Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcare applications including some proposed projects which have been done recently.
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
Abstract
In cloud computing system ,data is stimulated to a distantly placed cloud server. Cloud provisions the information authentically and go back to the proprietor whenever wanted. But there is no assurance that information store in the cloud is protected and not changed by cloud . In order to defeat the danger of honesty of data, the user must be able to use the help of Third party Auditor(TPA).TPA has understanding in inspection honesty of the information, that clouds users does not have, and that is difficult for the owner to check .The data in the cloud should be exact ,reliable ,available and elevated excellence.[1]This paper is to address this important problem related to the data integrity and design a cloud assisted privacy preserving mobile-health monitoring system to protect the privacy of the involved parties and their data. for that purpose we have used the algorithms:1)Tate pairing 2)Token generation 3)AES(Advanced Encryption Standards)-SHA1 and MD5.
Keywords— Data integrity,TPA,Tate pairing, Cryptography
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
IoT is the advanced technology which is use in daily life. IoT make easy to connect different smart devices with
each other by using the internet. IOT is given the ability to computer system to run application program from different
vendors. So in this paper we are accessing the data based on IoT technology for emergency medical services. The fast
development of Internet of Thing.
This is particularly the case on e Health monitoring applications for chronic patients, Where Patients
monitoring refers to a continuous observation of patient’s condition (physiological and physical) traditionally
performed by one or several body sensors. The architecture for this system is based on medical sensors which
measure patients’ physical parameters by using wireless sensor networks (WSNs). These sensors transfer data
from patients’ bodies over the wireless network to the cloud environment. The system is aimed to prevent delays
in the arrival of patients’ medical information to the healthcare providers, Therefore, patients will have a high
quality services because the e heath smart system supports medical staff by providing real-time data gathering,
eliminating manual data collection, enabling the monitoring of huge numbers of patients. We underline the
necessity of the analysis of data quality on e-Health applications, especially concerning remote monitoring and
assistance of patients with chronic diseases.
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...ijtsrd
Nowadays, many researchers are contributing their research in the field of Internet of things IOT , since it is important and attractive technology. IOT means communication between human to device or device to device, anywhere in real time. This communication takes place with the help of different smart sensors which are connected via internet. In the IOT infrastructure different sensors can sense, analyse, transmit and store all the datas on cloud. This paper presents a wearable sensor network system for Internet of Things IoT connected safety and health applications. The wearable sensors on different subjects can communicate with each other and transmit the data to a gateway via a Local Area Network which forms a heterogeneous IoT platform with wifi based medical signal sensing network. It consists of two sections the basic information and condition of patient is collected in the wagon by the means IoT Internet of Things and make it available to hospital before the emergency vehicle reaches the hospital. On the base of such data, the system is able to detect anomalous situations and provide information about the status directly and exclusively to the hospital. The second path is control of traffic lights from the wagon and makes free for its path automatically. This project is to save the time of major late time aspects in more efficient manner and save the life. Mrs. S. Kirthica | Mrs. S. Priyadharsini "Design and Implementation of Smart Monitoring Systems in Hospital Wagon using IoT Technology: A Case Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31731.pdf Paper Url :https://www.ijtsrd.com/mathemetics/other/31731/design-and-implementation-of-smart-monitoring-systems-in-hospital-wagon-using-iot-technology-a-case-study/mrs-s-kirthica
A more secure and reliable protocol for wireless patient monitoring systemeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
Body Sensor Networks have considerably facilitated the continuous measurement of physiological
parameters of human body. The sensors used to measure the body parameters, have several limitations
in terms of power, computation capability, memory and communication capability. In this paper a novel
architecture has been proposed to ensure continuous, unobtrusive and remote patient monitoring, taking
into account the inherent hardware constraints of the sensors. The proposed architecture would enable
senior citizens, patients with chronic ailments and patients requiring post-operative care to be remotely
monitored in the comfort of their homes. Security threats and challenges inherent to wireless
communication of sensor data have been discussed and a security mechanism to ensure data
confidentiality, integrity and authentication has been proposed.
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Speeding up Healthcare Application with HTTP/2CitiusTech
Healthcare data is being increasingly accessed over the public internet. With the rapid adoption of EHRs and patient portals, more and more healthcare technology providers are looking at providing the same features over the internet in a SaaS model to reduce feature to market time. As they embrace trends and begin supporting new use cases such as wearables, mobile health, AI and chat bots, more data gets transferred over the same public internet infrastructure
Secondly, there is a pressing need to optimize the time healthcare professionals spend on IT per patient instead of patient care. Hence, getting timely and accurate information is of utmost importance to ensure better patient care.
Patient engagement initiatives such as patient education, medication and visit reminder, positively impact patient outcomes and are a huge success if the applications built for the same provide seamless user experience. Internet based applications rely on HTTP. As web application became more prevalent, inefficiencies of HTTP need to be addressed. HTTP/2 (Hypertext Transfer Protocol Version 2) is the update to HTTP protocol that has been built with the aim of improving performance and reducing end user perceived latency, reducing network and server resource usage.This document introduces the features and benefits of HTTP/2 and how you can start using HTTP/2
Along with improvement of clouds, cloudlet and wearable devices, it becomes necessary to provide better medical information sharing over the internet. As we know, sharing medical information is very critical and challenging issue because medical information contains patient’s delicate information. The medical information sharing mainly includes collection, storage and sharing of medical information over the internet. In existing healthcare framework, patient asks health query/question which is being answered by multiple doctors. The user is provided with correct answer with the help of truth discovery method. The medical information and history of patient is directly delivered to the remote cloud. The paper proposes system to provide confidentiality of medical information and protect healthcare system from intrusion. In this proposed system, during the medical information collection stage, the Number Theory Research Unit (NTRU) algorithm is used to encrypt user’s vital signs collected various sensors. Then to protect medical information stored at remote cloud against the malicious attacks, a Collaborative Intrusion Detection System (CIDS) built on cloudlet mesh is proposed. Medical Knowledge Extraction (MKE) System is proposed to provide most reliable answer to the user’s health related query. MKE extract the medical knowledge from noisy query-answers pairs and estimate the trustworthiness degree and doctor expertise using truth discovery method.
