Full Paper View Go Back

Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data

Y. Bala Supriya1 , C. Sudhakar Reddy2

  1. Department of Information Technology, G. Naarayanamma Inistitute of Science and Technology, Hyderabad, India.
  2. Department of Information Technology, G. Naarayanamma Inistitute of Science and Technology, Hyderabad, India.

Correspondence should be addressed to: supriya.yeruva@gmail.com.


Section:Review Paper, Product Type: Isroset-Journal
Vol.5 , Issue.3 , pp.132-135, Jun-2017


Online published on Jun 30, 2017


Copyright © Y. Bala Supriya , C. Sudhakar Reddy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Y. Bala Supriya , C. Sudhakar Reddy, “Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.132-135, 2017.

MLA Style Citation: Y. Bala Supriya , C. Sudhakar Reddy "Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data." International Journal of Scientific Research in Computer Science and Engineering 5.3 (2017): 132-135.

APA Style Citation: Y. Bala Supriya , C. Sudhakar Reddy, (2017). Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data. International Journal of Scientific Research in Computer Science and Engineering, 5(3), 132-135.

BibTex Style Citation:
@article{Supriya_2017,
author = {Y. Bala Supriya , C. Sudhakar Reddy},
title = {Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {132-135},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=405},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=405
TI - Privacy-Preserving Data Transmission protocol for Wireless Medical Sensor Data
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - Y. Bala Supriya , C. Sudhakar Reddy
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 132-135
IS - 3
VL - 5
SN - 2347-2693
ER -

306 Views    223 Downloads    235 Downloads
  
  

Abstract :
Wireless Sensor Networks (WSN) in recent years has become a leading area of interest and research. A Sensor is a device that responds and detects some type of input from both the physical and environmental conditions. Wireless devices have great impact on the medicinal region with an extensive variety of ability, not just enhancing the personal satisfaction of patients and specialist tolerant productivity, remote innovation empowers clinicians to monitor patients remotely and give them timely health information, updates and support-potentially extending the reach of health care by making it accessible anyplace, anytime. In the meantime, there is a developing worry about the doctor`s facilities` capacity to give powerful care amid calamity occasions. Thus, instruments that robotize quiet checking can possibly incredibly enhance proficiency and nature of medicinal services. In healing centers, medicinal information sensors which screen patients create an undeniably substantial volume of ongoing information. The transmission of this information through remote systems in a healing facility turns into an essential issue in light of the fact that the therapeutic data of an individual is very crucial and it must be kept private and secure. In this paper, we propose a pragmatic approach that guarantees secure data transmission. The primary commitment of this paper is safely conveying the patient information by actualizing Security Safeguarding Information Transmission convention and utilizing the Paillier and ElGamal cryptosystems to perform statistical analysis on the patient information without compromising the patient`s privacy. We enhance this protocol to reduce the overhead by implementing secure data aggregation method Keywords: privacy protection; paillier cryptosystem; patient data privacy.

Key-Words / Index Term :
Privacy-Preserving, Data Mining, Cryptography, WMSN

References :
[1] Azzedine Boukerche, Yonglin Ren, “A Secure Mobile Healthcare System using Trust-Based Multicast Scheme”, IEEE Journal On Selected Areas In Communications, Vol. 27, No. 4, pp.316-325, 2009.
[2] Daojing He, Sammy Chan, “A Novel and Lightweight System to Secure Wireless Medical Sensor Networks”, IEEE Journal Of Biomedical, Health Informatics, Vol. 18, No. 1, pp.23-32, 2014.
[3] Geoffrey G. Messier, Ivars G. Finvers, “Traffic Models for Medical Wireless Sensor Networks”, IEEE Communications Letters, Vol. 11, No. 1, pp.,21-30, 2007.
[4] Rongxing Lu, “SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for MobileHealthcare Emergency”, IEEE Transactions On Parallel And Distributed Systems, Vol. 12, No. 2, pp.452-461, 2012.
[5] Ashminder Kaur, Ms. Lofty, "A Review of Colour Image Watermarking Scheme Based Image Normalized", International Journal of Computer Sciences and Engineering, Vol.4, Issue.7, pp.183-185, 2016.
[6] Zhaoyang Zhang, Honggang Wang, Athanasios V. Vasilakos, Hua Fang, “ECG- Cryptography and Authentication in Body Area Networks”, IEEE Transactions On Information Technology In Biomedicine, Vol. 16, No. 6, pp.321-332, 2012.
[7] Malan D., Jones T.F., Welsh M., Moulton S. “Code Blue: An Ad-Hoc Sensor Network Infrastructure for Emergency Medical Care”, Proceedings of the MobiSys 2004 Workshop on Applications of Mobile Embedded Systems (WAMES 2004), USA, pp.6-9, 2004.
[8] Anamika Patil, Pooja Bafna, Mona Pounikar and Pranjal Badgujar, "Distinct Revocable Data Hiding In Ciphered Image", International Journal of Computer Sciences and Engineering, Vol.2, Issue.11, pp.90-94, 2014.
[9] Surbhi Sharma, "Embedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme", International Journal of Computer Sciences and Engineering, Vol.4, Issue.3, pp.111-115, 2016.
[10] T. ElGamal, “A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms”, IEEE Transactions onInformation Theory, Vol.31, Issue.4, pp.469-472, 1985.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation