Haze-Assisted Confidentiality Conserving Mobile Health Monitoring
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 8
Abstract
Haze-assisted mobile health (mHealth) monitoring, which applies the prevailing mobile communications and Haze computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients Confidentiality and intellectual property of monitoring service providers, which could deter the wide adoption of mHealth technology. This paper is to address this important problem and design a Hazeassisted Confidentiality Conserving mobile health monitoring system to protect the Confidentiality of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly proposed key private proxy reencryption are adapted to shift the computational complexity of the involved parties to the Haze without compromising clients’ Confidentiality and service providers’ intellectual property. Finally, our security and performance analysis demonstrates the effectiveness of our proposed design.
Authors and Affiliations
R Konda Reddy| Department of CSE,PBR Visvodaya Institute Of Technology & Science,Kavali, Aluru Subramanyam| student of M.Tech(C.S) And Department Of CSE, PBR Visvodaya Institute of Technology & Science,Kavali
On-Chip AHB Bus Trace Analyzer for Real Time Tracing With Lossless Data Compression
The advanced micro controller bus Architecture (AMBA) is widely used as the on-chip bus in Systemon-Chip(SoC) designs. The important aspect of a SoC is not only which components or blocks it houses, but also how they...
Privacy and security have emerged as an important research issue in mobile Networks wireless communication, Mobile device based data scattering applications that use these abilities. This paper proposes TurfCast, a n...
Advances the Forward Security in Parallel Network File System using An Efficient and Reliable Key Exchange Protocols
In parallel file system we can disperse data over numerous nodes to permit simultaneous access by various errands of a parallel application. By play out the numerous errands in a parallel system is commonly to reduce...
Wireless Protocols for Anti Cloning and Security
RFID system (Radio-Frequency Identification) is a technology for automated identification of objects and people. Human beings are smart enough to identify an object under a variety of challenge circumstances. RFID sys...
Anonymous Authentication of Data Stored in Clouds with Decentralized Security Mechanism
The term that flourished in the IT industry is the Cloud Computing. Inspired and Motivated by the tremendous growth and the huge success of cloud, we propose a new decentralized access control scheme for secure data...