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...IJERA Editor
Health organizations are beginning to move mobile commerce services in recent years to enhance services and quality without spending much investment for IT infrastructure. Medical records are very sensitive and private to any individuals. Hence effective security mechanism is required. The challenges of our research work are to maintain privacy for the users and provide smart and secure environment for accessing the application. It is achieved with the help of personalization. Internet has provided the way for personalization. Personalization is a term which refers to the delivery of information that is relevant to individual or group of individuals in the format, layout specified and in time interval. In this paper we propose an Ontology Based Access Control (OBAC) Model that can address the permitted access control among the service providers and users. Personal Health Records sharing is highly expected by the users for the acceptance in mobile commerce applications in health care systems.
Accessing Information of Emergency Medical Services through Internet of ThingsIJARIIT
IoT is the advanced technology which is use in daily life. IoT make easy to connect different smart devices with
each other by using the internet. IOT is given the ability to computer system to run application program from different
vendors. So in this paper we are accessing the data based on IoT technology for emergency medical services. The fast
development of Internet of Thing.
This is particularly the case on e Health monitoring applications for chronic patients, Where Patients
monitoring refers to a continuous observation of patient’s condition (physiological and physical) traditionally
performed by one or several body sensors. The architecture for this system is based on medical sensors which
measure patients’ physical parameters by using wireless sensor networks (WSNs). These sensors transfer data
from patients’ bodies over the wireless network to the cloud environment. The system is aimed to prevent delays
in the arrival of patients’ medical information to the healthcare providers, Therefore, patients will have a high
quality services because the e heath smart system supports medical staff by providing real-time data gathering,
eliminating manual data collection, enabling the monitoring of huge numbers of patients. We underline the
necessity of the analysis of data quality on e-Health applications, especially concerning remote monitoring and
assistance of patients with chronic diseases.
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
Design and Implementation of Smart Monitoring Systems in Hospital Wagon using...ijtsrd
Nowadays, many researchers are contributing their research in the field of Internet of things IOT , since it is important and attractive technology. IOT means communication between human to device or device to device, anywhere in real time. This communication takes place with the help of different smart sensors which are connected via internet. In the IOT infrastructure different sensors can sense, analyse, transmit and store all the datas on cloud. This paper presents a wearable sensor network system for Internet of Things IoT connected safety and health applications. The wearable sensors on different subjects can communicate with each other and transmit the data to a gateway via a Local Area Network which forms a heterogeneous IoT platform with wifi based medical signal sensing network. It consists of two sections the basic information and condition of patient is collected in the wagon by the means IoT Internet of Things and make it available to hospital before the emergency vehicle reaches the hospital. On the base of such data, the system is able to detect anomalous situations and provide information about the status directly and exclusively to the hospital. The second path is control of traffic lights from the wagon and makes free for its path automatically. This project is to save the time of major late time aspects in more efficient manner and save the life. Mrs. S. Kirthica | Mrs. S. Priyadharsini "Design and Implementation of Smart Monitoring Systems in Hospital Wagon using IoT Technology: A Case Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-5 , August 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31731.pdf Paper Url :https://www.ijtsrd.com/mathemetics/other/31731/design-and-implementation-of-smart-monitoring-systems-in-hospital-wagon-using-iot-technology-a-case-study/mrs-s-kirthica
A more secure and reliable protocol for wireless patient monitoring systemeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
SECURITY ARCHITECTURE FOR AT-HOME MEDICAL CARE USING BODY SENSOR NETWORKijasuc
Body Sensor Networks have considerably facilitated the continuous measurement of physiological
parameters of human body. The sensors used to measure the body parameters, have several limitations
in terms of power, computation capability, memory and communication capability. In this paper a novel
architecture has been proposed to ensure continuous, unobtrusive and remote patient monitoring, taking
into account the inherent hardware constraints of the sensors. The proposed architecture would enable
senior citizens, patients with chronic ailments and patients requiring post-operative care to be remotely
monitored in the comfort of their homes. Security threats and challenges inherent to wireless
communication of sensor data have been discussed and a security mechanism to ensure data
confidentiality, integrity and authentication has been proposed.
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Speeding up Healthcare Application with HTTP/2CitiusTech
Healthcare data is being increasingly accessed over the public internet. With the rapid adoption of EHRs and patient portals, more and more healthcare technology providers are looking at providing the same features over the internet in a SaaS model to reduce feature to market time. As they embrace trends and begin supporting new use cases such as wearables, mobile health, AI and chat bots, more data gets transferred over the same public internet infrastructure
Secondly, there is a pressing need to optimize the time healthcare professionals spend on IT per patient instead of patient care. Hence, getting timely and accurate information is of utmost importance to ensure better patient care.
