A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam

Abstract

In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then run a variety of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could offer a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud.

Authors and Affiliations

R. Ramadevi, SK. Ahmad Shah

Keywords

Related Articles

Attribute Sparse Coding (ASC’s) for Content-Based Image Retrieval (CBIR)

Photographs with individuals are the foremost attention of users. Consequently with the exponentially increasing pictures, large-scale content-based face image retrieval is a facilitating knowledge for various develo...

Application of Component-Based Localization in Sparse Wireless Networks

Localization is crucial for wireless ad hoc and sensor networks. As the istance-measurement ranges are often less than the communication ranges for many ranging systems, most communication-dense wireless networks ar...

WIRELESS MONITORING SYSTEM BASED ON ARM7 FOR INDUSTRIAL ISSUES

In Industries attendance of an employee and monitoring of production are done manually which causes less efficiency and accuracy, and more over it takes much time than monitoring systems. Another problem arises when...

Butterfly Design for RADIX-4K DIF FFT

VLSI and Digital Signal Processing are the two emerging technologies in the present world. Design of high performance, low area and low power VLSI circuits are needed for the DSP applications. This paper is dealing w...

K-Medoid Clustering Shows Negative Impact In Missing Data Imputation

Missing Data Imputation imputes the missing values from the known values. Rather than imputing from the whole dataset, imputation techniques are applied in the clusters generated by using clustering algorithm. In this...

Download PDF file
  • EP ID EP28083
  • DOI -
  • Views 246
  • Downloads 0

How To Cite

R. Ramadevi, SK. Ahmad Shah (2014). A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28083