scispace - formally typeset
Search or ask a question
Author

Sudha Senthilkumar

Bio: Sudha Senthilkumar is an academic researcher from VIT University. The author has contributed to research in topics: Cloud computing & Access control. The author has an hindex of 2, co-authored 12 publications receiving 13 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The researcher is planned to make an inter-net of things for health care system which can monitor health of human being and in emergency situation notification will be send to doctors immediately.
Abstract: The past health survey shows death of few thousand people due to their heavy workload and mental pressure. Death of more patients is unavailability of doctors in critical situation. With the advancement in technology, the proposed system can monitor the patient's body condition uninterruptedly from anywhere in the world. The researcher is planned to make an inter-net of things for health care system which can monitor health of human being. In emergency situation notification will be send to doctors immediately. It takes the body parameters like Temperature, humidity, and pulse sensor and body movements. Analysis of patients’ body data is done against the normal situation to track abnormal physiological parameters.

7 citations

Journal ArticleDOI
TL;DR: This work addresses data storage security and access control in the cloud using a trusted authority that manages the access list and takes care of key management and key distribution and file deleti on upon user revocation.
Abstract: Cloud storage has emerged as a popular paradigm to outsource data to third party and share it with the collaborators. Wh ile this new paradigm enables users to outsource their sensitive data and reduces data management costs, it brings forth the new challenges to the user to keep their data secure. Data storage security and access control in the cloud is one of the challenging ongoing research works to alleviate the data leakage proble m from unauthorized users. Existing solutions that use pure cryptographic tech niques suffers from heavy computation work with respect to key management and key distribution. Attribute based encryption is an alternative soluti on that map the user access structure with the data file attributes to control the data access. However any of the existing schemes doesn't address the access con trol with assured deletion of the files upon revocation of user access. This arti cle addresses this open issue using a trusted authority that manages the access c ontrol list and takes care of key management and key distribution and file deleti on upon user revocation. The prototype of model has been presented and analyzed the security features over existing scheme.

4 citations

Journal ArticleDOI
TL;DR: In this paper, the authors elaborate on their proposed approach for such a system and accomplish an informal analysis to demonstrate the claim that this scheme provides sufficient security while maintaining usability, and conclude that the proposed scheme is secure and can be used for transferring files of a sensitive nature between patients, smart health cards and cloud servers via smart health card solution providers.
Abstract: The advent of the internet has brought an era of unprecedented connectivity between networked devices, making one distributed computing, called cloud computing, and popular. This has also resulted in a dire need for remote authentication schemes for transferring files of a sensitive nature, especially health-related information between patients, smart health cards, and cloud servers via smart health card solution providers. In this article, we elaborate on our proposed approach for such a system and accomplish an informal analysis to demonstrate the claim that this scheme provides sufficient security while maintaining usability.

4 citations

Journal ArticleDOI
TL;DR: This venture is valuable in recognizing the accident with the use of sensors and can be added to the current system in order to capture pictures of the scene of the accident.
Abstract: The quick development of innovation has made our lives less demanding. Innovation has additionally expanded activity risks and street mishaps occur very often which cause tremendous death toll and damage to property on account of poor response from the people in charge of managing such incidents. The mishap recognition undertaking will give an ideal solution for this problem. An accelerometer or a Tilt Sensor can be used as part of an auto caution application with the goal that unsafe driving can be identified. It can be utilized as a crash or rollover finder of the vehicle amid and after a crash. With signals from a sensor, a serious situation because of an accident can be avoided or attended to at the earliest. At the point of time when a vehicle meets with an accident or an auto moves over, the tilt sensor recognizes the flag and promptly sends it to the microcontroller. The microcontroller sends the alarm message through the IoT Module including the location of the accident through the GPS Module to the police or control group by publishing it over the cloud. So, the crisis enable group can promptly follow the area through the GPS Module, subsequent to receiving and accepting the data. The area can likewise be seen on the Google maps. Vital move can be made if this data reaches the control group in time. This venture is valuable in recognizing the accident with the use of sensors. As a future execution, we can add a remote webcam to the current system in order to capture pictures of the scene of the accident.

2 citations

Journal ArticleDOI
Abstract: In the current scenario, there is an appreciable escalation in the utilisation of cloud computing by critical industrial applications due to its cost-effective storage and computing. However, due to an untrusted server in a cloud, the access control turns out to be the challenging issue to ensure the confidentiality of sensitive data. The ciphertext policy attribute-based encryption (CP-ABE) is deliberated to be an apt technique to enforce the access control for encrypted cloud outsourced data. But, due to the computation complexity of decryption, user revocation and complexity of key management for achieving granularity, prevailing CP-ABE schemes when applied directly to multi authority attribute system, incurs more computational costs in the order of NP. In this paper, an efficient CP-ABE based multi authority attribute system is put forth that supports decryption and user revocation by CSP with the advent of a blind encryption/decryption technique and a novel colouring scheme for predicting user behaviour analysis. Security and performance of ERAC-MAC was analysed and found to be much better than the other prevailing schemes. The implementation was done using the paring based cryptography library of the Stanford University in Ubuntu environment.

