SlideShare a Scribd company logo
SPOC: A Secure and Privacy-preserving Opportunistic Computing
Framework for Mobile-Healthcare Emergency
ABSTRACT:
With the pervasiveness of smart phones and the advance of wireless body sensor networks
(BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider
into a pervasive environment for better health monitoring, has attracted considerable interest
recently. However, the flourish of m-Healthcare still faces many challenges including
information security and privacy preservation. In this paper, we propose a secure and privacy-
preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency.
With SPOC, smart phone resources including computing power and energy can be
opportunistically gathered to process the computing-intensive personal health information (PHI)
during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the
PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare
emergency, we introduce an efficient user-centric privacy access control in SPOC framework,
which is based on an attribute-based access control and a new privacy-preserving scalar product
computation (PPSPC) technique, and allows a medical user to decide who can participate in the
opportunistic computing to assist in processing his overwhelming PHI data. Detailed security
analysis shows that the proposed SPOC framework can efficiently achieve user-centric privacy
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
access control in m-Healthcare emergency. In addition, performance evaluations via extensive
simulations demonstrate the SPOC’s effectiveness in term of providing high reliable PHI
process and transmission while minimizing the privacy disclosure during m-Healthcare
emergency.
ARCHITECTURE:
EXISTING SYSTEM
The study of opportunistic computing has gained the great interest from the research
community recently.
The existing systems introduce the opportunistic computing paradigm in wireless sensor
network to solve the problem of storing and executing an application that exceeds the memory
resources available on a single sensor node. Especially, their solution is based on the idea of
partitioning the application code into a number of opportunistically cooperating modules, and
each node contributes to the execution of the original application by running a subset of the
application tasks and providing service to the neighboring nodes.
Passarella et al. evaluate the performance of service execution in opportunistic computing.
Specifically, they first abstract resources in pervasive computing as services, which are
opportunistically contributed by providers and invoked by seekers. Then, they present a
complete analytical model to depict the service invocation process between seekers and
providers, and derive the optimal number of replicas to be spawned on encountered nodes, in
order to minimize the execution time and optimize the computational and bandwidth resources
used.
In Existing System, According to the sensex over the age of 65 is expected to hit 70 million by
2030, having doubled since 2000. Health care expenditures projected to rise to 15.9% by 2010.
The cost of health care for the nation’s aging population has become a national concern are
important for understanding how the opportunistic computing paradigm work when resources
available on different nodes can be opportunistically gathered together to provide richer
functionality, they have not considered the potential security and privacy issues existing in the
opportunistic computing paradigm.
PROPOSED SYSTEM
In our proposed SPOC framework aims at the security and privacy issues, and develops a user-
centric privacy access control of opportunistic computing in m-Healthcare emergency. In this
paper, we propose a new secure and privacy preserving opportunistic computing framework,
called SPOC, to address this challenge. With the proposed SPOC framework, each medical user
in emergency can achieve the user-centric privacy access control to allow only those qualified
helpers to participate in the opportunistic computing to balance the high-reliability of PHI
process and minimizing PHI privacy disclosure in m-Healthcare emergency. Specifically, the
main contributions of this paper are threefold. • First, we propose SPOC, a secure and privacy-
preserving opportunistic computing framework for m-Healthcare emergency. With SPOC, the
resources available on other opportunistically contacted medical users’ smart phones can be
gathered together to deal with the computing intensive PHI process in emergency situation.
Since the PHI will be disclosed during the process in opportunistic computing, to minimize the
PHI privacy disclosure, SPOC introduces a user-centric two-phase privacy access control to
only allow those medical users who have similar symptoms to participate in opportunistic
computing. • Second, to achieve user-centric privacy access control in opportunistic computing,