Patient engagement initiatives such as patient education, medication and visit reminder, positively impact patient outcomes and are a huge success if the applications built for the same provide seamless user experience. Internet based applications rely on HTTP. As web application became more prevalent, inefficiencies of HTTP need to be addressed. HTTP/2 (Hypertext Transfer Protocol Version 2) is the update to HTTP protocol that has been built with the aim of improving performance and reducing end user perceived latency, reducing network and server resource usage.This document introduces the features and benefits of HTTP/2 and how you can start using HTTP/2
Along with improvement of clouds, cloudlet and wearable devices, it becomes necessary to provide better medical information sharing over the internet. As we know, sharing medical information is very critical and challenging issue because medical information contains patient’s delicate information. The medical information sharing mainly includes collection, storage and sharing of medical information over the internet. In existing healthcare framework, patient asks health query/question which is being answered by multiple doctors. The user is provided with correct answer with the help of truth discovery method. The medical information and history of patient is directly delivered to the remote cloud. The paper proposes system to provide confidentiality of medical information and protect healthcare system from intrusion. In this proposed system, during the medical information collection stage, the Number Theory Research Unit (NTRU) algorithm is used to encrypt user’s vital signs collected various sensors. Then to protect medical information stored at remote cloud against the malicious attacks, a Collaborative Intrusion Detection System (CIDS) built on cloudlet mesh is proposed. Medical Knowledge Extraction (MKE) System is proposed to provide most reliable answer to the user’s health related query. MKE extract the medical knowledge from noisy query-answers pairs and estimate the trustworthiness degree and doctor expertise using truth discovery method.
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...IJERA Editor
Health organizations are beginning to move mobile commerce services in recent years to enhance services and quality without spending much investment for IT infrastructure. Medical records are very sensitive and private to any individuals. Hence effective security mechanism is required. The challenges of our research work are to maintain privacy for the users and provide smart and secure environment for accessing the application. It is achieved with the help of personalization. Internet has provided the way for personalization. Personalization is a term which refers to the delivery of information that is relevant to individual or group of individuals in the format, layout specified and in time interval. In this paper we propose an Ontology Based Access Control (OBAC) Model that can address the permitted access control among the service providers and users. Personal Health Records sharing is highly expected by the users for the acceptance in mobile commerce applications in health care systems.
A framework for secure healthcare systems based on big data analytics in mobi...ijasa
In this paper we introduce a framework for Healthcare Information Systems (HISs) based on big data
analytics in mobile cloud computing environments. This framework provides a high level of integration,
interoperability, availability and sharing of healthcare data among healthcare providers, patients, and
practitioners. Electronic Medical Records (EMRs) of patients dispersed among different Care Delivery
Organizations (CDOs) are integrated and stored in the Cloud storage area, this creates an Electronic
Health Records (EHRs) for each patient. Mobile Cloud allows fast Internet access and provision of EHRs
from anywhere and at any time via different platforms. Due to the massive size of healthcare data, the
exponential increase in the speed in which this data is generated and the complexity of healthcare data
type, the proposed framework employs big data analytics to find useful insights that help practitioners take
critical decisions in the right time. In addition, our proposed framework applies a set of security
constraints and access control that guarantee integrity, confidentiality, and privacy of medical information.
We believe that the proposed framework paves the way for a new generation of lower cost, more efficient
healthcare systems.
JAVA 2013 IEEE PARALLELDISTRIBUTION PROJECT Spoc a secure and privacy preserv...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
International Journal of Engineering Research and Applications (IJERA) aims to cover the latest outstanding developments in the field of all Engineering Technologies & science.
International Journal of Engineering Research and Applications (IJERA) is a team of researchers not publication services or private publications running the journals for monetary benefits, we are association of scientists and academia who focus only on supporting authors who want to publish their work. The articles published in our journal can be accessed online, all the articles will be archived for real time access.
Our journal system primarily aims to bring out the research talent and the works done by sciaentists, academia, engineers, practitioners, scholars, post graduate students of engineering and science. This journal aims to cover the scientific research in a broader sense and not publishing a niche area of research facilitating researchers from various verticals to publish their papers. It is also aimed to provide a platform for the researchers to publish in a shorter of time, enabling them to continue further All articles published are freely available to scientific researchers in the Government agencies,educators and the general public. We are taking serious efforts to promote our journal across the globe in various ways, we are sure that our journal will act as a scientific platform for all researchers to publish their works online.
Security Issues in Biomedical Wireless Sensor Networks Applications: A SurveyIJARTES
Abstract The use of wireless sensor networks in healthcare
applications is growing in a fast pace. Numerous applications
such as heart rate monitor, blood pressure monitor and
endoscopic capsule are already in use. To address the growing
use of sensor technology in this area, a new field known as
wireless body area networks has emerged. As most devices
and their applications are wireless in nature, security and
privacy concerns are among major areas of concern. Body
area networks can collect information about an individual’s
health, fitness and energy expenditure. Comprising body
sensors that communicate wirelessly with the patients
control device for monitoring and external communication.
