SlideShare a Scribd company logo
1 of 7
Download to read offline
This article can be downloaded from http://www.iajlb.com/currentissue.php
1
This article can be downloaded from http://www.iajlb.com/currentissue.php
2
Indo-Am. J. of LifeSc & Bt., 2021 ISSN 2347-2243 www.iajlb.com
Vol.9, Issue.2, April 2021
© 2014 IAJLB. All Rights Reserved
A Novel Approach for Security Protection and Intrusion Avoidance
using Cloudlet-based Data Sharing in Medical
Parampreetkaur1,2*, VarinderSingh1,AmitArora3
Abstract
With the growing popularity of wearable technology and the development of mists and cloudlets, there
has never been a more pressing need to pay attention to therapeutics. Information acquisition,
stockpiling, and sharing are all part of the chain of information management in the medical field.
Conventional healthcare systems usually need the transmission of medical information to the cloud,
which includes the sensitive data of patients and consumes communication resources. Therapeutic
information exchange is, at its core, a fundamental and testable topic. As a result, the flexibility of
cloudlet is leveraged in this study to create a unique human services architecture. Information
exchange, data security, and interruption location are all components of cloudlet. We begin by encoding
the bodily data collected by wearable devices using the Number Theory Research Unit (NTRU) approach.
Data will be sent to nearby cloudlets in an energy efficient manner. In addition, we provide a trust
model to help customers identify trustworthy cloudlet partners who need to exchange put away
information. In addition, the trust show encourages patients to talk to one other about their illnesses. As
a last step, we divide our customers' rehabilitative information into three areas and ensure that it is
adequately protected. A unique synergistic interruption identification framework (IDS) approach based
on cloudlet work is developed to protect the social insurance framework from pernicious attacks, and it
can successfully protect the vast information cloud of remote medical services from attacks. The
suggested approach is adequate, according to our evaluations.
Keywords:Security, Cloud, NTRU, Healthcare, Data Sharing, IDS
1.Introduction
Because of clients' increasing demands on
health conferences, the growth of social
insurance enormous information and wearable
innovation as well as advances in dispersed
computing and correspondence, the use of the
cloud to register huge amounts of social
insurance enormous information become
1
DepartmentofCivilEngineering,GurukashiUniversity,TalwandiSabo,Bathinda,Punjab,India-152004.
2
DepartmentofCivilEngineering,ShaheedBhagatSinghStateTechnicalCampus,Ferozepur,Punjab,India-152004.
3
DepartmentofChemicalEngineering,ShaheedBhagatSinghStateTechnicalCampus,Ferozepur,Punjab,,India
This article can be downloaded from http://www.iajlb.com/currentissue.php
3
essential.. The problem, however, is to adapt
specialised medical care information for
individual clients in a relevant manner. Social
systems and social insurance administration
were suggested in prior study
as a means of stimulating the suggestion of
illness treatment for real-time infection data
recovery. For example, PatientsLikeMe is an
example of a social stage for medical services
that may acquire data from other similar
patients by sharing information that goes as far
as the client's own results. The fact that
patients and medical professionals benefit from
sharing medical information through social
media raises issues about the security and
safety of sensitive information. As a
consequence, medical information interchange
and security assurance becomes a difficult
challenge. Distributed computing developments
have made it possible to store a great deal of
information in different mists, including
cloudlets and distant mists, facilitating
information sharing and focused processing. To
be sure, the advent of information interchange
on the cloud raises several new and complex
issues.What is the best way to guarantee that
cloudlet data does not pose a security risk?
•Since electronic medical records (EMRs) and
cloud-based apps are becoming more common,
the security concerns associated with distant
clouds carrying social insurance data are
becoming more pressing. What's the best
strategy to secure the massive amounts of
medical data stored in a faraway cloud?
•How can the whole structure be properly
protected against malicious attacks?
This study presents a cloudlet-based paradigm
for human services in response to the aforesaid
concerns. Wearable electronics send data
acquired from the wearer's body to the cloudlet
next door. These details are then sent to a
distant cloud, where medical professionals may
view them in order to make a diagnosis.
According to the chain of transmission of
information,There are three stages to the
security assurance process that we break down.
Client vital indicators obtained by wearable
devices are transferred to a cloudlet storage
area door in the primary arrange. At this point,
the primary priority is ensuring the security of
