CAM: Double Standard Security Mechanism In The Management Cloud Based Mobile Application

Alasandguthi. Ramya Sree, Ch. Koteswara Rao, D. Anandam


In a remote mHealth observing framework a customer could mastermind compact sensors in remote body sensor systems to gather different physiological information, for example, circulatory strain (BP), breathing rate (BR), Electrocardiogram (ECG/EKG), fringe oxygen immersion (SpO2) and blood glucose. Such physiological information could then be sent to a focal server which could then run a mixture of web therapeutic applications on these information to return opportune guidance to the customer. Cloud-helped mHealth observing could offer an incredible prospect to liven up the nature of social insurance administrations and conceivably decrease human services costs there is a reluctant square in making this innovation a reality. It is taking into account another option of key private intermediary re-encryption plan in which the organization just needs to accomplish encryption once at the setup stage while moving the rest computational errands to the cloud without bargaining security in addition diminishing the computational and correspondence load on customers and the cloud.


P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online]. Available:

A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,” Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884– 893, 2010.

G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012.

L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available:,” 2010.

A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. vanBeijnum, and P. D. Stefanis, “End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484.

M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready for the clouds?” in SERVICES, 2011, pp. 371–378.

N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009.

E. B. Fernandez, “Security in data intensive computing systems,” in Handbook of Data Intensive Computing, 2011, pp. 447–466.

A. Narayanan and V. Shmatikov, “Myths and fallacies of personally identifiable information,” Communications of the ACM, vol. 53, no. 6,pp. 24–26, 2010.

P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, “Countering gattaca: efficient and secure testing of fully-sequenced human genomes,” in ACM Conference on Computer and Communications Security, 2011, pp. 691–702.

A. Cavoukian, A. Fisher, S. Killen, and D. Hoffman, “Remote home health care technologies: how to ensure privacy? build it in: Privacy by design,” Identity in the Information Society, vol. 3, no. 2, pp. 363–378, 2010.

A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in Security and Privacy, 2008. SP 2008. IEEE Symposium on. IEEE, 2008, pp. 111–125.

——, “De-anonymizing social networks,” in IEEE Symposium on Security and Privacy. IEEE Computer Society, 2009, pp. 173–187.

I. Neamatullah, M. Douglass, L. Lehman, A. Reisner, M. Villarroel, W. Long, P. Szolovits, G. Moody, R. Mark, and G. Clifford, “Automated de-identification of free-text medical records,” BMC medical informatics and decision making, vol. 8, no. 1, p. 32, 2008.

S. Al-Fedaghi and A. Al-Azmi, “Experimentation with personal identifiable information,” Intelligent Information Management, vol. 4, no. 4, pp. 123–133, 2012.

Full Text: PDF [Full Text]


  • There are currently no refbacks.

Copyright © 2013, All rights reserved.|

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at