dc.contributor.advisor | Das, Manik Lal | |
dc.contributor.author | Patwa, Dolly R. | |
dc.date.accessioned | 2019-03-19T09:30:52Z | |
dc.date.available | 2019-03-19T09:30:52Z | |
dc.date.issued | 2018 | |
dc.identifier.citation | Patwa, Dolly R. (2018). Privacy Preserving Identity Verification with Binding Blinding Technique in Cloud Assisted Healthcare Applications. Dhirubhai Ambani Institute of Information and Communication Technology, vii, 40 p. (Acc. No: T00708) | |
dc.identifier.uri | http://drsr.daiict.ac.in//handle/123456789/742 | |
dc.description.abstract | In recent times, broad deployment of computers and mobile devices such as
mobile phones, PDA's rigged with cost efficient sensors, have shown great potential
in recognizing positive direction to healthcare services. It serves patients even
in the remote locations. Remote patient monitoring enables serving patients outside
of clinical conventional setting at hospitals. It may increase easy caring and
monitoring of health frequently and decrease healthcare delivery costs. Healthcare
applications for chronic diseases have significantly improved user's quality
of life. It allows user to monitor his health frequently and decreases cost since
he get personalized care as conventional doctor and hospital settings. mHealth
is abbreviation of mobile health. It involves provision of healthcare services via
smart phones and attached wearable wireless devices. Several healthcare systems
proposed and it discusses privacy of user and security of user's data. Healthcare
system involves healthcare companies, user and cloud mainly as participating entities
in the system. Privacy should be maintained in a sense that nobody other
than the user should be able to know his current health condition and get appropriate
personalized care. Since companies lack of storage and computational
resources, security of user's medical data is at risk. Several healthcare application
systems have been proposed over the past decade yet user's privacy and security
is a potential threat to such a system. Therefore, analysis of such systems is required.
In this thesis work, we analyzed a healthcare application system and found
outsider attack and proposed mitigation to prevent this attack. Our proposed
mitigation borrows the idea of binding-blinding technique. We made security
analysis of our proposed scheme as well as its performance analysis. | |
dc.publisher | Dhirubhai Ambani Institute of Information and Communication Technology | |
dc.subject | Medicine Data processing | |
dc.subject | Cloud computing | |
dc.subject | Mobile computing | |
dc.classification.ddc | 006.78 PAT | |
dc.title | Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications | |
dc.type | Dissertation | |
dc.degree | M. Tech | |
dc.student.id | 201611014 | |
dc.accession.number | T00708 | |