sensitive information. Second, cloudlets will be
used to transmit client data to the distant cloud.
Several mobile phones create a cloudlet, and
the owners of those phones may need and
exchange some particular information material.
Security and information exchange are taken
into account at this step. We utilise the trust
model to determine whether or not to provide
information based on the amount of trust
between clients. When we consider that our
customers' medical information is stored in a
distant cloud, we divide it into distinct sorts and
compare their security arrangements.
Additionally, we take into account cloudlet-
based IDS as part of the cloud biological
system's three-phase information security
assurance.
1.1 RelatedWork
Due to an ageing global population and the
prevalence of seemingly endless illnesses,
telehome human services, which rely heavily on
the monitoring of vital signs, have grown in
popularity. As an example of remote patient
monitoring, a schematic of wearable
developments in condition of craftsmanship is
shown, followed by studies on a cuffle-type
pulse-meter and Bluetooth/spl exchange-based
ECG screen. In this project, we are trying to
create a tele-home social insurance framework
that leverages mobile devices, remote
communication technologies, and multisensor
information fusion. With this architecture, a
cuffless blood pressure metre has been
developed and tested on 30 patients in 71
preliminary tests over a five-month period.
Systolic weight ME and SDE are each 7.62
mmHg in the primer results, whereas diastolic
weight ME and SDE are each 0.45 mmHg and
5.27 mmHg in the primer results. Scholars and
business alike are excited about the potential of
cloud-supported digital physical frameworks
(CCPSs). Devices in the physical environment
(sensors, cameras, mouthpieces, speakers, and
GPS devices) are encouraged to be integrated
This article can be downloaded from http://www.iajlb.com/currentissue.php
4
with the internet on a regular basis using CCPS.
An extensive range of applications and
frameworks, for example patient or well-being
monitoring, may be developed using this
technology. Sensors and other physical devices
(e.g. GPS and remote neighbourhood) work
together to produce, perceive, break down, and
communicate vast volumes of information for
complicated tasks in these systems that include
several physical devices (e.g. sensors and other
physical devices). Although these frameworks
have several issues with regard to the location
of the patients, universal access, expansive
scale computation, and correspondence, it is
nevertheless possible to use these frameworks
effectively. A foundation or framework is now
required to allow for large-scale, continuous
information exchanges in the digital or cloud
domain while also providing flexibility and
universality. An approach to securing speech
and electroencephalogram movements using
mobile phones that is adaptive, consistent, and
productive is proposed here, supported by a
cloud-based digital physical restriction
framework. Using Gaussian blend
demonstrating for confinement, the suggested
technique has been shown to outperform
previous similar tactics in terms of blunder
estimation. Internet of Things (IoT)
advancements for networked restorative
devices and sensors have acquired a crucial role
in the cutting-edge pharmaceutical sector for
superior patient consideration.
There is a pressing need for a continual health-
checking foundation that analyses patients'
medical records in order to avoid needless
deaths among the ageing and disabled
population. In terms of recognising such
observations, the Human Services Industrial IoT
(HealthIIoT) has significant potential for
success. The term "HealthIIoT" refers to a
network of linked devices, apps, sensors, and
people working together as a cohesive unit to
monitor, track, and store patient medical data
for future reference. ECG and other medical
service information is captured by cell phones
and sensors and securely delivered to the cloud
for constant access by social insurance
specialists in this paper's HealthIIoT-
empowered checking framework. Social
insurance professionals will use flag upgrades,
watermarking, and other connected
investigations to keep a strategic distance from
data fraud or clinical error. For this technology
to be viable, it has to be tested in the field and
recreated in the cloud using an ECG-based
health monitoring service powered by the
Internet of Things. Facebook, MySpace, and
Twitter, among other informal groups, have
seen a dramatic rise in popularity in recent
years. With all of these OSNs, online social
networks and correspondences are appealing,
but they also raise worries about online safety.
Security and protection of OSNs are examined
in this article. We've discovered insurmountable
structural incompatibilities between these and
the traditional OSN plan goals, such as user
friendliness and simplicity of use. We discuss
the unique security and protection issues posed
by OSNs' core functions, as well as some
potential solutions based on informal
