Securing user information in cloud based health monitoring system / Najlacnejšie knihy
Securing user information in cloud based health monitoring system

Code: 19039349

Securing user information in cloud based health monitoring system

by Suyog Dhoot

Health monitoring is repeatedly mentioned as one of the main application areas for pervasive computing. Mobile or remote Health Care is the integration of cloud computing and health monitoring. It is the application of cloud compu ... more

34.30

RRP: 38 €

You save 3.70 €


In stock at our supplier
Shipping in 9 - 11 days
Add to wishlist

You might also like

Give this book as a present today
  1. Order book and choose Gift Order.
  2. We will send you book gift voucher at once. You can give it out to anyone.
  3. Book will be send to donee, nothing more to care about.

Book gift voucher sampleRead more

More about Securing user information in cloud based health monitoring system

You get 86 loyalty points

Book synopsis

Health monitoring is repeatedly mentioned as one of the main application areas for pervasive computing. Mobile or remote Health Care is the integration of cloud computing and health monitoring. It is the application of cloud computing technologies for improving communication among patients, physicians, and other health care workers. Cloud-assisted health monitoring, which applies the prevailing mobile communications and cloud computing technologies to provide feedback decision support, has been considered as a revolutionary approach to improving the quality of healthcare service while lowering the healthcare cost. Unfortunately, it also poses a serious risk on both clients' privacy and intellectual property of Health service providers, which could deter the wide adoption of technology. I present a system is to address this important problem and design a cloud assisted privacy preserving health monitoring system to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique using email and a newly proposed re-encryption using blind search techniques are adapted to secure sensitive data of user.

Book details

34.30

Trending among others



Collection points Bratislava a 2642 dalších

Copyright ©2008-24 najlacnejsie-knihy.sk All rights reservedPrivacyCookies


Account: Log in
Všetky knihy sveta na jednom mieste. Navyše za skvelé ceny.

Shopping cart ( Empty )

For free shipping
shop for 59,99 € and more

You are here: