Discretion Preservative Itinerant Health Scrutinising By Haze Succour
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
Haze-assisted mobile health (mHealth) monitoring,which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients Confidentiality and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a Hazeassisted Confidentiality Conserving mobile health monitoring system to protect the Confidentiality of the involved parties and their data. Moreover, the outsourcing decryption technique and a newlyproposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the Haze without compromising clients’ Confidentiality and service providers’ intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.
Authors and Affiliations
T Jeevana Jyothi| student Of M.Tech (C.S) And Department of Cse,G.V.R&Scollege Of Engineering &Technology, Sk Mubeena Sultana| Department of Cse, G.V.R&Scollege Of Engineering & Technology
Strewn Effective Hiding In Shared Wireless Networks
This paper introduces cooperative caching techniques for reducing electronic content provisioning cost in Social Wireless Networks (SWNET).SWNETs are formed by mobile devices, such as modern cell phones etc. sharing...
Seismic Analysis And Design of Cantilever Retaining Walls
This project deals with analysis and design with an emphasis laid on effect of earthquake on an important soil retaining structure like cantilever retaining wall. This work also throws light on earthquake damages to...
Integrated Attestation Scheme for Scalable Distributed Services in Software-as-a-Service Clouds
Ensuring Security, Data Integrity and Seamless Availability for information very still, in movement, and being used, for Outsourcing delicate and vital information in the hands of a cloud supplier is essential assign...
Efficiency of Text Mining of Accident Narratives By Accessing Predictive Performance
This work portrays the utilization of content mining with a mix of methods to naturally find accident attributes that can educate a superior comprehension of the supporters of the accidents. The review assesses the v...
Automation System to Control the Movement of the Inlet Conveyor to the Boiler Furnace and the Exhaust Draft
Records the particular commercial parameter similar to temp, wetness, and communicates the idea in order to pc, in the event that any kind of these valuations will not be throughout restriction next pc communicates w...