Open Access Open Access  Restricted Access Subscription or Fee Access

Privacy Preserving Mobile Health Monitoring and Reduce the Outsourced Data Leakage using vCloud

J. Josephine, P. Nambu Kalpana, J. Ragaventhiran

Abstract


Cloud computing provides a scalable environment for growing amounts of data and processes that work on various applications and services by means of on-demand self-services. The mobile health monitoring scenario provides a good opportunity to obtain a large set of medical information, which could potentially lead to identifying an individual user. Without proper addressing the data management in a mhealth system create a serious risk on both clients’ privacy and intellectual property of monitoring service providers. This paper is to address the important problem of risks on client’s privacy and intellectual property of monitoring service providers, and also deals with authentication and security of user data. We propose a technique to reduce the data leakage in the cloud environment. Using SMC (Security-Mediated Certificateless Encryption) algorithm and also to overcome the Non- Reputation and quantum computer attacks using vCloud.

Keywords


Mhealth, Privacy, SMC (Security-Mediated Certificateless Encryption), SEM (Security Mediator).

Full Text:

PDF

References


H. Lin, J. Shao, and Y. Fang, “Cloud-assisted privacy preserving mobile health monitoring.http://eprint.iacr org/ curr/,” IACR Cryptology ePrint Archive, 2012.

P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online].Available:http://www.ncbi.nlm.nih.gov/pubmed/19162765

G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,”ACM Trans. Inf. Syst. Secur., vol. 9, no. 1, pp. 1–30, 2006.

M. Green, S. Hohenberger, and B.Waters, “Outsourcing the decryption of abe ciphertexts,” in Usenix Security, 2011.

M. Layouni, K. Verslype, M. Sandıkkaya, B. De Decker, and H. Vangheluwe, “Privacy-preserving telemonitoring for ehealth,” Data and Applications Security XXIII, pp. 95–110, 2009

Zhaohui Cheng and Richard Comley. Efficient Certificateless Public Key Encryption. Cryptology ePrint Archive, Report 2005/012, 2005.

Uma Somani, Kanika Lakhani, Manish Mundra , “Implementing digital signature with RSA Encryption Algorithm to enhance the data security of cloud in Cloud Computing” [2010].

Jinyuan Li, Maxwell N. Krohn, David Mazi`eres, and Dennis Shasha. Secure untrusted data repository (SUNDR). In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, pages 91–106, San Francisco, CA, December 2004.




DOI: http://dx.doi.org/10.36039/AA052014004

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.