CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 9
Abstract
In a remote mHealth observing framework a customer could mastermind compact sensors in remote body sensor systems to gather different physiological information, for example, circulatory strain (BP), breathing rate (BR), Electrocardiogram (ECG/EKG), fringe oxygen immersion (SpO2) and blood glucose. Such physiological information could then be sent to a focal server which could then run a mixture of web therapeutic applications on these information to return opportune guidance to the customer. Cloud-helped mHealth observing could offer an incredible prospect to liven up the nature of social insurance administrations and conceivably decrease human services costs there is a reluctant square in making this innovation a reality. It is taking into account another option of key private intermediary re-encryption plan in which the organization just needs to accomplish encryption once at the setup stage while moving the rest computational errands to the cloud without bargaining security in addition diminishing the computational and correspondence load on customers and the cloud.
Authors and Affiliations
Alasandguthi. Ramya Sree| Alasandguthi. Ramya Sree, Dept. of CSE, PACE Institute of Technology And Sciences., Ongole, PrakasamDistrict,AP, India, Ch. Koteswara Rao| Ch. Koteswara Rao, Dept. of CSE, PACE Institute of Technology And Sciences., Ongole, PrakasamDistrict,AP, India, D. Anandam| D. Anandam, Dept. of CSE, PACE Institute of Technology And Sciences., Ongole, PrakasamDistrict,AP, India
An Efficient Scalable Data Sharing In Cloud Storage Using Key Aggregate Encryption
In Cloud Computing data partaking is better concept on daily functions. and security is important functionality. Previously We describe public key cryptosystem . But these type crypto systems failure on maintain keys...
An Additive Order and Privacy Preserving Function Family (AOPPF)
The abundant advantages of cloud computing, for protection concerns, people and venture clients are reluctant to outsource their susceptible data, including E- mail, individual health records and government private d...
Evaluation of Seismic Response of symmetric and Asymmetric Multistoried Buildings
Buildings may be considered as asymmetric in plan or in elevation based on the distribution of mass and stiffness along each storey, throughout the height of the buildings. Most of the hilly regions of India are high...
Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, ba...
To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs
Authentication is one of the decisive subjects in protecting multicast in a situation attractive to malicious attacks. Multicast is a competent method to transport multimedia content from a sender to a group of recei...