Secure and Privacy Approach in Mobile-Healthcare emergency Using PPSPC technique
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 10
Abstract
In this paper, we proposing a secure and privacy-preserving opportunistic computing framework, called SPOC, for m-Healthcare emergency. With SPOC, smart phone resources including computing power and energy can be opportunistically gathered to process the computingintensive personal health information (PHI) during m-Healthcare emergency with minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the high reliability of PHI process and transmission in m-Healthcare emergency, we introduce an efficient user-centric privacy access control in SPOC framework, which is based on an attribute-based access control and a new privacypreserving scalar product computation (PPSPC) technique, and allows a medical user to decide who can participate in the opportunistic computing to assist in processing his overwhelming PHI data.
Authors and Affiliations
MOWNIKA. K, K. C. PRADEEP
Implementation and Analysis of Power-constrained contrast enhancement algorithm using a sub-band decomposed MSRA for OLED display
This paper presents a power-constrained contrast enhancement algorithm for organic light-emitting diode display based on multi-scale retinex Algorithm (MSRA). In general, MSR, which is the key component of the propose...
Efficient Data Coordination Technique for Data Verification and Integration in Multi-Cloud Systems
Cloud computing is a new and fast growing technology that offers an innovative, efficient and scalable business model for organizations to adopt various information technology (IT) resources i.e. software, hardware,...
Nearest Neighbour Search Using Spatial Inverted Index
Spatial queries incorporate reach pursuit and closest neighbour recovery gives result to inquiry issued clients in light of articles like restaurant, hospitals and hotels. But rising applications including new sort o...
Perception Based On Its Incline And Pier Using Centroid Delineation Pitch Of Leaf
With the aim of elaborating a mobile application, accessible to anyone and with educational purposes, wepresent a method for tree species identification that relies on dedicated algorithms and explicit botanyinspired...
An algorithm for normal profile generation and for attack detection in terms of detection accuracy
We present a DoS attack detection system that uses Multivariate Correlation Analysis (MCA) for precise network traffic description by take out the geometrical correlations between network traffic features. Our MCA-ba...