This paper provides the challenges of using the wireless
sensor network in biomedical field and how to solve most of
these issues. To analyze the different security strategies in
Wireless Sensor Networks and propose this system to give
highest quality medical care with full security in their
reliability
Ubiquitous Information Forwarder for Personal Healthcare Data in Cloud Comput...paperpublications3
Abstract: Today total world use Smart phones, with an increasingly mobile society and the worldwide deployment of mobile and wireless networks the wireless communications can support many current and emerging healthcare applications. It could fulfil the vision of Patient Self-Controllable and Multi Level Privacy Preserving or healthcare to anyone, anytime, and anywhere by removing place, time and other restraints while increasing both the coverage and the quality. This present applications provide the requirements of pervasive healthcare systems, wireless networking solutions , many important research problem and this applications also include pervasive health monitoring, intelligent emergency management system. Here, the present design and development of a pervasive health system enabling self-management of chronic patients during their daily activities. Directly approved physicians the indirectly approved physicians and therefore the unauthorized persons in medical consultation will severally decipher the private health data and or verify patient’s identities by satisfying the access tree with their own symptoms.
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
Emerging Threats and Countermeasures - Digital health is the convergence of digital technology in healthcare. The emerging technology and the use of innovations are needed in healthcare for advancements and better outcomes. With the use of innovations, new threats and challenges are emerging in the industry which needs to be managed for efficient operations.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
UBIQUITOUS HEALTHCARE MONITORING SYSTEM USING INTEGRATED TRIAXIAL ACCELEROMET...ijujournal
Ubiquitous healthcare has become one of the prominent areas of research inorder to address the
challenges encountered in healthcare environment. In contribution to this area, this study developed a
system prototype that recommends diagonostic services based on physiological data collected in real time
from a distant patient. The prototype uses WBAN body sensors to be worn by the individual and an android
smart phone as a personal server. Physiological data is collected and uploaded to a Medical Health
Server (MHS) via GPRS/internet to be analysed. Our implemented prototype monitors the activity, location
and physiological data such as SpO2 and Heart Rate (HR) of the elderly and patients in rehabilitation. The
uploaded information can be accessed in real time by medical practitioners through a web application.
Predictive Data Mining for Converged Internet ofJames Kang
Kang, J. J., Adibi, S., Larkin, H., & Luan, T. (2016). Predictive data mining for Converged Internet of Things: A Mobile Health perspective. In Telecommunication Networks and Applications Conference (ITNAC), 2015 International (pp. 5-10). IEEE Xplore: IEEE. doi: http://dx.doi.org/10.1109/ATNAC.2015.7366781
Ecis final paper-june2017_two way architecture between iot sensors and cloud ...Oliver Neuland
Improving health care with IoT - Research into a weight monitoring bed - ECIS 2017 paper.
Resulting from smart furniture applications research project in Germany, Oliver Neuland and partners from AUT developed a smart bed concept which utilizes weight monitoring for AAL and elderly care. Initially strategies were applied to find meaningful use cases, later a prototype was developed. Here a paper presented during ECIS in Portugal which describes the architecture of the prototype.
The worldwide network of internet of things (IOT) combined with advancements in sensor networks, FID and software platform connects objects of various application fields and technology. IOT is most commonly described as an ecosystem of technologies but it requires necessary components to enable communication between devices and objects. Components being RFID and sensors. Many organization have already implemented IOT. Healthcare industry too have adopted IOT and can be extensively used in the future for the benefit of patients, elderly people and caregivers. A new concept named 'Health Internet of Things (HIOT)' was proposed to exploit sensor technologies and wireless networks in monitoring medical conditions. Also advancements in E textile technologies make the textile multifunctional, adaptive and responsive system which combined with IOT performs functions such as communication, computation and health care benefits. Cloud is used to store, control and retrieve or transform or classify information. The use of cloud based application in healthcare industries is constantly growing to benefit patients so that they can monitor their health, store and share records. This paper aims at developing a dependable, productive, high performance and assured smart healthcare system to deliver service to patients avoiding health risks using e textile technologies
Similar to SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS (20)
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
1. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
DOI : 10.5121/ijscai.2013.2203 39
SECURED FRAMEWORK FOR PERVASIVE
HEALTHCARE MONITORING SYSTEMS
N Rukma Rekha1
and Prof.M.S.PrasadBabu2
1
Department of CIS, University of Hyderabad, India
rukmarekha@gmail.com
2
Department of CSSE, Andhra University, India
msprasadbabu@yahoo.co.in
ABSTRACT
‘Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
KEYWORDS
Pervasive computing, Health Monitoring, Encryption, Light Weight Cryptography
1. INTRODUCTION
The recent advances in Science & Technology have changed the life style and provide
prolonged life span of the people. Pervasive Computing is one such modern technology, which
is slowly merging in to the background and makes the user least distracted about the technology
[1]. Pervasive applications enable the user to make use of the advanced technology to improve
his living standards everywhere and at every point of time. Pervasive applications enhance the
user friendliness of a system with maximum automation and minimal user involvement. The
most promising applications of pervasive computing are pervasive health care, smart homes,
and transportation applications with the aid of vehicle sensors, national defense applications
and environment monitoring systems. Pervasive healthcare applications include pervasive
health monitoring, intelligent emergency management systems, pervasive healthcare data
access, and ubiquitous mobile telemedicine [12]. This present work is focused on providing
security solutions in pervasive healthcare monitoring systems.
The outline of this paper is as follows: An overview of the pervasive environment in health care
applications that are available in literature and its security aspects are presented in Section 2.
Proposed Pervasive Healthcare Monitoring (PHM) system and its architecture are given in
Section 3 and Section 4. Section 5 discusses about the implementation details of the PHM
system. Section 6 presents the performance analysis of the system. Concluding remarks are
given at the end.
2. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
40
2. RELATED WORK ON PERVASIVE HEALTHCARE
SYSTEMS
Elham et.al [10] proposed a system on health care which is based on Electronic Medical Record
database that coordinates application services over network to form a service environment for
medical and healthcare. But every person in the system namely doctors, nurses and patients are
supposed to carry an RFID tag to access the pervasive environment. Usage of RFID technology
and implantation of different sensors and monitoring devices in the pervasive hospital system
may not be feasible instantly.
Andre Canha et.al [11] dealt with two systems namely Altcare and SmartCondo for pervasive
healthcare in smart home. They monitor every movement of the patient and store the data.
Additional infrastructure such as installation of cameras everywhere in the home, maintaining
data base of 2D and 3D pictures along with the privacy of the patient are debatable issues here.
Upkar Varshney [12] developed wireless patient monitoring system using wireless LANs and
adhoc networks. Xiaohui Liang et al [13] introduced a Remote Health Monitoring (RHM)
system which sends data from users wearable sensors to the personal server. Then, through any
wireless connection, the data are sent through an internet gateway and the RHM servers, to a
remote medical doctor’s site for real-time diagnosis, and then updated in database.
Rusyaizila Ramli et.al [15] has proposed an architecture that can be used to develop a
privacy-sensitive application for the end users where the users can frame their own
privacy policies. Changyu Dong et.al [16] implemented a privacy preserving trust
negotiation protocol using Extended Trust Target Graph (ETTG) protocol that
establishes mutual trust between interacting parties if their access-control and
disclosure policies comply.
Anastasios Fragopoulos et.al [17] developed a system using MPEG-21 Intellectual Property
Management and Protection (IPMP) components which are used to protect transmitted medical
information and enhance patient’s privacy.
Munirul Haque et.al [19] discussed the various open issues in the security of pervasive
computing. Importance of security and the role of authentication in a pervasive environment
for the security of the data being communicated were discussed. Venkatasubramanian and
Gupta [18] made a survey on security solutions for pervasive healthcare. They mentioned that
cryptographic primitives may be used for securing data and for establishment of secure
communication between two entities. Satyanarayanan [2] while discussing about the different
challenges mentioned that privacy is the biggest thorn in pervasive environment.
RukmaRekha and M.S. Prasad Babu [26] have proposed a light weight asymmetric
cryptographic algorithm suitable to pervasive applications and applied for SMS banking
application. This paper mainly deals with application of light weight asymmetric cryptography
algorithm, proposed in [26], to pervasive healthcare applications. In addition, a new
authentication layer is introduced for PHMS. The features of the proposed system are given in
the following sections.
3. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
41
3. PERVASIVE HEALTHCARE MONITORING SYSTEM
(PHMS)
Pervasive healthcare monitoring applications provide continuous health monitoring to patients
at high risk of falls and with chronic diseases such as cardiovascular disease, arthritis, diabetes,
diminished hearing and eyesight, Parkinson’s etc. [13]. Aged people, who are vulnerable to
helplessness may also avail PHMS services by staying at home and is also relatively
economical. By deploying body sensors on, or around the human body, the fundamental bio
medical health parameters can be measured in a situation where diagnostic equipment and
standard medical examination procedures are not available.
Mobile phones can be used as communication devices and the ubiquity of communication
between mobile and healthcare server makes pervasive healthcare overcome time and location
barriers. Cost of the health care being economical, accessibility of expert care to more people,
making health care more personalized are the various reasons for the prominence of pervasive
healthcare monitoring systems [8].
Medical information of the patients is highly sensitive data which needs data privacy as users
will not compromise unauthorized access to their personal data [14]. Also pervasive health care
solutions come with legal and ethical issues on inappropriate disclosure of user’s personal
medical data.
4. PROPOSED SYSTEM ARCHITECTURE
The proposed ‘Pervasive Healthcare Monitoring System’ is designed to maintain data
confidentiality and data integrity along with authentication in a pervasive health environment.
The proposed model operates in a computing environment consisting of a health care server and
a remote ad-hoc network of handheld or portable pervasive computing devices (PDAs, laptop
computers, and mobile phones). Based on limitations, it is assumed that pervasive device is a
mobile phone, which is already possessed by most of the users. This eliminates the need for
additional hardware device/ token for pervasive health care maintenance.
Fig1: Pervasive Healthcare Monitoring System Architecture
4. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
42
Fig1 shows the architecture of the proposed PHMS. The Components of PHMS are:
1. User with wearable sensors, 2. Pervasive Interface, 3. Mobile device, 4. Health Care Server
(HCS), 5. Patient Record Database (PRD),
The HealthCare Server itself is comprised of three sub components namely Registered Patient
List (RPL), Checkup Reminder (CR) and a security module which takes care of the encryption
and authentication for ensuring data privacy. A pervasive interface may be designed which can
transfer the (data) different signals emitted by different sensors (temperature sensor, body
pulse, heart beat etc) arranged in, on or around human body and segregate them to user’s
mobile for transmitting the same to Patient Record Database through Healthcare Server.
The Registered Patient List contains the information of the patients along with their periodical
check up dates. Whenever the system reaches that date a Checkup Reminder is generated for
the patient. This Checkup Reminder is sent as a message to the pervasive device of the user.
User on checking the message will upload his medical data collected based on other diagnostic
services (such as MRI) as a message and encrypts it using the public key sent for his mobile.
Along with the encrypted data the response generated from the random number is sent to the
health care server.
