ABSTRACT: Implantable restorative gadgets (IMDs) are electronic gadgets embedded inside human body for indicative, checking, and remedial purposes. It is basic to ensure that IMDs are totally anchored since the patient’s life is firmly bound to the strength and adequacy of IMDs. Naturally, we need to guarantee that just the approved restorative work force and […]
Month: February 2024
A Wireless Health Monitoring System Using Mobile Phone Accessories
ABSTRACT: This paper introduces the structure and model of a remote wellbeing checking framework utilizing cell phone frill. We center around estimating continuous electrocardiogram (ECG) and pulse observing utilizing a cell phone case. With the expanding number of cardiovascular patients around the world, this structure can be utilized for early identification of heart infections. Not […]
A secure client-side framework for protecting the privacy of health data stored on the cloud
ABSTRACT: Distributed computing and informal communities are changing the method for social insurance by giving realtime information partaking in a financially savvy way. In any case, information security issue is one of the primary obstructions to the wide utilization of versatile human services interpersonal organizations (MHSNs), From wellbeing data is viewed as exceedingly touchy. In […]
Coexistence of ZigBee-Based WBAN and WiFi for Health Telemonitoring Systems
ABSTRACT: The advancement of telemonitoring by means of remote body region systems (WBANs) is a developing course in customized medication and locally established versatile wellbeing. A WBAN comprises of small, wise therapeutic sensors which gather physiological parameters, for example, electrocardiogram, electroencephalography, and circulatory strain. The recorded physiological signs are sent to an organizer by means […]
Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing
ABSTRACT: Haze registering is an ongoing examination pattern to convey distributed computing administrations to arrange edges. EDCs are sent to diminish the idleness and system blockage by handling information streams and applicant asks for in close ongoing. EDC arrangement is disseminated in nature and situated between cloud server farms and information sources. Load adjusting is […]
Secure Identity-based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
ABSTRACT: Distributed computing and informal communities are changing the method for social insurance by giving realtime information partaking in a financially savvy way. In any case, information security issue is one of the primary obstructions to the wide utilization of versatile human services interpersonal organizations (MHSNs), since wellbeing data is viewed as exceedingly touchy. In […]
A secure client-side framework for protecting the privacy of health data stored on the cloud
ABSTRACT: In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running although concerns are rising about security breaches in cloud computing. Cloud providers (CPs) are taking significant measures to maintain the security and privacy […]
IF003 – Private Information Retrieval for Secure Distributed Storage Systems
ABSTRACT: In this paper, we examine a private data recovery (PIR) issue for secure disseminated stockpiling frameworks within the sight of a spy. We structure the safe conveyed database and the comparing PIR conspire, which ensure not just client protection (disguising the list of the coveted message) from the databases, yet additionally information security (hiding […]
IF002 – Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage
ABSTRACT: Individuals underwrite the extraordinary intensity of distributed computing, however can’t completely believe the cloud suppliers to have protection delicate information, because of the nonappearance of client to-cloud controllability. To guarantee classification, information proprietors redistribute encoded information rather than plaintexts. To impart the encoded records to different clients, ciphertext-arrangement trait based encryption (CP-ABE) can be […]
IF001 – An Efficient MSB Prediction-Based Method for High-Capacity Reversible Data Hiding in Encrypted Images
ABSTRACT: Reversible information covering up in encoded pictures (RDHEI) is a viable strategy to insert information in the scrambled space. A exclusive picture is scrambled with a mystery key and amid or after its transmission, it is conceivable to install extra data in the encoded picture, without realizing the encryption key or the first substance […]