Book ChapterDOI
Monitoring Individual Medical Record by Using Wearable Body Sensors
Jagadeesh Gopal,E. Sathiyamoorthy,R. Mohamad Ayaaz +2 more
- pp 355-363
TLDR
This proposed framework is for a healing facility condition the specialists and attendants can access the client’s therapeutic data from the Blynk server, and individual medical record [IMR] can be access by the doctors and the medical staff to analyze the patient condition.Abstract:
Every single essential sign has an immediate effect in human services, so body sensors are utilized for consistent social insurance checking. In existing techniques, the sensors are embedded or wear by the client and the sensor information are exchanged and put away in the restorative server. In this proposed framework is for a healing facility condition the specialists and attendants can access the client’s therapeutic data from the Blynk server. The wearable sensor’s on the patient’s body is associated with an Arduino board the detected data is transmitted by transfer hub and put away in the cloud which will be access by the Blynk server and get the data to the Blynk application so that the patient and the doctors can access the data or the records of the particular patient and even the medical staff. The specialists and attendants can get to the patient’s medicinal data from the Blynk application. Individual medical record [IMR] can be access by the doctors and the medical staff to analyze the patient condition.read more
References
More filters
Proceedings ArticleDOI
Ciphertext-Policy Attribute-Based Encryption
TL;DR: A system for realizing complex access control on encrypted data that is conceptually closer to traditional access control methods such as role-based access control (RBAC) and secure against collusion attacks is presented.
Proceedings ArticleDOI
Attribute-based encryption for fine-grained access control of encrypted data
TL;DR: This work develops a new cryptosystem for fine-grained sharing of encrypted data that is compatible with Hierarchical Identity-Based Encryption (HIBE), and demonstrates the applicability of the construction to sharing of audit-log information and broadcast encryption.
Proceedings ArticleDOI
Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing
TL;DR: This paper addresses the problem of simultaneously achieving fine-grainedness, scalability, and data confidentiality of access control by exploiting and uniquely combining techniques of attribute-based encryption (ABE), proxy re-encryption, and lazy re- Encryption.
Proceedings ArticleDOI
Attribute based data sharing with attribute revocation
TL;DR: This paper uniquely integrates the technique of proxy re-encryption with CP-ABE, and enables the authority to delegate most of laborious tasks to proxy servers, and shows that the proposed scheme is provably secure against chosen ciphertext attacks.
Proceedings ArticleDOI
Identity-based encryption with efficient revocation
TL;DR: This work proposes an IBE scheme that significantly improves key-update efficiency on the side of the trusted party (from linear to logarithmic in the number of users), while staying efficient for the users.