A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then run a variety of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could offer a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud.
Authors and Affiliations
R. Ramadevi, SK. Ahmad Shah
Logo Matching And Recognition System Using Surf
Matching is an important part of a model based object recognition system. Matching is a difficult task because images do not present perfect data, noise and occlusions greatly complicate the task. Although no existin...
A Novel Privacy-Preserving Mechanism That Supports Public Auditing On Shared Data Stored In The Cloud
Numerous use of cloud data e.g., data mining and machine learning do not unavoidablycall for users to download the entire cloud data to local devices. It is since cloud providers such as Amazon can proffer users calc...
Mobility Prediction: A review of Techniques used in MANETS
Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...
Learning and Sequential Decision Making For Medical Data Streams Using Rl Algorithm
Data stream mining has obtained a high attraction due to the importance of its applications and increase in the generation of streaming information. The data streams are the set of data, which are moving in specified...
A Comparitive Study of Cloud Computing Models for Academic Environment
Cloud computing is becoming main computing paradigm. The use of cloud computing has been increased exponentially. It has various characteristics and advantages of on-demand computing, shared infrastructure, pay-per-u...