A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then run a variety of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could offer a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud.
Authors and Affiliations
R. Ramadevi, SK. Ahmad Shah
Design and Development of Mobile Assisted Language Learning (MALL) application for English Language using Android Push Notification Services
The pervasive nature of the mobile devices and the wide array of mobile learning applications enables the acceptance of mobile devices as an indispensable component in the current pedagogical learner-centric mode of...
A Hybrid Approach to Detect and Recognize Texts in Images
Text data present in images serves important information which is helpful for different applications. Locating text in case of variation in style, color, as well as complex image background makes text reading from imag...
Secured Bluetooth Authentication Using Artificial Neural Networks
Authentication in wireless networking is a mechanism to proof identities and avoid masking. The use of wireless devices and technology has made rapid growth in the market. In all such devices, user authentication is...
Performance Analysis Of Vedic Multiplier Using Reversible Logic In Spartan 6
A system's performance is generally determined by the performance of the multiplier, because the multiplier is generally the slowest element in the system. Multipliers are key components of many high performance syst...
Integrated Data Mining Approach for Security Alert System
The need for automatic detection of deceptive Emails is increasing due to the rapid usage of Email communication in the Internet world. The proposed “Security Alert System” provides a way to identify the future terro...