Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data

Authors

  • Y. Bala Supriya Department of Information Technology, G. Naarayanamma Inistitute of Science and Technology, Hyderabad, India
  • C. Sudhakar Reddy Department of Information Technology, G. Naarayanamma Inistitute of Science and Technology, Hyderabad, India

Keywords:

Privacy-Preserving, Data Mining, Cryptography, WMSN

Abstract

Wireless Sensor Networks (WSN) in recent years has become a leading area of interest and research. A Sensor is a device that responds and detects some type of input from both the physical and environmental conditions. Wireless devices have great impact on the medicinal region with an extensive variety of ability, not just enhancing the personal satisfaction of patients and specialist tolerant productivity, remote innovation empowers clinicians to monitor patients remotely and give them timely health information, updates and support-potentially extending the reach of health care by making it accessible anyplace, anytime. In the meantime, there is a developing worry about the doctor`s facilities` capacity to give powerful care amid calamity occasions. Thus, instruments that robotize quiet checking can possibly incredibly enhance proficiency and nature of medicinal services. In healing centers, medicinal information sensors which screen patients create an undeniably substantial volume of ongoing information. The transmission of this information through remote systems in a healing facility turns into an essential issue in light of the fact that the therapeutic data of an individual is very crucial and it must be kept private and secure. In this paper, we propose a pragmatic approach that guarantees secure data transmission. The primary commitment of this paper is safely conveying the patient information by actualizing Security Safeguarding Information Transmission convention and utilizing the Paillier and ElGamal cryptosystems to perform statistical analysis on the patient information without compromising the patient`s privacy. We enhance this protocol to reduce the overhead by implementing secure data aggregation method Keywords: privacy protection; paillier cryptosystem; patient data privacy.

 

References

Azzedine Boukerche, Yonglin Ren, “A Secure Mobile Healthcare System using Trust-Based Multicast Scheme”, IEEE Journal On Selected Areas In Communications, Vol. 27, No. 4, pp.316-325, 2009.

Daojing He, Sammy Chan, “A Novel and Lightweight System to Secure Wireless Medical Sensor Networks”, IEEE Journal Of Biomedical, Health Informatics, Vol. 18, No. 1, pp.23-32, 2014.

Geoffrey G. Messier, Ivars G. Finvers, “Traffic Models for Medical Wireless Sensor Networks”, IEEE Communications Letters, Vol. 11, No. 1, pp.,21-30, 2007.

Rongxing Lu, “SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency”, IEEE Transactions On Parallel And Distributed Systems, Vol. 12, No. 2, pp.452-461, 2012.

Ashminder Kaur, Ms. Lofty, "A Review of Colour Image Watermarking Scheme Based Image Normalized", International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.183-185, 2016.

Zhaoyang Zhang, Honggang Wang, Athanasios V. Vasilakos, Hua Fang, “ECG- Cryptography and Authentication in Body Area Networks”, IEEE Transactions On Information Technology In Biomedicine, Vol. 16, No. 6, pp.321-332, 2012.

Malan D., Jones T.F., Welsh M., Moulton S. “Code Blue: An Ad-Hoc Sensor Network Infrastructure for Emergency Medical Care”, Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems (WAMES 2004), USA, pp.6-9, 2004.

Anamika Patil, Pooja Bafna, Mona Pounikar and Pranjal Badgujar, "Distinct Revocable Data Hiding In Ciphered Image", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.90-94, 2014.

Surbhi Sharma, "Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.111-115, 2016.

T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Transactions onInformation Theory, Vol.31, Issue.4, pp.469-472, 1985.

Downloads

Published

2017-06-30

How to Cite

[1]
Y. B. Supriya and C. S. Reddy, “Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data”, Int. J. Sci. Res. Comp. Sci. Eng., vol. 5, no. 3, pp. 132–135, Jun. 2017.

Issue

Section

Review Article

Similar Articles

<< < 5 6 7 8 9 10 11 12 13 14 > >> 

You may also start an advanced similarity search for this article.