we present an efficient attributebased access control and a novel non-homomorphic encryption
based privacy-preserving scalar product computation (PPSPC) protocol, where the attributed-
based access control can help a medical user in emergency to identify other medical users, and
PPSPC protocol can further control only those medical users who have similar symptoms to
participate in the opportunistic computing while without directly revealing users’ symptoms.
Note that, although PPSPC protocols have been well studied in privacy-preserving data mining,
yet most of them are relying on time-consuming homomorphic encryption technique. To the
best of our knowledge, our novel non-homomorphic encryption based PPSPC protocol is the
most efficient one in terms of computational and communication overheads. • Third, to validate
the effectiveness of the proposed SPOC framework in m-Healthcare emergency, we also
develop a custom simulator built in Java. Extensive simulation results show that the proposed
SPOC framework can help medical users to balance the high-reliability of PHI process and
minimizing the PHI privacy disclosure in m-Healthcare emergency
ADVANTAGES OF PROPOSED SYSTEM:
Shift from a clinic-oriented, centralized healthcare system to a patient oriented, distributed
healthcare system
Reduce healthcare expenses through more efficient use of clinical resources and earlier
detection of medical conditions
Challenges:
Performance, Reliability, Scalability, QoS, Privacy, Security …
More prone to failures, caused by power exhaustion, software and hardware faults, natural
disasters, malicious attacks, and human errors etc.
MODULES :
1. Pervasive health monitoring in M-Healthcare
2. Body Sensor Network
3. Security Analysis
4. Performance Evolution
5. Simulation Setup
6. Report Generation
MODULES DESCRIPTION:
Pervasive Health Monitoring in M-Healthcare
In this module, each mobile medical user’s personal health information (PHI) such as heart
beat, blood sugar level, blood pressure and temperature and others, can be first collected by
BSN, and then aggregated by smart phone via Bluetooth. Finally, they are further transmitted to
the remote healthcare center via 3G networks. Based on these collected PHI data, medical
professionals at healthcare center can continuously monitor medical users’ health conditions
and as well quickly react to users’ life-threatening situations and save their lives by dispatching
ambulance and medical personnel to an emergency location in a timely fashion.
Body Sensor Network
In this module, Body area network (BAN), wireless body area network (WBAN) or body
sensor network (BSN) are terms used to describe the application of wearable computing
devices. This will enable wireless communication between several miniaturized body sensor
units (BSU) and a single body central unit (BCU) worn at the human body.
– Deploy wearable sensors on the bodies of patients in a residential setting
– Continuously monitor physiological signals (such as ECG, blood oxygen Levels) and other
health related information (such as physical activity)
Security Analysis
In this Module to develop a secure and privacy-preserving opportunistic computing framework
to provide high reliability of PHI process and transmission while minimizing PHI privacy
disclosure in m-Healthcare emergency. Specifically, we
i) Apply opportunistic computing in m-Healthcare emergency to achieve high-reliability of PHI
process and transmission; and
ii) Develop user-centric privacy access control to minimize the PHI privacy disclosure.
Performance Evolution
In this module, the performance metrics used in the evaluation are :
1) The average number of qualified helpers (NQH), which indicates how many qualified helpers
can participate in the opportunistic computing within a given time period, and
2) The average resource consumption ratio (RCR), which is defined as the fraction of the
resources consumed by the medical user in emergency to the total resources consumed in
opportunistic computing for PHI process within a given time period.
Simulation Setup
In this Module, the simulator implements the application layer under the assumptions that the
communications between smart phones and the communications between BSNs and smart
phones are always workable when they are within each other’s transmission ranges.
Report generation
In this module, Health care center generate crystal report from the database collection for
future reference.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• System : Pentium IV 2.4 GHz.
• Hard Disk : 40 GB.
• Floppy Drive: 1.44 Mb.
• Monitor : 15 VGA Colour.
• Mouse : Logitech.
• Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
• Operating system : Windows XP.
• Coding Language : ASP.Net with C#
• Data Base : SQL Server 2005
REFERENCE:
Rongxing, Xiaodong Lin, and Xuemin (Sherman) Shen, “SPOC: A Secure and Privacy-
preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency”, IEEE
Transaction