community hypotheses for resolving these
structural incompatibilities..
1.2 SystemDesign
This article can be downloaded from http://www.iajlb.com/currentissue.php
5
Figure1:SystemArchitecture
A cloudlet-based architecture for human
services is shown in Fig.1. Wearable
technologies, such as shrewd clothing, first
acquire the customer's physiological data. As
seen in Figure 1, these data are then sent to
cloudlet, which provides assurances of
information security and information exchange
for the pharmaceutical services industry.
2Implementation
2.1 MODULES
Cloud provider
1, patient 2, physician
4 Intruder
1. CloudServiceProvider
Using a significant client name and a secret
word, you may register and log in to the cloud
using this cloud specialist co-op module. If the
validation is successful, the cloud may add
experts and transmit the client's name and
secret phrase to the registered mail ids of
specialists. The cloud is able to discern the
minute differences between different
professionals. It is possible for cloud services to
view a patient's enrollment data, combined
with the information that the patient has sent
to the cloud. The cloud may view patients'
appointments and choose experts based on the
preferences of the customer.
2. Patient
Enrollment and login using the client name and
secret key are required for this module. In order
for the cloud service provider to view the
patient's profile, the patient must encrypt his or
her own personal information. The patient will
inquire for an appointment with a specialist and
check on the progress of the appointment..
3. Doctor
In the specialised module, a specialist may look
up their username and secret word in their
registered email address and use those
characteristics to log in. Inquiries and responses
from patients can be observed by the specialist.
4. Intruder
Unapproved clients that want to view
information but aren't allowed to approach it
may use the Gatecrasher module. When a
gatecrasher observes an information message
being delivered to a true client who has access
to the information, it is important to take
action.
2.2 ExperimentalResults
Figure2:HomePage
This article can be downloaded from http://www.iajlb.com/currentissue.php
6
Figure3:DoctorRegistrationForm
Figure4:PatientAppointment
Figure5:PatientHome
Figure6:CloudLogin
Figure7:AlertMessagesenttoMail
Conclusion
In this study, we investigated the topic of
cloudlet and distant cloud security protection
and exchanging considerable restorative
information. We created a system that prevents
clients from sending data to the distant cloud in
the interest of data security and minimal
communication costs. According to the
cloudlet's information sharing concern, it does
enable users to send information to it through
the cloudlet. To begin with, we may collect
client data through wearable devices, and to
guarantee the safety of our customers, we
employ the NTRU instrument to ensure that
their data is sent to the cloudlet in a secure
manner. Second, we employ a trust model to
determine whether or not to share data in the
cloudlet based on the trust level of our
customers.
Third, in order to ensure the safety of distant
cloud data, we package and encode the data in
multiple courses to provide information
assurance while also speeding up transmission
viability. For the first time, we present a system-
wide IDS that relies on cloudlet work.
Reenactments and tests aid in the approval of
the suggested strategies.
References
This article can be downloaded from http://www.iajlb.com/currentissue.php
7
[1In the Engineering in Medicine and Biology
Society's 2004 conference proceedings, K.
Hung, Y. Zhang, and B. Tai published "Wearable
medical devices for telehomehealthcare". Vol.
2.IEEE, pp. 5384–5387. IEMBS'04.26th Annual
International Conference of the IEEE, 2004.
"Cloud-based cyber–physical localisation
framework for patient monitoring," by M. S.
Hossain, 2015.
G-Hadoop provides a framework for securing
large data computation across dispersed cloud
data centres, as shown by a study published in
the Journal of Computer and System Sciences in
2014.
"Cloud-assisted industrial Internet of Things
(iiot)–enabled framework for health
monitoring," ComputerNetworks, vol. 101, pp.
192–202, 2016, by M. S. Hossain and G.
Muhammad.
IEEE, 2010 IEEE 3rd International Conference on
Cloud Computing (CLOUD), "Security concepts
and needs for healthcare application clouds,"
pp. 268–275.
K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X.
Zhang, "Deypos: Deduplicatable dynamic proof
of storage for multi-user environments,"2016.
WearableMicro and Nano Technologies for
Personalized Health (pHealth), 20096th
International Workshop on.IEEE, 2009, pp. 75–
78, L. Griffin and E. De Leastar, "Social
networking healthcare."
"Big video data for light-field-based 3D
telemedicine," IEEE Network, v. 30, n. 3, p. 30–
38, 2016.Xiang W, Wang G, Pickering M, Zhang
Y.
In "Privacy and security for online social
networks: problems and possibilities," by C.
Zhang et al., published in IEEE Network, vol. 24,
no. 4, 2010, pp. 13–18

