Home Application
Similar to Enhancing IoT healthcare data security using fog computing and AES
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET Journal
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
IRJET Journal
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET Journal
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
IRJET Journal
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
IRJET Journal
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
IRJET Journal
An intrusion detection algorithm for ami
An intrusion detection algorithm for ami
IJCI JOURNAL
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
Dotha Keller
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET Journal
Similar to Enhancing IoT healthcare data security using fog computing and AES
(20)
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
Intrusion Detection for HealthCare Network using Machine Learning
Intrusion Detection for HealthCare Network using Machine Learning
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
AES-BASED IMAGE ENCRYPTION AND DECRYPTION FOR ROBUST DATA SECURITY AND DEFENS...
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Private and Secured data Transmission and Analysis for Wireless Ad-hoc Network
Review for Secure Data Aggregation in Wireless Sensor Networks
Review for Secure Data Aggregation in Wireless Sensor Networks
An intrusion detection algorithm for ami
An intrusion detection algorithm for ami
Access Control For Local Area Network Performance Essay
Access Control For Local Area Network Performance Essay
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET- Enhanced SIT Algorithm for Embedded Systems
IRJET- Enhanced SIT Algorithm for Embedded Systems
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Recently uploaded
(20)
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Enhancing IoT healthcare data security using fog computing and AES
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 844 Enhancing Data Security in IoT Healthcare Services using Fog Computing Saloni Alhat1, Nikita Bangal2, Aishwarya Gaikwad3, Smita Khairnar4 1Saloni Alhat, Dept. of Computer Engineering, PCCOE, Maharashtra, India 2Nikita Bangal, Dept. of Computer Engineering, PCCOE, Maharashtra, India 3Aishwarya Gaikwad, Dept. of Computer Engineering, PCCOE, Maharashtra, India 4 Professor Smita Khairnar , Dept. of Computer Engineering, PCCOE, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Security of the data is also major challenge in cloud. Fog computing is the answer to overcome the challenges. Fog node works attheedgesideandenhancesdata security, accuracy, consistency and reduces the latency rate which is an important factor for application likemedical data. In this paper we will detect the heart disease by using sensors and pulse rate. The data detected will be storedinthefog node .The result would be display by the system as well as report will be sent through mail to the patient. The data collected from it is being encrypted in fog node using Advance Encryption Standard (AES) algorithm and it is send to cloud. Therefore, the security of the health care data is enhanced using Fog computing. Key Words: Internet of Things, Fog computing, Advance Encryption Standard, Sensor, Pulse Rate, Heart Disease. 1. INTRODUCTION With the advancement in IoT devices particularly in healthcare sector, huge amount of data is collected from different sensors and all this data are transferred andstored in cloud. System ensure safety on cloud from attacker or insider, this can prove helpful ingovernmentorganization or any IT-industry. The data collected from it is being encrypted in fog node using Advance Encryption Standard (AES) algorithm and it is send to cloud. Fog computing overcomes the scalability and reliability issues which is there in the traditional IoT-cloud architecture. In Medical Diagnosis it is important to measure accurate pulse rate for prediction of diseases. So, continuous monitoring of pulse rate with portable low cost system will always be in need. System will take the information about the pulseusingpulse rate sensor and predict the chances of heart attack. Therefore, the security of the health care data is enhanced using Fog computing. 1.1 Project Objective 1. To Predict the Heart Diseases using Random Forest technique. 2. To provide security to data using AES Algorithm. 3. To reduce storage in cloud and fast retrieval. 4. To improve efficiency. 5. To reduce the amount of data that needs to be transported to the cloud for data processing, analysis and storage. 