Secured Health Monitoring System in Mobile Cloud Computing

International Journal of Computer Trends and Technology (IJCTT)          
© 2014 by IJCTT Journal
Volume-13 Number-3
Year of Publication : 2014
Authors : Mohammed Azhar , Maddikunta Laxman
DOI :  10.14445/22312803/IJCTT-V13P129


Mohammed Azhar , Maddikunta Laxman. "Secured Health Monitoring System in Mobile Cloud Computing". International Journal of Computer Trends and Technology (IJCTT) V13(3):138-142, July 2014. ISSN:2231-2803. Published by Seventh Sense Research Group.

Abstract -
With the help of cloud computing, customers can preserve their information into the cloud remotely and utilize on-demand max-quality apps. With the help of a shared pool of calculating resources configurable. Information outsourcing: customers are relieved from the crisis of information preserve and managing. When clients keep their information (bulk size) on the cloud, the integrity of data protection is challenging task. Public audit enabling for cloud data preserving safety is must need. Client can rise query about an external audit party to verify the integrity of their transferred information. Mobile health (mHealth) monitoring in cloud, which imposes the cloud computing technologies and prevailing mobile communications to give feedback decision support, has been taken as a radical approach to increasing the quality of medical service while decreasing the medical price. Regrettably, it also contains a critical risk on both users’ privacy and cerebral property of checking service providers, which could block the huge mHealth technology adoption. This thesis is to notice this main crisis and design a cloud supported secured storage mobile monitoring system of health to store the security of the involved people and their information. Moreover, the outsourcing decryption technique and a freshly proposed key secure proxy re-encryption are inherited to transfer the complexity computational of the undertaken parties to the cloud without compromising users’ service and security providers’ intellectual property. At last, our privacy and operation analysis indicates the efficiency of our proposed design.

[1] P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online]. Available:
[2] A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,” iomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884– 893, 2010.
[3] G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012.
[4] L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available:,” 2010.
[5] A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. van Beijnum, and P. D. Stefanis, “End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484.
[6] M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready for the clouds?” in SERVICES, 2011, pp. 371–378.
[7] N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009.
[8] E. B. Fernandez, “Security in data intensive computing systems,” in Handbook of Data Intensive Computing, 2011, pp. 447–466.
[9] A. Narayanan and V. Shmatikov, “Myths and fallacies of personally identifiable information,” Communications of the ACM, vol. 53, no. 6, pp. 24–26, 2010.
[10] P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, “Countering gattaca: efficient and secure testing of fully-sequenced human genomes,” in ACM Conference on Computer and Communications Security, 2011, pp. 691–702.
[11] A. Cavoukian, A. Fisher, S. Killen, and D. Hoffman, “Remote home health care technologies: how to ensure privacy? build it in: Privacy by design,” Identity in the Information Society, vol. 3, no. 2, pp. 363–378, 2010.
[12] A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008, pp. 111–125.
[13] ——, “De-anonymizing social networks,” in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2009, pp. 173–187.
[14] I. Neamatullah, M. Douglass, L. Lehman, A. Reisner, M. Villarroel, W. Long, P. Szolovits, G. Moody, R. Mark, and G. Clifford, “Automated de-identification of free-text medical records,” BMC medical informatics and decision making, vol. 8, no. 1, p. 32, 2008.
[15] S. Al-Fedaghi and A. Al-Azmi, “Experimentation with personal identifiable information,” Intelligent Information Management, vol. 4, no. 4, pp. 123–133, 2012.