Loading

Privacy Preserving Scalar Product Computation for Mobile Healthcare Emergency
Aparnaa.M1, Sacred HeartAmir.C2, Vigneshwari. K3, VishnuKumar.A4
1Aparnaa.M, Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
2Sacred Heartamir.C Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
3Vigneshwari.K, Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
4VishnuKumar.A, Information Techonology, Vel Tech Hightech Dr. Rangaragan Dr. Sakunthala Engineering College, Chennai, India.
Manuscript received on March 20, 2013. | Revised Manuscript received on April 14, 2013. | Manuscript published on April 30, 2013. | PP: 610-613 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1526042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The cost of health care has become a national concern. Recent advances in wireless communication networking and IT have made it possible to monitor and overhaul the outcomes across diverse healthcare environment. Here we make use of the sensors and smart phones to provide continuous monitoring of the individuals without the need for them to be hospitalized. Based on the health conditions of the patients’, the dedicated sensors are provided to monitor the patients’ after which the sensed data is transmitted to the healthcare center using their smart phones. However the Smart phone which are used for various purpose when is not available to transmit the data due to some reasons , we make use of opportunistic computing where the data is transmitted using a neighbors’ Smartphone. The m-healthcare still faces many challenges which include Information security and privacy preservation. To overcome the above shortcomings we use a encryption technique to preserve the privacy of users’ health information.
Keywords: About four key words or phrases in alphabetical order, separated by commas.