• Login
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    LoginRegister

    Statistics

    View Usage StatisticsView Google Analytics Statistics

    Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications

    Thumbnail
    View/Open
    201611014 (453.9Kb)
    Date
    2018
    Author
    Patwa, Dolly R.
    Metadata
    Show full item record
    Abstract
    In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It serves patients even in the remote locations. Remote patient monitoring enables serving patients outside of clinical conventional setting at hospitals. It may increase easy caring and monitoring of health frequently and decrease healthcare delivery costs. Healthcare applications for chronic diseases have significantly improved user's quality of life. It allows user to monitor his health frequently and decreases cost since he get personalized care as conventional doctor and hospital settings. mHealth is abbreviation of mobile health. It involves provision of healthcare services via smart phones and attached wearable wireless devices. Several healthcare systems proposed and it discusses privacy of user and security of user's data. Healthcare system involves healthcare companies, user and cloud mainly as participating entities in the system. Privacy should be maintained in a sense that nobody other than the user should be able to know his current health condition and get appropriate personalized care. Since companies lack of storage and computational resources, security of user's medical data is at risk. Several healthcare application systems have been proposed over the past decade yet user's privacy and security is a potential threat to such a system. Therefore, analysis of such systems is required. In this thesis work, we analyzed a healthcare application system and found outsider attack and proposed mitigation to prevent this attack. Our proposed mitigation borrows the idea of binding-blinding technique. We made security analysis of our proposed scheme as well as its performance analysis.
    URI
    http://drsr.daiict.ac.in//handle/123456789/742
    Collections
    • M Tech Dissertations [923]

    Resource Centre copyright © 2006-2017 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     


    Resource Centre copyright © 2006-2017 
    Contact Us | Send Feedback
    Theme by 
    Atmire NV