The health care server decrypts the medical data using the private key generated at the time of
key generation and updates the message received into the Patient Record Database. Since the
data also involves in suggesting further medication for the user, there is at most necessity to
ensure that the data is not altered and it came from the authenticated user.
5. IMPLEMENTATION DETAILS
The main steps in Pervasive Healthcare Monitoring System Implementation are: Registration,
Encryption and Authentication.
Step1: Registration
All the users have to register with healthcare system. They have to enter their user
name, mobile number and other information including proposed check-up dates. Then a unique
user id is generated for each patient and this information is stored in the Registered Patient List
(RPL list of the server. This Registered patient list contains the medical data of all the users
and hence there is a need to protect this data. Authorized users are only allowed to access the
data with the login access provided by the administrator. Whenever the system reaches the
periodical check-up date a Check-up reminder containing patient id, patient name, check-up
date is generated. This Check-up reminder is sent as a message to the user through mobile
device.
Step 2: Encryption with Light Weight Asymmetric Encryption Algorithm
Doctors regularly monitor the updated values for diagnosis and suggest the patients either to
continue with their medication or change their medication through mobile communication. In
certain cases the patient may even be asked to go through some medical tests for further
diagnosis or meet the doctor in person. When sending the message from the pervasive device
to the Healthcare Server through a wireless network there is a chance for the attacker to
perform over the air trade attacks or eaves dropping.
5. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
43
N.RukmaRekha and M.S.Prasadbabu [26] proposed a light weight asymmetric cryptographic
algorithm which is quite suitable for a pervasive environment or resource constraint
applications.
In case of symmetric cryptographic algorithm, key distribution is a major hurdle. If the key is
compromised the attacker is likely to know all the further messages generated from the same
key. Where as in an asymmetric algorithm, the message is encrypted with the public key and
then transferred to health care server where it gets decrypted.
To perform asymmetric encryption a public key is sent to the user as a part of checkup
reminders. The details of the algorithm are given below:
In this algorithm first an elliptic curve E is defined over Zp (p is a prime, p>3), such that E
contains a cyclic subgroup H in which the discrete log problem is intractable. Then it defines a
key pair K= {(E,α,a,β): β=aα}; where α ε E. Now, the medical data generated by the user is
converted to an elliptic curve point (x1, x2) and then it is encrypted using the public key (α, β)
generated from the key generation step. The encrypted elliptic curve point (y1, y2) is then
transferred to Healthcare Server and gets decrypted using the private key a. The decrypted point
is again converted into message and then passed to Patient Record Database for updating.
Step 3: Authentication with Challenge Response One Time Password Method
Authentication is provided to the Healthcare system by using challenge response one time
password mechanism. Here a random number, namely challenge, is generated at the time of
Checkup Reminder generation and the user is supposed to generate a onetime password namely
response, for that random number. Random number is generated using Blum Blum Shub
algorithm. Blum Blum Shub takes the form: xn+1=xn
2
mod M, where M=pq is the product of two
large primes p and q. x0 is a seed which is a quadratic residue modulo M. The cryptographic
security of the Blum-Blum-Shub random generator algorithm is based on quadratic residuosity
problem [27].
Generation of response involves calculation of an output value for the given challenge over any
simple mathematical function. Only authorized user can evaluate the response because the
mathematical function is known only to him, thus making the medical data transfer an
authenticated transaction. Also, the mathematical function can be modified periodically if
required.
6. PERFORMANCE ANALYSIS
Pervasive Healthcare Monitoring System meets all the requirements of data confidentiality, data
integrity and authentication.
Authentication is assured by generating one time password (OTP) by using challenge response
mechanism which is free from all traditional password attacks because of the randomness
involved in it. OTP is generated by using Blum Blum Shub algorithm for each check-up
reminder message and hence avoids the chance of having basic password attacks like brute force
attack. Also Cryptanalysis doesn’t help here because of the randomness of the password and
hence there will be no specific relationship between the passwords generated for each message.
Data confidentiality and integrity are assured by encrypting the medical data using light weight
asymmetric algorithm. The medical data is encrypted during the message transfer in order to
avoid it from falling into attacker hands. Usage of standard encryption algorithms like DES,
RSA is not feasible because of the resource constraints that we have for the pervasive devices.
Standard cryptographic algorithms involve high computation and processing capability which
6. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
44
pervasive devices may not be able to bear for execution. Light Weight asymmetric encryption
algorithms are used for minimizing the memory, power, and computational complexity. In this
algorithm, the message data is transferred by converting it into an elliptic curve point.
Advantage of elliptic curve cryptosystem is that encryption and decryption speeds up because of
small key sizes and also there is memory and bandwidth savings. This reduces the
computational and memory load on the mobile communication and offers as much security as a
standard algorithm like RSA.
The performance features of PHMS are presented in table1 and compared with the existing
frameworks that are available in literature.
Table1: Comparison of Performance features of PHMS with existing frameworks.
S.No Framework Encryption Authenti
cation
Additional Infrastructure Required
1 PCHS, Elham
Rastegariet.al, [10]
No No Sensors, RFID Tags. Readers, Mobile
Device
2 PHSH,André
Canha, et.al, [11]
No No Sensors, Cameras, Display Devices,
Mobile Device, 2D and 3D data
3 EPHCRM, Xiaohui
Liang, Etal [13]
No No Sensors, Mobile Device, RFID Tags
4 SPCEHM, Shilpa
Lakhina et.al, [20]
Yes No Remote Agents , Sensors, Mobile
Device
5 PHMS Yes Yes Sensors, Mobile Device
From Table1 it is evident that PHMS is more secured frame work than the others because it
offers both encryption and authentication for the system. Also, in addition to sensors and mobile
device, other infrastructure such as RFID tags, Readers, Cameras, Display Devices and Remote
Agents are required for other frameworks whereas PHMS requires only sensors and mobile
device and hence it uses minimal infrastructure.
