Internet of Things on Smart Object on M-health Case Records on Cloud

International Journal of Computer Science and Engineering
© 2016 by SSRG - IJCSE Journal
Volume 3 Issue 3
Year of Publication : 2016
Authors : R.Navinkumar, E.Senthilkumar

How to Cite?

R.Navinkumar, E.Senthilkumar, "Internet of Things on Smart Object on M-health Case Records on Cloud," SSRG International Journal of Computer Science and Engineering , vol. 3,  no. 3, pp. 1-5, 2016. Crossref,


Cloud computing is on the whole ofa distributed computing over a network. Cloud computing is the rising computing technologies in the circulated paradigm. Even though technology is rising rapidly but any unauthorized user can exploit the weakness of cloud computing system. Special types of approaches are in growth to protect the privacy of this system. In this paper we use efficient encryption algorithm to secure M-Hospital management in cloud and provide segmentation to keep confidential medical image in cloud. For reducing image size we used Hadoop and Map Reduce.


PHR- Patient Health Record, cloud service provider, Wireless sensor network, ABE- Attribute–Base Encryption. Trusted Privacy Domain (TPD).


[1] Eman AbuKhousa, Nader Mohamed and Jameela Al-Jaroodi,” e-Health Cloud: Opportunities and Challenges”, Future Internet 2012, 4, 621-645;
[2] Arash Nourian, Muthucumaru Maheswaran,” Using segmentation for confidentiality aware image storage and retrieval on clouds”, Globecom 2012 - Communication and Information System Security Symposium.
[3] D.Manivannan1, R.Sujarani2,”Light Weight and Secure Database Encryption Using TSFS Algorithm”,
[4] Jung ho Eom and Min woo Park” Design of Internal Traffic Checkpoint of Security Checkpoint Model in the Cloud Computing”, International Journal of Security and Its Applications Vol. 7, No. 1, January, 2013. 
[5] Palivela Hemant, Nitin.P.Chawande, Avinash Sonule, Hemant Wani,” DEVELOPMENT OF SERVERS IN CLOUD COMPUTING TO SOLVE ISSUES RELATED TO SECURITY AND BACKUP”, 978-1-61284-204-2/11/$26.00 ©2011 IEEE. 
[6] Akhil Behl,” Emerging Security Challenges in Cloud Computing”, 978-1-4673-0126-8/11c 2011 IEEE. 
[7] Qian Wang, Cong Wang, Kui Ren, Wenjing Lou” Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011.
[8] Kevin Hamlen, Murat Kantarcioglu, Latifur Khan,” Security Issues for Cloud Computing”, International Journal of Information Security and Privacy, 4(2), 39-51, April-June 2010.
[9 ] Priyank Rajvanshi, Varun Singh Nagar, Priyanka Chawla, “Data Protection in Cloud Computing”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-3, August 2013
[10] Uma Somani, Kanika Lakhani, Manish Mundra,” Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010). 
[11] Zhang Xin, Lai Song-qing, Lai Nai-wen,” Research on Cloud Computing Data Security Model Based on Multi-dimension” 978-1-4673-2108-2112©2012 IEEE.
[12] Miika Komu, Mohit Sethi, Ramasivakarthik Mallavarapu, Heikki Oirola and Rasib Khan,” Secure Networking for Virtual Machines in the Cloud”, 978-0-7695-4844-9/12 © 2012 IEEE