More Related Content

Similar to journal papers.pdf

A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemBRNSSPublicationHubI
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...IJCSIS Research Publications
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET Journal
 
Access-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdfAccess-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdfmokamojah
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systemsijtsrd
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
topic-emerging technologies
topic-emerging technologiestopic-emerging technologies
topic-emerging technologiesAkhil Gopalam
 
An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...Made Artha
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET Journal
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx4934bk
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 

Similar to journal papers.pdf (20)

A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
A literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring SystemA literature Survey: Health-care Monitoring System
A literature Survey: Health-care Monitoring System
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Access-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdfAccess-2022-21976_Proof_hi.pdf
Access-2022-21976_Proof_hi.pdf
 
Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services
 
Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services Role of Technology & Importance in Tracking Healthcare Services
Role of Technology & Importance in Tracking Healthcare Services
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
topic-emerging technologies
topic-emerging technologiestopic-emerging technologies
topic-emerging technologies
 
An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...An automated health care computing model for continuous monitoring of patient...
An automated health care computing model for continuous monitoring of patient...
 
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
IRJET- An Information Forwarder for Healthcare Service and analysis using Big...
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docxMMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
MMHA 6600 WU Technology and The Future in Healthcare Discussion.docx
 
Cyber Physical System
Cyber Physical SystemCyber Physical System
Cyber Physical System
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 

More from KSAravindSrivastava

journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdfKSAravindSrivastava
 
journal of engineering and applied science.pdf
journal of engineering and applied science.pdfjournal of engineering and applied science.pdf
journal of engineering and applied science.pdfKSAravindSrivastava
 
indian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdfindian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdfKSAravindSrivastava
 
journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdfKSAravindSrivastava
 
indian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdfindian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdfKSAravindSrivastava
 
journal of engineering and applied science.pdf
journal of engineering and applied science.pdfjournal of engineering and applied science.pdf
journal of engineering and applied science.pdfKSAravindSrivastava
 
journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdfKSAravindSrivastava
 
journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdfKSAravindSrivastava
 
journal of engineering and applied science.pdf
journal of engineering and applied science.pdfjournal of engineering and applied science.pdf
journal of engineering and applied science.pdfKSAravindSrivastava
 
international research journal of engineering and technology.pdf
international research journal of engineering and technology.pdfinternational research journal of engineering and technology.pdf
international research journal of engineering and technology.pdfKSAravindSrivastava
 
ugc list of approved journals.pdf
ugc list of approved journals.pdfugc list of approved journals.pdf
ugc list of approved journals.pdfKSAravindSrivastava
 
scopus indexed journals list.pdf
scopus indexed journals list.pdfscopus indexed journals list.pdf
scopus indexed journals list.pdfKSAravindSrivastava
 
institute of mathematical sciences.pdf
institute of mathematical sciences.pdfinstitute of mathematical sciences.pdf
institute of mathematical sciences.pdfKSAravindSrivastava
 