2. Problem Statement To enhance the data security in IoT disease prediction system using fog computing. System will take the information about the pulse using pulse rate sensor and predict the chances of heart attack. The data entered by patient will be stored on cloud and get secured by using fog computing. System will make use of random forest classifier to predict percentage of chance of heart attack and will use AES algorithm to secure data. 2.1 Existing System Currently in existing system thenetworksuchforcomputing tasks can be executed, and provide tradeoffs with respect to requirements relevant to healthcare. Review indicates that (1) there is a significant number of computing tasks in healthcare that require or can benefit from fog computing principles, (2) processingonhigher network tiers isrequired due to constraints in wireless devices and the need to aggregate data, and (3) privacy concerns and dependability prevent computation tasks to be completely moved to the cloud. Hence, security is the major problem in existing system.Therefore; this system is not a very good way of securing data. 2.3 Proposed System In this system we are implementing Random Forest Algorithm to carry out diagnosis of heart disease and AES algorithm to secure the data generated by system.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 845 Fig .1- Proposed System 2.4 Mathematical Model Let S be a system which predicts the percentage of getting heart attack. S is defined as S={ I, A, O } Where, I= Input, which pulse rate sensor can sense A= constraints for heart attack F= Fog computing and security O= Output, Percentage of getting heart attack Flow of system: 1. Pulse sensor sense the input data of the patient.Alsoitwill take the details of the patient. I= {Pi1, Pi2, … ,Pin} 2. Save the data on cloud and maintain a fog node for security. Apply the constraints on input. A= constraints for heart attack A={A1, A2, … , An} F= Fog node F={F1, F2, …, Fn} 3.O= Output, Percentage of getting heart attack O={O1, O2, …, On} 3. Techniques and Algorithm 3.1. AES Algorithm Advanced EncryptionStandard(AES)algorithmisoneon the most common and widely symmetric block cipheralgorithm used in worldwide. This algorithm has an own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software all over the world. It is extremely difficult to hackers to get the real data when encrypting by AES algorithm. 3.2. Random Forest Random forest can be used as classification as well as regression task. Random forest algorithmisthecombination of “Bootstrap aggregating method” and random subspace method to build various decision tree. Random forest is an ensemble classifier based on large number of decision tree. Each decision tree gives the individual outcomebyanalyzing the condition. The class having the more votes consider as a models prediction. It is a supervised machine learning algorithm. To check the generalized algorithm in random forest, and upper bound is derived. This error is consisting of two parameter mainly, 1. The Accuracy of individual classifier. 2. The dependency between the individual classifiers. Fig .2- Random Forest 4. CONCLUSION The System Analyse the pulse rate and Predicts the Heart Diseases. The data in the system is secured by using AES algorithm which is mostly used to encrypt the data. Stored data predict the patients health report by using random forest algorithm. System enhances data security, accuracy,
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 12 | Dec 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 846 consistency, reduces the latency rate and enhances the overall quality of service. The data stored on the Fog can be stored in a secure way. The system maintains data integrity. System protects against misuse of real user data. REFERENCES [1] Yumnam Winnie, Umamaheswari E, D M Ajay, “Enhancing Data Security in IOT Healthcare Servicesusing Fog Computing”, International Conferenceon RecentTrends in Advanced Computing, 2018. [2] Kraemer, Frank Alexander, Anders Eivind Braten, Nattachart Tamkittikhun, and David Palma, “Fog Computing in Healthcare–A Review and Discussion.”, IEEE Access 5, 2017. [3] Al Hamid, Hadeal Abdulaziz, Sk Md Mizanur Rahman, M. Shamim Hossain, Ahmad Almogren, and Atif Alamri, “A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility With Pairing-Based Cryptography.”, IEEE Access 5, 2017. [4] Alrawais, Arwa, AbdulrahmanAlhothaily,Chunqiang Hu, and Xiuzhen Cheng, “Fog computing for the internet of things: Security and privacy issues.”, IEEE Internet Computing 21, 2017. [5] Reddy Prasad, Pidaparthi Anjali, S.Adil, .Deepa,”Heart Disease PredictionusingLogistic RegressionAlgorithmusing machine Learning”, International Journal ofEngineeringand Advanced Technology (IJEAT) ISSN: 2249 – 8958,Volume-8, Issue-3S, February 2019. [6] Rahmani, A. M., Gia T.N., Negash B., Anzanpour A., Azimi I., Jiang M., and Liljeberg P.: Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Future Generation ComputerSystems, 78, 641-658 (2018). [7] Goyal, Abhishek, Kanika Narang, GautamAhluwalia,P.M. Sohal, Bhupinder Singh, Shibba T. Chhabra, Naved Aslam, Bishav Mohan, and Gurpreet S. Wander, ”Seasonal variation in 24 h blood pressure profile in healthy adults-A prospective observational study.” Journal of human hypertension, 2019. [8]https://blog.oureducation.in/cloud-computing- anemerging-technology [9]http://internetofthingsagenda.techtarget.com/definition/ fog-computing-fogging [10]https://www.youtube.com/watch?v=pdmyYbdLnkI
Download now