Haze-Assisted Confidentiality Conserving Mobile Health Monitoring

Abstract

Haze-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients Confidentiality and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a Hazeassisted Confidentiality Conserving mobile health monitoring system to protect the Confidentiality of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy reencryption are adapted to shift the computational complexity of the involved parties to the Haze without compromising clients’ Confidentiality and service providers’ intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.

Authors and Affiliations

R Konda Reddy| Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali, Aluru Subramanyam| student of M.Tech(C.S) And Department Of CSE, PBR Visvodaya Institute of Technology & Science,Kavali

Keywords

Related Articles

On-Chip AHB Bus Trace Analyzer for Real Time Tracing With Lossless Data Compression

The advanced micro controller bus Architecture (AMBA) is widely used as the on-chip bus in Systemon-Chip(SoC) designs. The important aspect of a SoC is not only which components or blocks it houses, but also how they...

Privacy and security have emerged as an important research issue in mobile Networks wireless communication, Mobile device based data scattering applications that use these abilities. This paper proposes TurfCast, a n...

Advances the Forward Security in Parallel Network File System using An Efficient and Reliable Key Exchange Protocols

In parallel file system we can disperse data over numerous nodes to permit simultaneous access by various errands of a parallel application. By play out the numerous errands in a parallel system is commonly to reduce...

Wireless Protocols for Anti Cloning and Security

RFID system (Radio-Frequency Identification) is a technology for automated identification of objects and people. Human beings are smart enough to identify an object under a variety of challenge circumstances. RFID sys...

Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism

The term that flourished in the IT industry is the Cloud Computing. Inspired and Motivated by the tremendous growth and the huge success of cloud, we propose a new decentralized access control scheme for secure data...

Download PDF file
  • EP ID EP16285
  • DOI -
  • Views 355
  • Downloads 18

How To Cite

R Konda Reddy, Aluru Subramanyam (2014). Haze-Assisted Confidentiality Conserving Mobile Health Monitoring. International Journal of Science Engineering and Advance Technology, 2(8), 215-219. https://europub.co.uk/articles/-A-16285