More from KSAravindSrivastava (20)

journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdf
 
journal of engineering and applied science.pdf
journal of engineering and applied science.pdfjournal of engineering and applied science.pdf
journal of engineering and applied science.pdf
 
indian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdfindian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdf
 
journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdf
 
indian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdfindian journal of pharmaceutical science.pdf
indian journal of pharmaceutical science.pdf
 
journal of engineering and applied science.pdf
journal of engineering and applied science.pdfjournal of engineering and applied science.pdf
journal of engineering and applied science.pdf
 
journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdf
 
journal of applied science and engineering.pdf
journal of applied science and engineering.pdfjournal of applied science and engineering.pdf
journal of applied science and engineering.pdf
 
journal of engineering and applied science.pdf
journal of engineering and applied science.pdfjournal of engineering and applied science.pdf
journal of engineering and applied science.pdf
 
international research journal of engineering and technology.pdf
international research journal of engineering and technology.pdfinternational research journal of engineering and technology.pdf
international research journal of engineering and technology.pdf
 
materials science journal.pdf
materials science journal.pdfmaterials science journal.pdf
materials science journal.pdf
 
ugc list of approved journals.pdf
ugc list of approved journals.pdfugc list of approved journals.pdf
ugc list of approved journals.pdf
 
science research journal.pdf
science research journal.pdfscience research journal.pdf
science research journal.pdf
 
scientific report journal.pdf
scientific report journal.pdfscientific report journal.pdf
scientific report journal.pdf
 
scopus indexed journals list.pdf
scopus indexed journals list.pdfscopus indexed journals list.pdf
scopus indexed journals list.pdf
 
institute of mathematical sciences.pdf
institute of mathematical sciences.pdfinstitute of mathematical sciences.pdf
institute of mathematical sciences.pdf
 
scientific report journal.pdf
scientific report journal.pdfscientific report journal.pdf
scientific report journal.pdf
 
ugc journal.pdf
ugc journal.pdfugc journal.pdf
ugc journal.pdf
 
materials science journal.pdf
materials science journal.pdfmaterials science journal.pdf
materials science journal.pdf
 
science research journal.pdf
science research journal.pdfscience research journal.pdf
science research journal.pdf
 

Recently uploaded

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfSELF-EXPLANATORY
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |aasikanpl
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfSwapnil Therkar
 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayZachary Labe
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.aasikanpl
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxEran Akiva Sinbar
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫qfactory1
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaPraksha3
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzohaibmir069
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trssuser06f238
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxpriyankatabhane
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Patrick Diehl
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett SquareIsiahStephanRadaza
 

Recently uploaded (20)

Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdfBehavioral Disorder: Schizophrenia & it's Case Study.pdf
Behavioral Disorder: Schizophrenia & it's Case Study.pdf
 
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
Call Us ≽ 9953322196 ≼ Call Girls In Lajpat Nagar (Delhi) |
 
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdfAnalytical Profile of Coleus Forskohlii | Forskolin .pdf
Analytical Profile of Coleus Forskohlii | Forskolin .pdf
 
Welcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work DayWelcome to GFDL for Take Your Child To Work Day
Welcome to GFDL for Take Your Child To Work Day
 
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
Call Girls in Munirka Delhi 💯Call Us 🔝9953322196🔝 💯Escort.
 
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptxTwin's paradox experiment is a meassurement of the extra dimensions.pptx
Twin's paradox experiment is a meassurement of the extra dimensions.pptx
 
Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫Manassas R - Parkside Middle School 🌎🏫
Manassas R - Parkside Middle School 🌎🏫
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tantaDashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
Dashanga agada a formulation of Agada tantra dealt in 3 Rd year bams agada tanta
 
zoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistanzoogeography of pakistan.pptx fauna of Pakistan
zoogeography of pakistan.pptx fauna of Pakistan
 
Neurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 trNeurodevelopmental disorders according to the dsm 5 tr
Neurodevelopmental disorders according to the dsm 5 tr
 
Speech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptxSpeech, hearing, noise, intelligibility.pptx
Speech, hearing, noise, intelligibility.pptx
 
Engler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomyEngler and Prantl system of classification in plant taxonomy
Engler and Prantl system of classification in plant taxonomy
 
Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?Is RISC-V ready for HPC workload? Maybe?
Is RISC-V ready for HPC workload? Maybe?
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort ServiceHot Sexy call girls in  Moti Nagar,🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Moti Nagar,🔝 9953056974 🔝 escort Service
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Module 4: Mendelian Genetics and Punnett Square
Module 4:  Mendelian Genetics and Punnett SquareModule 4:  Mendelian Genetics and Punnett Square
Module 4: Mendelian Genetics and Punnett Square
 

journal papers.pdf

  • 1. This article can be downloaded from http://www.iajlb.com/currentissue.php 1
  • 2. This article can be downloaded from http://www.iajlb.com/currentissue.php 2 Indo-Am. J. of LifeSc & Bt., 2021 ISSN 2347-2243 www.iajlb.com Vol.9, Issue.2, April 2021 © 2014 IAJLB. All Rights Reserved A Novel Approach for Security Protection and Intrusion Avoidance using Cloudlet-based Data Sharing in Medical Parampreetkaur1,2*, VarinderSingh1,AmitArora3 Abstract With the growing popularity of wearable technology and the development of mists and cloudlets, there has never been a more pressing need to pay attention to therapeutics. Information acquisition, stockpiling, and sharing are all part of the chain of information management in the medical field. Conventional healthcare systems usually need the transmission of medical information to the cloud, which includes the sensitive data of patients and consumes communication resources. Therapeutic information exchange is, at its core, a fundamental and testable topic. As a result, the flexibility of cloudlet is leveraged in this study to create a unique human services architecture. Information exchange, data security, and interruption location are all components of cloudlet. We begin by encoding the bodily data collected by wearable devices using the Number Theory Research Unit (NTRU) approach. Data will be sent to nearby cloudlets in an energy efficient manner. In addition, we provide a trust model to help customers identify trustworthy cloudlet partners who need to exchange put away information. In addition, the trust show encourages patients to talk to one other about their illnesses. As a last step, we divide our customers' rehabilitative information into three areas and ensure that it is adequately protected. A unique synergistic interruption identification framework (IDS) approach based on cloudlet work is developed to protect the social insurance framework from pernicious attacks, and it can successfully protect the vast information cloud of remote medical services from attacks. The suggested approach is adequate, according to our evaluations. Keywords:Security, Cloud, NTRU, Healthcare, Data Sharing, IDS 1.Introduction Because of clients' increasing demands on health conferences, the growth of social insurance enormous information and wearable innovation as well as advances in dispersed computing and correspondence, the use of the cloud to register huge amounts of social insurance enormous information become 1 DepartmentofCivilEngineering,GurukashiUniversity,TalwandiSabo,Bathinda,Punjab,India-152004. 2 DepartmentofCivilEngineering,ShaheedBhagatSinghStateTechnicalCampus,Ferozepur,Punjab,India-152004. 3 DepartmentofChemicalEngineering,ShaheedBhagatSinghStateTechnicalCampus,Ferozepur,Punjab,,India
  • 3. This article can be downloaded from http://www.iajlb.com/currentissue.php 3 essential.. The problem, however, is to adapt specialised medical care information for individual clients in a relevant manner. Social systems and social insurance administration were suggested in prior study as a means of stimulating the suggestion of illness treatment for real-time infection data recovery. For example, PatientsLikeMe is an example of a social stage for medical services that may acquire data from other similar patients by sharing information that goes as far as the client's own results. The fact that patients and medical professionals benefit from sharing medical information through social media raises issues about the security and safety of sensitive information. As a consequence, medical information interchange and security assurance becomes a difficult challenge. Distributed computing developments have made it possible to store a great deal of information in different mists, including cloudlets and distant mists, facilitating information sharing and focused processing. To be sure, the advent of information interchange on the cloud raises several new and complex issues.What is the best way to guarantee that cloudlet data does not pose a security risk? •Since electronic medical records (EMRs) and cloud-based apps are becoming more common, the security concerns associated with distant clouds carrying social insurance data are becoming more pressing. What's the best strategy to secure the massive amounts of medical data stored in a faraway cloud? •How can the whole structure be properly protected against malicious attacks? This study presents a cloudlet-based paradigm for human services in response to the aforesaid concerns. Wearable electronics send data acquired from the wearer's body to the cloudlet next door. These details are then sent to a distant cloud, where medical professionals may view them in order to make a diagnosis. According to the chain of transmission of information,There are three stages to the security assurance process that we break down. Client vital indicators obtained by wearable devices are transferred to a cloudlet storage area door in the primary arrange. At this point, the primary priority is ensuring the security of sensitive information. Second, cloudlets will be used to transmit client data to the distant cloud. Several mobile phones create a cloudlet, and the owners of those phones may need and exchange some particular information material. Security and information exchange are taken into account at this step. We utilise the trust model to determine whether or not to provide information based on the amount of trust between clients. When we consider that our customers' medical information is stored in a distant cloud, we divide it into distinct sorts and compare their security arrangements. Additionally, we take into account cloudlet- based IDS as part of the cloud biological system's three-phase information security assurance. 1.1 RelatedWork Due to an ageing global population and the prevalence of seemingly endless illnesses, telehome human services, which rely heavily on the monitoring of vital signs, have grown in popularity. As an example of remote patient monitoring, a schematic of wearable developments in condition of craftsmanship is shown, followed by studies on a cuffle-type pulse-meter and Bluetooth/spl exchange-based ECG screen. In this project, we are trying to create a tele-home social insurance framework that leverages mobile devices, remote communication technologies, and multisensor information fusion. With this architecture, a cuffless blood pressure metre has been developed and tested on 30 patients in 71 preliminary tests over a five-month period. Systolic weight ME and SDE are each 7.62 mmHg in the primer results, whereas diastolic weight ME and SDE are each 0.45 mmHg and 5.27 mmHg in the primer results. Scholars and business alike are excited about the potential of cloud-supported digital physical frameworks (CCPSs). Devices in the physical environment (sensors, cameras, mouthpieces, speakers, and GPS devices) are encouraged to be integrated
  • 4. This article can be downloaded from http://www.iajlb.com/currentissue.php 4 with the internet on a regular basis using CCPS. An extensive range of applications and frameworks, for example patient or well-being monitoring, may be developed using this technology. Sensors and other physical devices (e.g. GPS and remote neighbourhood) work together to produce, perceive, break down, and communicate vast volumes of information for complicated tasks in these systems that include several physical devices (e.g. sensors and other physical devices). Although these frameworks have several issues with regard to the location of the patients, universal access, expansive scale computation, and correspondence, it is nevertheless possible to use these frameworks effectively. A foundation or framework is now required to allow for large-scale, continuous information exchanges in the digital or cloud domain while also providing flexibility and universality. An approach to securing speech and electroencephalogram movements using mobile phones that is adaptive, consistent, and productive is proposed here, supported by a cloud-based digital physical restriction framework. Using Gaussian blend demonstrating for confinement, the suggested technique has been shown to outperform previous similar tactics in terms of blunder estimation. Internet of Things (IoT) advancements for networked restorative devices and sensors have acquired a crucial role in the cutting-edge pharmaceutical sector for superior patient consideration. There is a pressing need for a continual health- checking foundation that analyses patients' medical records in order to avoid needless deaths among the ageing and disabled population. In terms of recognising such observations, the Human Services Industrial IoT (HealthIIoT) has significant potential for success. The term "HealthIIoT" refers to a network of linked devices, apps, sensors, and people working together as a cohesive unit to monitor, track, and store patient medical data for future reference. ECG and other medical service information is captured by cell phones and sensors and securely delivered to the cloud for constant access by social insurance specialists in this paper's HealthIIoT- empowered checking framework. Social insurance professionals will use flag upgrades, watermarking, and other connected investigations to keep a strategic distance from data fraud or clinical error. For this technology to be viable, it has to be tested in the field and recreated in the cloud using an ECG-based health monitoring service powered by the Internet of Things. Facebook, MySpace, and Twitter, among other informal groups, have seen a dramatic rise in popularity in recent years. With all of these OSNs, online social networks and correspondences are appealing, but they also raise worries about online safety. Security and protection of OSNs are examined in this article. We've discovered insurmountable structural incompatibilities between these and the traditional OSN plan goals, such as user friendliness and simplicity of use. We discuss the unique security and protection issues posed by OSNs' core functions, as well as some potential solutions based on informal community hypotheses for resolving these structural incompatibilities.. 1.2 SystemDesign
