Light-weight Secure Data Transfer in Remote Healthcare System

2015 ◽  
Author(s):  
Jinsoo Hwang ◽  
Kichang Kim
Author(s):  
Chandu Thota ◽  
Revathi Sundarasekar ◽  
Gunasekaran Manogaran ◽  
Varatharajan R ◽  
Priyan M. K.

This chapter proposes an efficient centralized secure architecture for end to end integration of IoT based healthcare system deployed in Cloud environment. The proposed platform uses Fog Computing environment to run the framework. In this chapter, health data is collected from sensors and collected sensor data are securely sent to the near edge devices. Finally, devices transfer the data to the cloud for seamless access by healthcare professionals. Security and privacy for patients' medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. The main focus of this work is to secure Authentication and Authorization of all the devices, Identifying and Tracking the devices deployed in the system, Locating and tracking of mobile devices, new things deployment and connection to existing system, Communication among the devices and data transfer between remote healthcare systems. The proposed system uses asynchronous communication between the applications and data servers deployed in the cloud environment.


Fog Computing ◽  
2018 ◽  
pp. 365-378 ◽  
Author(s):  
Chandu Thota ◽  
Revathi Sundarasekar ◽  
Gunasekaran Manogaran ◽  
Varatharajan R ◽  
Priyan M. K.

This chapter proposes an efficient centralized secure architecture for end to end integration of IoT based healthcare system deployed in Cloud environment. The proposed platform uses Fog Computing environment to run the framework. In this chapter, health data is collected from sensors and collected sensor data are securely sent to the near edge devices. Finally, devices transfer the data to the cloud for seamless access by healthcare professionals. Security and privacy for patients' medical data are crucial for the acceptance and ubiquitous use of IoT in healthcare. The main focus of this work is to secure Authentication and Authorization of all the devices, Identifying and Tracking the devices deployed in the system, Locating and tracking of mobile devices, new things deployment and connection to existing system, Communication among the devices and data transfer between remote healthcare systems. The proposed system uses asynchronous communication between the applications and data servers deployed in the cloud environment.


2015 ◽  
Vol 8 (1) ◽  
pp. 17 ◽  
Author(s):  
R. Valarmathi ◽  
G. M. Kadhar Nawaz

2012 ◽  
Vol 36 (6) ◽  
pp. 3605-3619 ◽  
Author(s):  
Shih-Sung Lin ◽  
Min-Hsiung Hung ◽  
Chang-Lung Tsai ◽  
Li-Ping Chou

Author(s):  
Booma Devi Sekar ◽  
JiaLi Ma ◽  
MingChui Dong

The proactive development in electronic health (e-health) has introduced seemingly endless number of applications such as telemedicine, electronic records, healthcare score cards, healthcare monitoring etc. Yet, these applications confront the key challenges of network dependence and medical personnel necessity, which hinders the development of universality of e-health services. To mitigate such key challenges, this chapter presents a versatile wired and wireless distributed e-home healthcare system. By exploiting the benefit of body sensor network and information communication technology, the dedicated system model methodically integrates some of the comprehensive functions such as pervasive health monitoring, remote healthcare data access, point-of-care signal interpretation and diagnosis, disease-driven uplink update and synchronization (UUS) scheme and emergency management to design a complete and independent e-home healthcare system.


Author(s):  
Mukesh Soni ◽  
Gaurav Dhiman ◽  
Brajendra Singh Rajput ◽  
Rajan Patel ◽  
Nitesh Kumar Tejra

Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


Sign in / Sign up

Export Citation Format

Share Document