An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam

Abstract

Physiological data could then be sent to a central server which could then run a range of web medical applications on these data to return timely advice to the client. Cloud-assisted mHealth monitoring could present a great prospect to perk up the quality of healthcare services and potentially reduce healthcare costs there is a hesitant block in making this technology a reality. It is based on a new alternative of key private proxy re-encryption scheme in which the company only wants to achieve encryption once at the setup phase while shifting the rest computational tasks to the cloud without compromising privacy moreover reducing the computational and communication burden on clients and the cloud. In a remote mHealth monitoring system a client could arrange portable sensors in wireless body sensor networks to collect various physiological data such as blood pressure (BP), breathing rate (BR), Electrocardiogram (ECG/EKG), peripheral oxygen saturation (SpO2) and blood glucose.

Authors and Affiliations

G. Narasimha Murthy, G. Suryakala Eswari

Keywords

Related Articles

Survey of Techniques of High Level Semantic Based Image Retrieval

This paper provides a comprehensive survey of the recent technical achievements in the research area of content based image retrieval. Images are being used since many years in all spheres including Antisocial Element...

A Secured Dynamic Location Monitoring System in WSN

Wireless sensor network is broadly spreading network of the communication field. Wireless sensor network is having sensor nodes as sensing devices which sense physical or environmental conditions and a sink node is t...

Securitized Patient Monitoring Telemetry System Using Zigbee

Nowadays due to the increase of elderly people across the world the problem of home-care for elderly people is becoming a challenging task. To overcome this wireless sensor networks are used to structure home-care sy...

A Mixture Cloud Approach For Safe Official Deduplications.

Cloud computing technology is widely used so that the data can be outsourced on cloud can accessed easily. Different members can share that data through different virtual machines but present on single physical machin...

Energy Efficient Group Key Management For Secure Data Processing In Ad hoc Networks

The key management is the course of action of maintaining the secret key between the sender and receiver. By means of this key the sender can encrypt the data which is broadcasted to the receiver and send it with the...

Download PDF file
  • EP ID EP28124
  • DOI -
  • Views 240
  • Downloads 1

How To Cite

G. Narasimha Murthy, G. Suryakala Eswari (2014). An Automatic Personalized Monitoring Service To Provide Security And Privacy Using Cam. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28124