  • 5. This article can be downloaded from http://www.iajlb.com/currentissue.php 5 Figure1:SystemArchitecture A cloudlet-based architecture for human services is shown in Fig.1. Wearable technologies, such as shrewd clothing, first acquire the customer's physiological data. As seen in Figure 1, these data are then sent to cloudlet, which provides assurances of information security and information exchange for the pharmaceutical services industry. 2Implementation 2.1 MODULES Cloud provider 1, patient 2, physician 4 Intruder 1. CloudServiceProvider Using a significant client name and a secret word, you may register and log in to the cloud using this cloud specialist co-op module. If the validation is successful, the cloud may add experts and transmit the client's name and secret phrase to the registered mail ids of specialists. The cloud is able to discern the minute differences between different professionals. It is possible for cloud services to view a patient's enrollment data, combined with the information that the patient has sent to the cloud. The cloud may view patients' appointments and choose experts based on the preferences of the customer. 2. Patient Enrollment and login using the client name and secret key are required for this module. In order for the cloud service provider to view the patient's profile, the patient must encrypt his or her own personal information. The patient will inquire for an appointment with a specialist and check on the progress of the appointment.. 3. Doctor In the specialised module, a specialist may look up their username and secret word in their registered email address and use those characteristics to log in. Inquiries and responses from patients can be observed by the specialist. 4. Intruder Unapproved clients that want to view information but aren't allowed to approach it may use the Gatecrasher module. When a gatecrasher observes an information message being delivered to a true client who has access to the information, it is important to take action. 2.2 ExperimentalResults Figure2:HomePage
  • 6. This article can be downloaded from http://www.iajlb.com/currentissue.php 6 Figure3:DoctorRegistrationForm Figure4:PatientAppointment Figure5:PatientHome Figure6:CloudLogin Figure7:AlertMessagesenttoMail Conclusion In this study, we investigated the topic of cloudlet and distant cloud security protection and exchanging considerable restorative information. We created a system that prevents clients from sending data to the distant cloud in the interest of data security and minimal communication costs. According to the cloudlet's information sharing concern, it does enable users to send information to it through the cloudlet. To begin with, we may collect client data through wearable devices, and to guarantee the safety of our customers, we employ the NTRU instrument to ensure that their data is sent to the cloudlet in a secure manner. Second, we employ a trust model to determine whether or not to share data in the cloudlet based on the trust level of our customers. Third, in order to ensure the safety of distant cloud data, we package and encode the data in multiple courses to provide information assurance while also speeding up transmission viability. For the first time, we present a system- wide IDS that relies on cloudlet work. Reenactments and tests aid in the approval of the suggested strategies. References
  • 7. This article can be downloaded from http://www.iajlb.com/currentissue.php 7 [1In the Engineering in Medicine and Biology Society's 2004 conference proceedings, K. Hung, Y. Zhang, and B. Tai published "Wearable medical devices for telehomehealthcare". Vol. 2.IEEE, pp. 5384–5387. IEMBS'04.26th Annual International Conference of the IEEE, 2004. "Cloud-based cyber–physical localisation framework for patient monitoring," by M. S. Hossain, 2015. G-Hadoop provides a framework for securing large data computation across dispersed cloud data centres, as shown by a study published in the Journal of Computer and System Sciences in 2014. "Cloud-assisted industrial Internet of Things (iiot)–enabled framework for health monitoring," ComputerNetworks, vol. 101, pp. 192–202, 2016, by M. S. Hossain and G. Muhammad. IEEE, 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD), "Security concepts and needs for healthcare application clouds," pp. 268–275. K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, "Deypos: Deduplicatable dynamic proof of storage for multi-user environments,"2016. WearableMicro and Nano Technologies for Personalized Health (pHealth), 20096th International Workshop on.IEEE, 2009, pp. 75– 78, L. Griffin and E. De Leastar, "Social networking healthcare." "Big video data for light-field-based 3D telemedicine," IEEE Network, v. 30, n. 3, p. 30– 38, 2016.Xiang W, Wang G, Pickering M, Zhang Y. In "Privacy and security for online social networks: problems and possibilities," by C. Zhang et al., published in IEEE Network, vol. 24, no. 4, 2010, pp. 13–18