More Related Content

What's hot

Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
 
IRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission Management
IRJET Journal
 
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
AM Publications
 
An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...
Made Artha
 
Paper id 212014105
Paper id 212014105Paper id 212014105
Paper id 212014105
IJRAT
 
A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...
ijasa
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
 
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSPROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
ijngnjournal
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare Service
IRJET Journal
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET Journal
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
IJET - International Journal of Engineering and Techniques
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
IJMIT JOURNAL
 
A more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemA more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring system
eSAT Publishing House
 
Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison
ijujournal
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
IRJET Journal
 
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
ijait
 
IRJET- A Real Time, Automated, Medical Emergency Service for Informing th...
IRJET-  	  A Real Time, Automated, Medical Emergency Service for Informing th...IRJET-  	  A Real Time, Automated, Medical Emergency Service for Informing th...
IRJET- A Real Time, Automated, Medical Emergency Service for Informing th...
IRJET Journal
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
 

What's hot (18)

Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
IRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission ManagementIRJET - Blockchain for Medical Data Access and Permission Management
IRJET - Blockchain for Medical Data Access and Permission Management
 
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
SURVEY OF HEALTHCARE MANAGEMENT USING WIRELESS SENSOR NETWORKS (WSNS)
 
An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...
 
Paper id 212014105
Paper id 212014105Paper id 212014105
Paper id 212014105
 
A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...A framework for secure healthcare systems based on big data analytics in mobi...
A framework for secure healthcare systems based on big data analytics in mobi...
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKSPROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
PROPOSED TRANSPORT PROTOCOLS SUITE FOR WIRELESS MEDICAL BODY AREA NETWORKS
 
IRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare ServiceIRJET- Mobile Assisted Remote Healthcare Service
IRJET- Mobile Assisted Remote Healthcare Service
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
 
Framework architecture for improving
Framework architecture for improvingFramework architecture for improving
Framework architecture for improving
 
A more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring systemA more secure and reliable protocol for wireless patient monitoring system
A more secure and reliable protocol for wireless patient monitoring system
 
Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison Service Discovery – A Survey and Comparison
Service Discovery – A Survey and Comparison
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
A FRAMEWORK FOR THE INTERCONNECTION OF CONTROLLER AREA NETWORK (CAN) BASED CR...
 
IRJET- A Real Time, Automated, Medical Emergency Service for Informing th...
IRJET-  	  A Real Time, Automated, Medical Emergency Service for Informing th...IRJET-  	  A Real Time, Automated, Medical Emergency Service for Informing th...
IRJET- A Real Time, Automated, Medical Emergency Service for Informing th...
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 

Viewers also liked

My contents page flat plan
My contents page flat planMy contents page flat plan
My contents page flat plan
alexandraforster
 
Line regulation
Line regulationLine regulation
Line regulation
paccy np
 
An Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed DesignAn Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed Design
Blue Elephant Consulting
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
IEEEGLOBALSOFTTECHNOLOGIES
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
jameschloejames
 
مجلة هي - العدد 236 - أكتوبر 2013
مجلة هي - العدد 236 - أكتوبر 2013مجلة هي - العدد 236 - أكتوبر 2013
مجلة هي - العدد 236 - أكتوبر 2013
Hia Magazine - مجلة هي
 
FINAL ACG masterpage_LR 1
FINAL ACG masterpage_LR 1FINAL ACG masterpage_LR 1
FINAL ACG masterpage_LR 1
Lourdes Federis
 
Board paper maths
Board paper mathsBoard paper maths
Board paper maths
nitishguptamaps
 
Ch 4 Section 4.6
Ch 4   Section 4.6Ch 4   Section 4.6
Ch 4 Section 4.6
Amo Oliverio
 
New Legislation Enhances the Benefits of a Section 1042 Tax-Deferred Sale
New Legislation Enhances the Benefits of a Section 1042 Tax-Deferred SaleNew Legislation Enhances the Benefits of a Section 1042 Tax-Deferred Sale
New Legislation Enhances the Benefits of a Section 1042 Tax-Deferred Sale
Christopher T. Horner II
 
Ergolab, Innovación Abierta Guiada por el Usuario para Sistemas de Información
Ergolab, Innovación Abierta Guiada por el Usuario para Sistemas de InformaciónErgolab, Innovación Abierta Guiada por el Usuario para Sistemas de Información
Ergolab, Innovación Abierta Guiada por el Usuario para Sistemas de Información
Jorge García Valbuena
 
Sumak Yoga presentación 2015
Sumak Yoga presentación 2015Sumak Yoga presentación 2015
Sumak Yoga presentación 2015
Daniel Silva Ramos
 
Medicines Breakthrough Collaborative 1
Medicines Breakthrough Collaborative 1Medicines Breakthrough Collaborative 1
Medicines Breakthrough Collaborative 1
Health Innovation West of England
 
Cashing Out - Exit Strategies for Closely Held Companies
Cashing Out - Exit Strategies for Closely Held CompaniesCashing Out - Exit Strategies for Closely Held Companies
Cashing Out - Exit Strategies for Closely Held CompaniesChristopher T. Horner II
 
A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...
A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...
A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...
Helen Farley
 