2 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The main aim is to provide a suitable device recommended by doctors for patients suffering from obesity, such that doctors can examine patient’s health trends over a period from the stored data for monitoring any changes that could be a symptom of an underlying unnoticed health condition.
Abstract: Obesity is a global epidemic, often considered an impending disaster for the world’s population. Healthcare organizations and professionals repeatedly emphasize the negative impacts on obesity in the development of cardiovascular diseases, hypertension and diabetes. The continuous monitoring of physiological parameters; namely SpO2, blood pressure, body temperature and pulse rate are imperative for obese adult patients. IoT is a dynamic field, used extensively in all fields: agriculture, automobile, manufacturing and retail industry primarily for automated remote real-time monitoring. This paper focuses on the implementation of IoT in the healthcare industry for monitoring and evaluating health conditions of obese adults, along with emphasis on the importance of medical data storage. Furthermore, a device is developed with a novel design and system, which not only allows real-time monitoring but also the storage of medical records for multiple patients simultaneously. The device facilitates measurements of these parameters using an Arduino environment and then transmits the data onto an IoT dashboard using a Wi-fi module for remote monitoring for healthcare professionals. The main aim is to provide a suitable device recommended by doctors for patients suffering from obesity, such that doctors can examine patient’s health trends over a period from the stored data for monitoring any changes that could be a symptom of an underlying unnoticed health condition.

27 citations

Journal ArticleDOI
TL;DR: In this paper, a multi-physical parameter wireless telemedicine health monitoring system solution is proposed, and analyzes the overall structure and functional requirements of the system, including body temperature, respiration, blood oxygen saturation, pulse, blood pressure, and electrocardiogram.
Abstract: Telemedicine, as a new technical means and medical model, can truly realize the sharing and monitoring of telemedicine information, and ultimately ensure that everyone has equal access to medical and health resources. Based on the research on the status of telemedicine application and wireless communication technology, this paper proposes a multi-physical parameter wireless telemedicine health monitoring system solution, and analyzes the overall structure and functional requirements of the system. Human physiological parameters of the wireless remote medical system for health monitoring include body temperature, respiration, blood oxygen saturation, pulse, blood pressure, and electrocardiogram. In this paper, fabric electrodes are used to extract human bioimpedance signals, discrete Fourier transform algorithm is used to detect human respiratory signals, and respiratory rate is detected based on dynamic differential threshold peak detection technology. The reflection type photoelectric sensor is used to realize the reflection of the human pulse signal, and the continuous measurement of the cuff-free blood pressure based on the pulse wave conduction time is combined with the ECG (Electrocardiogram) data. A self-learning threshold algorithm based on near-infrared photo plethysmo graphy signal trough detection is designed on the reflective blood oxygen saturation calculation algorithm. The difference threshold method is used to extract the QRS band feature points. We tested the overall operation of the system. The results show that the collected human physiological signal data is accurate. After a series of tests, the validity and reliability of the collected physiological signals have been proven.

25 citations

Journal ArticleDOI
TL;DR: In this paper, a modified and adaptive PSO-based resource and deadline-aware dynamic load-balanced (PSO-RDAL) algorithm is proposed, which aims to provide an optimized solution for the workload of independent and compute-intensive tasks with reasonable time and cost.
Abstract: Cloud computing is an Internet-provisioned computing paradigm that provides scalable resources for the execution of the end user’s tasks. The cloud users lease optimal resources that meet their demands with minimum cost and time. The cloud service providers need high utilization of cloud resources and minimized execution cost. To achieve high user satisfaction and improve utilization of cloud resources, the task scheduling techniques should be resource and deadline aware and distribute the workload in a balanced manner. A number of heuristic and meta-heuristic-based task scheduling approaches have been proposed; however, the majority of these approaches are not resource and deadline aware. Moreover, these schedulers either optimize a single objective or multiple objectives with non-conflicting parameters. However, there is a need for schedulers that can provide a balanced solution for conflicting parameters like time and cost. In this paper, a modified and adaptive PSO-based resource- and deadline-aware dynamic load-balanced (PSO-RDAL) algorithm is proposed. The PSO-RDAL scheduling technique aims to provide an optimized solution for the workload of independent and compute-intensive tasks with reasonable time and cost. Moreover, the proposed approach also supports multi-objective-based optimization with conflicting parameters like time and cost. The experimental results reveal that the PSO-RDAL has gained up to 66%, 162%, 56%, 89%, 98%, and 97% enhancement in terms of makespan, average resource utilization, task response time, meeting task deadline, penalty cost, and total execution cost, respectively, as compared to existing state-of-the-art tasks scheduling heuristics.

15 citations

Journal ArticleDOI
TL;DR: There is a major threat concerning data breaches because of the lack of management understanding of the use of cloud computing services and their defence mechanisms and the various threats to cloud computing are explored, in addition to outlining defence mechanisms against these threats.
Abstract: With the advent of computers and their widespread use, cloud computing has been identified as one of the major emerging components of computer technology. The benefits of cloud computing, in the form of processing power and computing resources connected via the internet, have not only bolstered business and personal operations of users but have also led to severe security and privacy threats that require adaptation into cloud computing systems. In light of this, the present study explores the various threats to cloud computing, in addition to outlining defence mechanisms against these threats. It was found that there is a major threat concerning data breaches because of the lack of management understanding of the use of cloud computing services and their defence mechanisms. Furthermore, there can be an abuse of cloud computing services that, in turn, affect not only sensitive data pertaining to the organisation but also the personal identity and information of the user.

14 citations