Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Avoiding Intrusion and Privacy Protection for Cloudlet-based Medical Data Sharing

Author : Karthika.J 1 Lavanya.S 2 JayaSankari.J 3 Mariya sushmitha.T.F 4 kanimozhi.R 5

Date of Publication :11th August 2017

Abstract: The popularity of wearable devices with the development of clouds and cloudlet technology, increased the need to provide better medical care. The process of medical data includes data collection, data storage and data sharing,. In the Traditional healthcare system ,it requires the delivery of medical data to the cloud, which involves users’ integrated information and causes communication energy consumption. Practically, medical data sharing is a critical and most challenging issue. The functions of cloudlet include privacy protection, data sharing and intrusion detection. In the stage of data collection, we first utilize Number Theory Research Unit (NTRU) method to encrypt user’s body data collected by wearable devices. Those data will be transmitted to nearby cloudlet in an energy efficient fashion. Secondly, a new trust model to help users to select trustable partners who want to share stored data in the cloudlet. Thirdly, we divide users’ medical data stored in remote cloud of hospital into three parts, and give them proper protection. Lastly , to protect the healthcare system from malicious attacks, we develop a novel collaborative intrusion detection system method based on cloudlet mesh.

Reference :

  1. https://www.patientslikeme.com/.

    C. Zhang, J. Sun, X. Zhu, and Y. Fang, “Privacy and security for online social networks: challeng

    L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557– 570, 2002.

    L. M. Kaufman, “Data security in the world of cloud computing,” Security & Privacy, IEEE, vol. 7, no. 4, pp. 61–64, 2009.

    R. Lu, X. Lin, and X. Shen, “Spoc: A secure and privacy-preserving opportunistic computing framework for mobile-healthcare emergency,” Parallel and Distributed Systems, IEEE Transactions on, vol. 24, no. 3, pp. 614–624, 2013.


Recent Article