Ramadi is my hometown
Ramadi  is my hometownRamadi  is my hometown
Ramadi is my hometown
عبد الله الساجر
 
Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)
Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)
Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)
Ysrrael Camero
 
Video de motivacion y liderazgo
Video de motivacion y liderazgoVideo de motivacion y liderazgo
Video de motivacion y liderazgo
mariaangelikapenafiel
 
The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...
The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...
The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...
Jason Dillon
 

Viewers also liked (20)

My contents page flat plan
My contents page flat planMy contents page flat plan
My contents page flat plan
 
Line regulation
Line regulationLine regulation
Line regulation
 
An Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed DesignAn Introduction To Software Development - Architecture & Detailed Design
An Introduction To Software Development - Architecture & Detailed Design
 
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Towards differential query servic...
 
Presentation_NEW.PPTX
Presentation_NEW.PPTXPresentation_NEW.PPTX
Presentation_NEW.PPTX
 
مجلة هي - العدد 236 - أكتوبر 2013
مجلة هي - العدد 236 - أكتوبر 2013مجلة هي - العدد 236 - أكتوبر 2013
مجلة هي - العدد 236 - أكتوبر 2013
 
FINAL ACG masterpage_LR 1
FINAL ACG masterpage_LR 1FINAL ACG masterpage_LR 1
FINAL ACG masterpage_LR 1
 
Board paper maths
Board paper mathsBoard paper maths
Board paper maths
 
Ch 4 Section 4.6
Ch 4   Section 4.6Ch 4   Section 4.6
Ch 4 Section 4.6
 
New Legislation Enhances the Benefits of a Section 1042 Tax-Deferred Sale
New Legislation Enhances the Benefits of a Section 1042 Tax-Deferred SaleNew Legislation Enhances the Benefits of a Section 1042 Tax-Deferred Sale
New Legislation Enhances the Benefits of a Section 1042 Tax-Deferred Sale
 
Ergolab, Innovación Abierta Guiada por el Usuario para Sistemas de Información
Ergolab, Innovación Abierta Guiada por el Usuario para Sistemas de InformaciónErgolab, Innovación Abierta Guiada por el Usuario para Sistemas de Información
Ergolab, Innovación Abierta Guiada por el Usuario para Sistemas de Información
 
Sumak Yoga presentación 2015
Sumak Yoga presentación 2015Sumak Yoga presentación 2015
Sumak Yoga presentación 2015
 
Medicines Breakthrough Collaborative 1
Medicines Breakthrough Collaborative 1Medicines Breakthrough Collaborative 1
Medicines Breakthrough Collaborative 1
 
Letter of gratitude
Letter of gratitudeLetter of gratitude
Letter of gratitude
 
Cashing Out - Exit Strategies for Closely Held Companies
Cashing Out - Exit Strategies for Closely Held CompaniesCashing Out - Exit Strategies for Closely Held Companies
Cashing Out - Exit Strategies for Closely Held Companies
 
A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...
A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...
A Prisoners' Island: Teaching Disconnected Incarcerated Tertiary Students in ...
 
Ramadi is my hometown
Ramadi  is my hometownRamadi  is my hometown
Ramadi is my hometown
 
Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)
Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)
Notas (enmendadas) de Historia Económica de Venezuela (Semestre 2-2014)
 
Video de motivacion y liderazgo
Video de motivacion y liderazgoVideo de motivacion y liderazgo
Video de motivacion y liderazgo
 
The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...
The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...
The Variable Effects Of Gradients Of Exposure To Ultraviolet Light On Brown P...
 

Similar to JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserving opportunistic computing framework for mobile-healthcare emergency

Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
JPINFOTECH JAYAPRAKASH
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
KSAravindSrivastava
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET Journal
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
IRJET Journal
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
IJERA Editor
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
IRJET Journal
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
IRJET Journal
 
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
M Shamim Iqbal
 
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
paperpublications3
 
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area NetworksProposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
josephjonse
 
Energy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor NetworksEnergy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor Networks
paperpublications3
 
Iaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care systemIaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care system
Iaetsd Iaetsd
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare Network
Istabraq M. Al-Joboury
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptx
Komal526846
 
IJET-V3I2P10
IJET-V3I2P10IJET-V3I2P10
G03406041045
G03406041045G03406041045
G03406041045
theijes
 
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijripublishers Ijri
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
ijujournal
 

Similar to JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserving opportunistic computing framework for mobile-healthcare emergency (20)

Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
IRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoTIRJET- Android base Healthcare Monitoring and Management System using IoT
IRJET- Android base Healthcare Monitoring and Management System using IoT
 
Intelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosisIntelligent data analysis for medicinal diagnosis
Intelligent data analysis for medicinal diagnosis
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
IRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor dataIRJET-A Survey on provide security to wireless medical sensor data
IRJET-A Survey on provide security to wireless medical sensor data
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
Future Internet of IoT- A Survey of Healthcare Internet of Things (HIoT) : A ...
 