The computational complexities of the different algorithms are computed and presented in
Table2. Here, three features namely key size, brute force and attack time in years are compared
for both traditional and light weight symmetric and asymmetric cryptographic algorithms.
Table2: Comparison of key size, brute force complexity and attack time in years with existing
algorithms.
S.
No
Algorithm Key
size
Brute
Force
Attack time
in years
1 Symmetric 112 21126
1.37X 1011
2 Asymmetric 1024 21024
2.40X1017
3 Light weight symmetric 80 280
2.4 X109
4 Light weight Asymmetric 160 2160
5 X1010
7. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
45
Graphical representation of the above results are represented in fig 2
Fig2: Graphical representation of Comparison of key size, brute force complexity and attack
time in years with different algorithms
In the graph presented in Fig 2, X-axis represents the three features of different algorithms and
Y-axis represents the numbers in billions. Blue color represents the key size of the algorithm,
red color represents brute force complexity, and green color represents attack time in years. The
following are the observations.
The first observation is that the key size of light weight asymmetric algorithm is less compared
to traditional symmetric and asymmetric algorithms. But, it is relatively more compared to light
weight symmetric algorithm. Second observation is that the time taken to attack light weight
asymmetric algorithm is almost close to traditional asymmetric algorithm and is more than the
traditional symmetric and light weight symmetric algorithms. Third observation is that the brute
force complexity of light weight asymmetric algorithm is more compared to both traditional
and light weight symmetric algorithms and it is less when compared to traditional asymmetric
algorithm This is because of the huge key size. Hence it can be concluded that despite the small
key size the present light weight asymmetric algorithm gives more security than other
traditional algorithms in the resource constrained environment.
7. CONCLUSION
Pervasive Healthcare Monitoring System was developed for continuous health monitoring of
patients who are having long term diseases. Medical data of user is transmitted to the
Healthcare Server using mobile communication. It is shown in Section 6 that the main
advantage of this system is that data privacy of the user is more compared to existing
algorithms. PHMS also assures the authentication of the user such that only authorized user will
send the data.
8. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
46
REFERENCES
[1]. Mark Weiser, The Computer for the 21st
Century, Scientific American, September 1991
[2]. M.Satyanarayanan, Pervasive Computing Vision and Challenges, IEEE Personal
Communications,2001
[3]. Andreas Butz, Antonio Kr¨uger, User-centered development of a pervasive healthcare
application, " Pervasive Health Conference and Workshops, 2006 , vol., no., pp.1-8, Nov. 29
2006-Dec. 1 2006
[4]. Jurgen Bohn, Felix G¨artner, and Harald Vogt, Dependability Issues of Pervasive Computing in a
Healthcare Environment, Proceedings of the First International Conference on Security in
Pervasive Computing, volume 2082 of Lecture Notes in Computer Science,2003, pages53-70,
Springer-Verlag
[5]. Jakob E. Bardram, Hospitals of the Future – Ubiquitous Computing support for Medical Work in
Hospitals, In UbiHealth 2003: The 2nd International Workshop on Ubiquitous Computing for
Pervasive Healthcare Applications. (2003)
[6]. Rifat Shahriyar, Md. Faizul Bari, Gourab Kundu, Sheikh Iqbal Ahamed, and Md. Mostofa Akbar
, Intelligent Mobile Health Monitoring System (IMHMS), International Journal of Control and
Automation, Vol.2, No.3, September 2009
[7]. Jong Hyun Lim, Andong Zhan, Andreas Terzis, Poster: HealthOS: A Platform for Integrating and
Developing Pervasive Healthcare Applications, MobiSys’11, June 28–July 1, 2011, Bethesda,
Maryland, USA. ACM 978-1-4503-0643-0/11/06.
[8]. Gaetano Borriello, Vince Stanford, Chandra Narayanaswami, Walter Menning, Pervasive
Computing in Healthcare, IEEE Pervasive Computing 2007
[9]. Vince Stanford, Pervasive Healthcare Applications face tough Security Challenges, IEEE
Pervasive Computing 2002
[10]. Elham Rastegari, Amirmasood Rahmani, Saeed Setayeshi, Pervasive Computing in Healthcare
Systems, World Academy of Science, Engineering and Technology 59, 2011
[11]. André Canha, Mauro Gama, Rui Monteiro, Pervasive Healthcare in Smart Homes,
http://www.ee.oulu.fi/~vassilis/courses/ubicomp10S/projects/11_healthcare.pdf
[12]. Upkar Varshney, Pervasive Healthcare and Wireless Health Monitoring, Mobile Network
Applications (2007) 12:113–127 , Springer
[13]. Xiaohui Liang, Xu Li, Mrinmoy Barua, Le Chen, Rongxing Lu, Enable Pervasive Healthcare
through Continuous Remote Health Monitoring, IEEE Wireless Communications, vol.
19,no.6, 2012, pages 10-18.
