Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Cloud Assisted Secure Remote Health Care Services

Published on December 2015 by Vikram Gokhale, Neha Bhansali, Lulua Chatriwala, Ipsha Chowdhury
National Conference on Advances in Computing
Foundation of Computer Science USA
NCAC2015 - Number 5
December 2015
Authors: Vikram Gokhale, Neha Bhansali, Lulua Chatriwala, Ipsha Chowdhury
24eb3f18-186d-4dd6-a359-201588222f59

Vikram Gokhale, Neha Bhansali, Lulua Chatriwala, Ipsha Chowdhury . Cloud Assisted Secure Remote Health Care Services. National Conference on Advances in Computing. NCAC2015, 5 (December 2015), 32-34.

@article{
author = { Vikram Gokhale, Neha Bhansali, Lulua Chatriwala, Ipsha Chowdhury },
title = { Cloud Assisted Secure Remote Health Care Services },
journal = { National Conference on Advances in Computing },
issue_date = { December 2015 },
volume = { NCAC2015 },
number = { 5 },
month = { December },
year = { 2015 },
issn = 0975-8887,
pages = { 32-34 },
numpages = 3,
url = { /proceedings/ncac2015/number5/23391-5059/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advances in Computing
%A Vikram Gokhale
%A Neha Bhansali
%A Lulua Chatriwala
%A Ipsha Chowdhury
%T Cloud Assisted Secure Remote Health Care Services
%J National Conference on Advances in Computing
%@ 0975-8887
%V NCAC2015
%N 5
%P 32-34
%D 2015
%I International Journal of Computer Applications
Abstract

Health care facilities are yet to reach the most remote corners of the world. Little ignorance towards health can result in serious concerns and can also possibly cause life threatening situations. A system is proposed which can collect different parameters of an individual and upload those on a global database for the best assistance from experts from all over the globe. Cloud computing is available on various devices like PCs, Laptops, and Smartphones. To help maintain security of a database, various encryption techniques are applied. Attribute-based encryption (ABE) is a new way for public key encryption that would allow the encryption and decryption of messages based on user attributes. Given its expressiveness, attribute based encryption is currently being considered for many cloud storage and computing applications. The aim of the system is to reduce the complexity involved in the current design and also to reduce the computation load on the client's side without compromising the privacy through trying to shift the heavy computation burden to the server instead of the client's device with limited computational power and many other constraints.

References
  1. Fei Chen, Liu, A. X,"Privacy and integrity preserving multi-dimensional range queries for cloud computing", in IEEE Networking conference, 2014.
  2. M. Jang, Min Yoon, and Jae-Woo Chang, "A Privacy-aware Query Authentication Index for Database Outsourcing", in IEEE transaction on BigComp. ,Pages 72-76, 2014.
  3. Huang Lin, Jun Shao, Chi Zhang, and Yuguang Fang, Fellow, IEEE, "CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 6, JUNE 2013
  4. Peng Wei Wang,Zhi Jun Ding, Chang Jun Jiang, and Meng Chu Zhou, Fellow, IEEE, "Design and Implementation of a Web-Service-Base Public-Oriented Personalised Health Care Platform", IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS, VOL. 43, NO. 4, JULY 2013
  5. G. Wang, Q. Liu, J. Wu, and M. Guo, Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers", in ACM conference on Computer and communications security, 2011.
  6. R. A. Popa, C. M. S. Redfield, N. Zeldovich, and H. Balakrishnan, "CryptDB: Protecting confidentiality with encrypted query processing", in Proc. 23rd ACM Symp. Operating Systems Principles, pp. 85100, Oct. 2011.
  7. M. Barni, P. Failla, R. Lazzeretti, A. Sadeghi, and T. Schneider, "Privacy preserving ECG classification with branching programs and neural networks", IEEE Transactions on Information Forensics Security, 2011.
  8. Shyamal Patel, Bor-rong Chen, Thomas Buckley, Ramona Rednic, Doug McClure, Daniel Tarsy, Ludy Shih, Jennifer Dy, Matt Welsh, Paolo Bonato, "Home Monitoring of Patients with Parkinson's Disease via Wearable Technology and a Web-based Application", 32nd Annual International Conference of the IEEE EMBS Buenos Aires, Argentina, August 31 - September 4, 2010
  9. C. Gentry, "Fully homomorphic encryption using ideal lattices", in Proc. 41st ACM Symposium on Theory of Compututation, pp. 169178, 2009.
  10. C. Gentry, "Fully homomorphic encryption using ideal lattices", in Proc. 41st ACM Symposium on Theory of Compututation, pp. 169178, 2009.
  11. P. Mohan, D. Marin, S. Sultan, and A. Deen, "Medinet: Personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony", in Proc. 30th Ann. Int. Conf. IEEE Engineering in Medicine and Biology Society, 2008.
  12. J. Bethencourt, A. Sahai, and B. Waters, "Cipher text-policy attribute based encryption", in Proceedings of IEEE Symposium on Security and Privacy, 2007.
  13. J. Brickell, D. Porter, V. Shmatikov, and E. Witchel, "Privacy preserving remote diagnostics", in Proc. 14th ACM Conf. Computer and Communications Security, 2007.
  14. V. Goyal, O. Pandey, A. Sahai, and B. Waters," Attribute-based encryption for fine grained access control of encrypted data", in ACM conference on Computer and communications security , 2006.
  15. H. Hacigumus, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model", in Proc. ACM SIGMOD Intl Conf. Manage. Data, pp. 216227, 2002.
  16. D. Boneh and M. Franklin, "Identity based Encryption from the weil pairings", in Proceeding CRYPTO '01 Proceedings of the 21st Annual InternationalCryptology Conference on Advances in Cryptology, 2001.
  17. Stuart Haber, William G. Horne, Tomas Sander, and Danfeng Yao, "Privacy-Aware Verification of Aggregate Queries on Outsourced Databases with Applications to Historic Data Integrity"
  18. Qian Wang1, Cong Wang1, Jin Li1, Kui Ren1, and Wenjing Lou2, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing"
  19. Ichiro YAMADA and Guillaume LOPEZ, "Wearable Sensing Systems for Healthcare Monitoring".
Index Terms

Computer Science
Information Sciences

Keywords

Abe (attribute-based Encryption) ecg (electrocardiogram) Fda (food And Drug Administrator) Bp (blood Pressure).