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...
 
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area NetworksProposed Transport Protocols Suite for Wireless Medical Body Area Networks
Proposed Transport Protocols Suite for Wireless Medical Body Area Networks
 
Energy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor NetworksEnergy Aware Computing in Sensor Networks
Energy Aware Computing in Sensor Networks
 
Iaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care systemIaetsd io t based advanced smart health care system
Iaetsd io t based advanced smart health care system
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Interenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare NetworkInterenet of Things Based Cloud for Healthcare Network
Interenet of Things Based Cloud for Healthcare Network
 
Private & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptxPrivate & Secure Data Tx Presentation I (1).pptx
Private & Secure Data Tx Presentation I (1).pptx
 
IJET-V3I2P10
IJET-V3I2P10IJET-V3I2P10
IJET-V3I2P10
 
G03406041045
G03406041045G03406041045
G03406041045
 
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
Ijricit 01-005 pscsv - patient self-driven multi-stage confidentiality safegu...
 
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...
 

More from IEEEGLOBALSOFTTECHNOLOGIES

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
IEEEGLOBALSOFTTECHNOLOGIES
 

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
 

Recently uploaded

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 

Recently uploaded (20)

GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 

JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserving opportunistic computing framework for mobile-healthcare emergency

  • 1. SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency ABSTRACT: With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces many challenges including information security and privacy preservation. In this paper, we propose a secure and privacy- preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be opportunistically gathered to process the computing-intensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient user-centric privacy access control in SPOC framework, which is based on an attribute-based access control and a new privacy-preserving scalar product computation (PPSPC) technique, and allows a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data. Detailed security analysis shows that the proposed SPOC framework can efficiently achieve user-centric privacy GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. access control in m-Healthcare emergency. In addition, performance evaluations via extensive simulations demonstrate the SPOC’s effectiveness in term of providing high reliable PHI process and transmission while minimizing the privacy disclosure during m-Healthcare emergency. ARCHITECTURE: EXISTING SYSTEM The study of opportunistic computing has gained the great interest from the research community recently. The existing systems introduce the opportunistic computing paradigm in wireless sensor network to solve the problem of storing and executing an application that exceeds the memory resources available on a single sensor node. Especially, their solution is based on the idea of partitioning the application code into a number of opportunistically cooperating modules, and
  • 3. each node contributes to the execution of the original application by running a subset of the application tasks and providing service to the neighboring nodes. Passarella et al. evaluate the performance of service execution in opportunistic computing. Specifically, they first abstract resources in pervasive computing as services, which are opportunistically contributed by providers and invoked by seekers. Then, they present a complete analytical model to depict the service invocation process between seekers and providers, and derive the optimal number of replicas to be spawned on encountered nodes, in order to minimize the execution time and optimize the computational and bandwidth resources used. In Existing System, According to the sensex over the age of 65 is expected to hit 70 million by 2030, having doubled since 2000. Health care expenditures projected to rise to 15.9% by 2010. The cost of health care for the nation’s aging population has become a national concern are important for understanding how the opportunistic computing paradigm work when resources available on different nodes can be opportunistically gathered together to provide richer functionality, they have not considered the potential security and privacy issues existing in the opportunistic computing paradigm. PROPOSED SYSTEM In our proposed SPOC framework aims at the security and privacy issues, and develops a user- centric privacy access control of opportunistic computing in m-Healthcare emergency. In this paper, we propose a new secure and privacy preserving opportunistic computing framework, called SPOC, to address this challenge. With the proposed SPOC framework, each medical user in emergency can achieve the user-centric privacy access control to allow only those qualified helpers to participate in the opportunistic computing to balance the high-reliability of PHI process and minimizing PHI privacy disclosure in m-Healthcare emergency. Specifically, the main contributions of this paper are threefold. • First, we propose SPOC, a secure and privacy-
