A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then run a variety of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could offer a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud.
Authors and Affiliations
R. Ramadevi, SK. Ahmad Shah
Discretion Sustaining Location-Based Provision Etiquette for K-NN Search
A large number of individuals speak with their surroundings through their companions and their proposals utilizing Mobile gadget applications, for example, four square. However without legitimate security assurance,...
Text Clustering Using Cosine Similarity and Matrix Factorization
Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation...
Achieving Data Security Using Inter Clouds
Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing environment, as users often store sensitive inf...
SSUT: A new approach for privacy of source unknown in wireless sensor networks
Sensor Networks which is different compared to other networks which is deployed in unattended area used to sense and monitor the events that are reported to sink. But the locations of events delivered by sensor networ...
Indoor positioning and Navigation using Light sensor
Indoor positioning systems now a days got an extensive popularity. These systems have been successfully used in many applications such as asset tracking and inventory management. In this work we describes a novel lig...