CFP last date
22 April 2024
Reseach Article

Data Security on Patient Monitoring for Future Healthcare Application

by B. Vinoth Kumar, M. Ramaswami, P. Swathika
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 163 - Number 6
Year of Publication: 2017
Authors: B. Vinoth Kumar, M. Ramaswami, P. Swathika
10.5120/ijca2017913548

B. Vinoth Kumar, M. Ramaswami, P. Swathika . Data Security on Patient Monitoring for Future Healthcare Application. International Journal of Computer Applications. 163, 6 ( Apr 2017), 20-23. DOI=10.5120/ijca2017913548

@article{ 10.5120/ijca2017913548,
author = { B. Vinoth Kumar, M. Ramaswami, P. Swathika },
title = { Data Security on Patient Monitoring for Future Healthcare Application },
journal = { International Journal of Computer Applications },
issue_date = { Apr 2017 },
volume = { 163 },
number = { 6 },
month = { Apr },
year = { 2017 },
issn = { 0975-8887 },
pages = { 20-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume163/number6/27399-2017913548/ },
doi = { 10.5120/ijca2017913548 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:09:26.882582+05:30
%A B. Vinoth Kumar
%A M. Ramaswami
%A P. Swathika
%T Data Security on Patient Monitoring for Future Healthcare Application
%J International Journal of Computer Applications
%@ 0975-8887
%V 163
%N 6
%P 20-23
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Many researches in the past ignore the need to encrypt the data for security perspective. However in recent years, researchers have given top priority for data security for smooth transmission of data over network by incorporating many encryption strategies along with actual data. In this paper, we consciously discuss the need to secure the data for patient monitoring using various algorithms and plug out the one which is best suit for inbound data security for future healthcare application. As the fields of IoT and Cloud are distinct by their intrinsic technologies, there is a need for integration of Cloud with IoT is obligatory to facilitate and resolve issues involved in data storage as well as data security. In the field of modern healthcare environment, automation has emerged to be more necessary to route and stock the facts about employers (doctors), employees (staffs) and customer (patients). Hence doctors in need of such a stored voluminous information’s about a particular person, whom which the condition has to be diagnosed. The clinical and other facts about a person is indeed to be private (trust worthy) and should not be revealed by any other private identity. While establishing bi-directional connections to the internet, communication is a threat and has to be secured without involving any security threads. The offered work makes use of blow fish data encryption and IPv6 based addressing scheme for high data security and increased probability of number of nodes to reduce network congestion.

References
  1. S. Pallavi and G. Navish, “Secure and optimized data storage for IoT through cloud framework”, International Conference on Computing, Communication and Automation, Vol. 7, No. 15, pp. 720-723, 2015.
  2. B. Elisa, “Data Secusity and Privacy – Concepts, Approaches and Research Directions”, IEEE Annual Computer Software and Applications Conference, pp. 400-405, 2016.
  3. K. Heshan, K. Ibrahaim, A. Abdulatif, T. Zahir and Y. Xun, “Secure Data Analytics for Cloud-Integrated Internet of Things Applications”, IEEE Cloud Computing, Vol. 16, pp. 46-55, 2016.
  4. X. Chen, W. Lifeng, J. Zhu and C. Tiemeng, “A Multi-level Intelligent Selective Encryption Control Model for Multimedia Big Data Security in Sensing System with Resource Constraints”, Vol. 6, No. 16, pp. 148-153, 2016.
  5. Jiho. P, Yong-Gyu. L and Gilwon. Y, “Implementation of Security Algorithms for u-Health Monitoring System”, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:6, No:5, 2012.
  6. AL.Jeeva1, Dr.V.Palanisamy and K.Kanag aram, “Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 3, May -Jun 2012, pp.3033-3037.
  7. S. Soni, H. Agrawal, M. Sharma, “Analysis and comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology, Vol 2, Issue 6, December 2012, pp.362-365.
  8. S. Nidhi and J.P.S.Raina, “Comparative Analysis of AES and RC4 Algorithms for Better Utilization”, International Journal of Computer Trends and Technology, Vol 2, Issue 6, July-Aug 2011, pp.177-181]. DES has a block size of 64 bits and uses a 56-bit key. AES is also a symmetric cipher algorithm
  9. T. Jawahar and K. Nagesh, “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Vol 1, Issue 2, pp.6-12, December 2011.
  10. S. Preet Singh and R. Maini, “Comparison of Data Encryption Algorithms”, International Journal of Computer Science and Communication(IJCSC), Vol. 2, Issue 1, , pp. 125-127, January-June 2011.
  11. N.A. Kofahi, T. Al-Somani, K. Al-Zamil, “Performance evaluation of three Encryption/Decryption Algorithms”, IEEE 46th Midwest Symp osium on Circuits and Systems, 30-30, pp. 790-793, Dec. 2003.
  12. Jiho. P, Yong-Gyu. L and Gilwon. Y, “Implementation of Security Algorithms for u-Health Monitoring System”, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:6, No:5, 2012.
  13. Rashmi. K, Roshani. A, “”Development of improved Aggregated Key Cryptosystem for scalable data sharing”, International Journal of Computer Science and Information Technologies, Vol. 6, No. 2 , pp. 1792-1794, 2015.
  14. B. Vinoth Kumar, M. Ramaswami, P. Swathika and P. Abinaya, “IPv6 based patient monitoring architecture for future healthcare application”, International Journal of Computer Science and Information Security, Vol.14,No. 10, pp. 278-284, October 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption inbound data security automation network congestion addressing scheme