  • 4. preserving opportunistic computing framework for m-Healthcare emergency. With SPOC, the resources available on other opportunistically contacted medical users’ smart phones can be gathered together to deal with the computing intensive PHI process in emergency situation. Since the PHI will be disclosed during the process in opportunistic computing, to minimize the PHI privacy disclosure, SPOC introduces a user-centric two-phase privacy access control to only allow those medical users who have similar symptoms to participate in opportunistic computing. • Second, to achieve user-centric privacy access control in opportunistic computing, we present an efficient attributebased access control and a novel non-homomorphic encryption based privacy-preserving scalar product computation (PPSPC) protocol, where the attributed- based access control can help a medical user in emergency to identify other medical users, and PPSPC protocol can further control only those medical users who have similar symptoms to participate in the opportunistic computing while without directly revealing users’ symptoms. Note that, although PPSPC protocols have been well studied in privacy-preserving data mining, yet most of them are relying on time-consuming homomorphic encryption technique. To the best of our knowledge, our novel non-homomorphic encryption based PPSPC protocol is the most efficient one in terms of computational and communication overheads. • Third, to validate the effectiveness of the proposed SPOC framework in m-Healthcare emergency, we also develop a custom simulator built in Java. Extensive simulation results show that the proposed SPOC framework can help medical users to balance the high-reliability of PHI process and minimizing the PHI privacy disclosure in m-Healthcare emergency ADVANTAGES OF PROPOSED SYSTEM: Shift from a clinic-oriented, centralized healthcare system to a patient oriented, distributed healthcare system Reduce healthcare expenses through more efficient use of clinical resources and earlier detection of medical conditions Challenges:
  • 5. Performance, Reliability, Scalability, QoS, Privacy, Security … More prone to failures, caused by power exhaustion, software and hardware faults, natural disasters, malicious attacks, and human errors etc. MODULES : 1. Pervasive health monitoring in M-Healthcare 2. Body Sensor Network 3. Security Analysis 4. Performance Evolution 5. Simulation Setup 6. Report Generation MODULES DESCRIPTION: Pervasive Health Monitoring in M-Healthcare In this module, each mobile medical user’s personal health information (PHI) such as heart beat, blood sugar level, blood pressure and temperature and others, can be first collected by BSN, and then aggregated by smart phone via Bluetooth. Finally, they are further transmitted to the remote healthcare center via 3G networks. Based on these collected PHI data, medical professionals at healthcare center can continuously monitor medical users’ health conditions and as well quickly react to users’ life-threatening situations and save their lives by dispatching ambulance and medical personnel to an emergency location in a timely fashion. Body Sensor Network In this module, Body area network (BAN), wireless body area network (WBAN) or body sensor network (BSN) are terms used to describe the application of wearable computing
  • 6. devices. This will enable wireless communication between several miniaturized body sensor units (BSU) and a single body central unit (BCU) worn at the human body. – Deploy wearable sensors on the bodies of patients in a residential setting – Continuously monitor physiological signals (such as ECG, blood oxygen Levels) and other health related information (such as physical activity) Security Analysis In this Module to develop a secure and privacy-preserving opportunistic computing framework to provide high reliability of PHI process and transmission while minimizing PHI privacy disclosure in m-Healthcare emergency. Specifically, we i) Apply opportunistic computing in m-Healthcare emergency to achieve high-reliability of PHI process and transmission; and ii) Develop user-centric privacy access control to minimize the PHI privacy disclosure. Performance Evolution In this module, the performance metrics used in the evaluation are : 1) The average number of qualified helpers (NQH), which indicates how many qualified helpers can participate in the opportunistic computing within a given time period, and 2) The average resource consumption ratio (RCR), which is defined as the fraction of the resources consumed by the medical user in emergency to the total resources consumed in opportunistic computing for PHI process within a given time period. Simulation Setup In this Module, the simulator implements the application layer under the assumptions that the communications between smart phones and the communications between BSNs and smart phones are always workable when they are within each other’s transmission ranges.
  • 7. Report generation In this module, Health care center generate crystal report from the database collection for future reference. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive: 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : Windows XP. • Coding Language : ASP.Net with C# • Data Base : SQL Server 2005 REFERENCE: Rongxing, Xiaodong Lin, and Xuemin (Sherman) Shen, “SPOC: A Secure and Privacy- preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency”, IEEE Transaction