Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Providing Security to Medical Data


Affiliations
1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


Wireless Medical Sensor Network (WMSN) is used in healthcare applications which have the collection of sensors connected to body or emergency care unit to monitor the patients’ vital signs. The privacy details of the patients have to be secured. Lot of techniques have been proposed to secure the health data. But there are some loop holes still exist for the attackers to hack the data. This is the major problem and to solve this issue some techniques have to be invented. In the proposed system we are comparing the four existing cryptosystems for its computation time. We choose the best one among them to encrypt the data.


Keywords

Security, Transmission of Data, Privacy.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 195

PDF Views: 3




  • Providing Security to Medical Data

Abstract Views: 195  |  PDF Views: 3

Authors

D. Sathya
Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, India
S. Kokilavani
Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, India
S. Krithika
Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, India

Abstract


Wireless Medical Sensor Network (WMSN) is used in healthcare applications which have the collection of sensors connected to body or emergency care unit to monitor the patients’ vital signs. The privacy details of the patients have to be secured. Lot of techniques have been proposed to secure the health data. But there are some loop holes still exist for the attackers to hack the data. This is the major problem and to solve this issue some techniques have to be invented. In the proposed system we are comparing the four existing cryptosystems for its computation time. We choose the best one among them to encrypt the data.


Keywords


Security, Transmission of Data, Privacy.