An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam

Abstract

Physiological data could then be sent to a central server which could then run a range of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could present a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud. In a remote mHealth monitoring system a client could arrange portable sensors in wireless body sensor networks to collect various physiological data such as blood pressure (BP), breathing rate (BR), Electrocardiogram (ECG/EKG), peripheral oxygen saturation (SpO2) and blood glucose.

Authors and Affiliations

G. Narasimha Murthy, G. Suryakala Eswari

Keywords

Related Articles

Challenges Faced by OFDM Technique for Broadband Wireless Mobile Communication

Orthogonal Frequency Division Multiplexing (OFDM) has been adopted as a predominant access technique to meet the challenges offered by next generation broadband wireless mobile systems. OFDM has gained a lot of inte...

A New Frame Work and Technique For Earthquake Alert System

As an application, we develop a earthquake reporting structure for use in Japan. In perspective of the different shudders and the tremendous number of Twitter customers all through the country, we can recognize a tre...

New architecture and efficient inter device communication for content transferring in human networks

We present B-SUB, an interest-driven information sharing system for HUNETs, which stands for the bloom-filter-based publish/SUBscribe. B-SUB is calculated for small to medium sized networks selfpossessed of dozens of...

Effective Keyword Search on XML data- Using FMADM

Efficient state of the art query retrieval systems are implemented over RDBMS databases but not for XML based storages. Fuzzy type-ahead search, though not a new concept for RDBMS based systems, it is a new informati...

In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm

In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...

Download PDF file
  • EP ID EP28124
  • DOI -
  • Views 255
  • Downloads 1

How To Cite

G. Narasimha Murthy, G. Suryakala Eswari (2014). An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28124