[14]. X. Lin, R. Lu, X. Shen, Y. Nemoto, and N. Kato, “SAGE: A strong privacy-preserving scheme
against global eavesdropping for ehealth systems,” IEEE Journal on Selected Areas in
Communications, vol. 27, no. 4, pp. 365-378, 2009.
[15]. Rusyaizila Ramli, Nasriah Zakaria, Putra Sumari, Privacy Issues in Pervasive Healthcare
Monitoring System: A Review, World Academy of Science, Engineering and Technology, 48,
2010
[16]. Changyu Dong and Naranker Dulay, Privacy Preserving Trust Negotiation for Pervasive
Healthcare, Pervasive Health Conference and Workshops, 2006 In Pervasive Health Conference
and Workshops, 2006 (2006), pp. 1-9
[17]. Anastasios Fragopoulos, John Gialelis, and Dimitrios Serpanos , Security Framework for
Pervasive Healthcare Architectures Utilizing MPEG21 IPMP Components, International Journal
of Telemedicine and Applications , Volume 2009, Article ID 461560, 9 pages
[18]. K. Venkatasubramanian and S. Gupta, “Security for pervasive healthcare,” in Security in
Distributed, Grid, Mobile, and Pervasive Computing, chapter 15, pp. 349–366, CRC Press, Boca
Raton, Fla, USA, 2007.
9. International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI), Vol.2, No.2, April 2013
47
[19]. Munirul Haque and Sheikh Iqbal Ahamed, Security in Pervasive Computing: Current Status and
Open Issues, International Journal of Network Security, Vol.3, No.3, PP.203–214, Nov. 2006
[20]. Shilpa Lakhina , Zeenat Mahmood , Sarwesh Site, Secure Pervasive Computing Environment for
Health Monitoring, International Journal of Computer Technology and Electronics Engineering
(IJCTEE) Volume 1 , Issue 2
[21]. Oscar Garcia-Morchon, Thomas Falck, Tobias Heer, Klaus Wehrle, Security for Pervasive
Healthcare, Mobile and Ubiquitous Systems: Networking & Services, MobiQuitous, 2009.
MobiQuitous '09. 6th Annual International , vol., no., pp.1-2, 13-16 July 2009
[22]. Pardeep Kumar and Hoon-Jae Lee, Security Issues in Healthcare Applications Using Wireless
Medical Sensor Networks: A Survey, Sensors 2012, 12, 55-91
[23]. Sheikh I Ahamed, Nilothpal Talukder, and Achilles D. Kameas, Towards Privacy Protection in
Pervasive Healthcare, In Proceedings of the 3rd IET International Conference on Intelligent
Environments, Ulm, Germany, p.269-303 (2007)
[24]. Yanmin Zhu, Morris Sloman, Emil Lupu, Sye Loong Keoh, Vesta: A Secure and Autonomic
System for Pervasive Healthcare, 3rd Int. Conference on Pervasive Computing Technologies for
Healthcare (Pervasive Health 09), London, April 2009.
[25]. N.RukmaRekha, M.S.PrasadBabu, Design and Development of Light Weight Asymmetric
Cryptographic Algorithm – An Implementation of SMS Banking System, International Journal of
Computational Intelligence and Information Security (IJCIIS) , ISSN:1837-7823, Vol. 3 No. 10
December 2012, Pages 30-35
[26]. J. P. Black, W. Segmuller, N. Cohen, B. Leiba, A. Misra, M. R. Ebling, and E. Stern, Pervasive
Computing in Health Care: Smart Spaces and Enterprise Information Systems, Proceedings of the
MobiSys 2004 Workshop on Context Awareness, Boston, (June 2004)
[27]. http://www.cs.miami.edu/~burt/learning/Csc609.062/docs/bbs.pdf
Authors
Ms.N.RukmaRekha obtained her B.Tech, M.Tech degrees from Andhra University in 2003 and 2005
respectively. Currently, she is pursuing her Ph.d as part-time from the same university. She has around 7
years of teaching experience. She has the experience of guiding around 16 Post graduate students for
their M.Tech/M.C.A Project Thesis. Ms. Rukma Rekha is now Assistant professor from school of
Computer and Information Sciences in University of Hyderabad.
Prof. Maddali Surendra Prasad Babu obtained his B. Sc, M.Sc and M. Phil and Ph.D. degrees from
Andhra University in 1976, 1978, 1981and 1986 respectively. During his 29 years of experience in
teaching and research, he attended about 28 National and International Conferences/ Seminars in India
and contributed about 33 papers either in journals or in National and International conferences/ seminars.
Prof. M.S. Prasad Babu has guided 98 student dissertations of B.E., B. Tech. M.Tech. & Ph.Ds. Prof
Babu is now Professor in the Department of Computer Science & Systems Engineering of Andra
University College of Engineering, Andhra University, Visakhapatnam. Prof. M.Surendra Prasad Babu
received the ISCA Young Scientist Award at the 73rd Indian Science Congress in 1986 from the hands of
late Prime Minister Shri Rajiv Gandhi. Prof. Babu conducted the proceedings of the Section of
Information and Communication & Sciences and Technology including computer Science of the 94th
Indian Science Congress as a president of that section in January 2007. Prof. Babu was also the sectional
committee member of the Indian Science Congress in the sections of Mathematics and ICT in 1988 and
2005 respectively. He is also sectional secretary for the section of Information and Communication &
Sciences and Technology of Indian Science Congress. He is currently professor and chairman, Board of
Studies at Andhra University.