A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam

Abstract

In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then run a variety of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could offer a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud.

Authors and Affiliations

R. Ramadevi, SK. Ahmad Shah

Keywords

Related Articles

Logo Matching And Recognition System Using Surf

Matching is an important part of a model based object recognition system. Matching is a difficult task because images do not present perfect data, noise and occlusions greatly complicate the task. Although no existin...

A Novel Privacy-Preserving Mechanism That Supports Public Auditing On Shared Data Stored In The Cloud

Numerous use of cloud data e.g., data mining and machine learning do not unavoidablycall for users to download the entire cloud data to local devices. It is since cloud providers such as Amazon can proffer users calc...

Mobility Prediction: A review of Techniques used in MANETS

Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...

Learning and Sequential Decision Making For Medical Data Streams Using Rl Algorithm

Data stream mining has obtained a high attraction due to the importance of its applications and increase in the generation of streaming information. The data streams are the set of data, which are moving in specified...

A Comparitive Study of Cloud Computing Models for Academic Environment

Cloud computing is becoming main computing paradigm. The use of cloud computing has been increased exponentially. It has various characteristics and advantages of on-demand computing, shared infrastructure, pay-per-u...

Download PDF file
  • EP ID EP28083
  • DOI -
  • Views 259
  • Downloads 0

How To Cite

R. Ramadevi, SK. Ahmad Shah (2014). A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam. International Journal of Research in Computer and Communication Technology, 3(11), -. https://europub.co.uk/articles/-A-28083