Online ISSN: 2515-8260

Keywords : Data Security

Health Monitoring Wearable Device Using Internet Of Things

R. Vani; D. Subitha

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 395-400

The hospitalization of the victims suffering from certain diseases depend hugely over keeping an eye on the information repetitively. New wearable devices and technologies for this purpose are discovered to enhance the continuous monitoring of systems. This newly developed approach is recognized as body-body communion. Using the human body, we can convey various information, data and signals. Practicing this newly developed approach eradicates the existing complex structures which are composed of cords and wires. This makes it uncomfortable for the patient for prolonged hours. This increases the difficulty in critical patients especially the patients which tend to require immediate and timely assistance by the doctors and nurses. In this system, sensors are implemented on the body of the patients’ which regularly keeps an eye on the needed parameters. There are five respective sensors which are being used in this system. They are heart rate sensor, ECG sensor, respiratory sensor, humidity sensor and dust level sensors. Therefore we are able to determine the requirements and needs of the patient almost immediately and accurately. Information which is gathered is relocated from an intermediate network to a hospital. This can later be analysed on the respective customized gadgets and equipments or saved in the victim’s electronic database. Doctors are then able to interpret the problem by making use of the collected information, and can come up with a method of prescription and medication required. This is very helpful in reducing the time and complexity in the prescription planning and analysis. This helps to save a lot of time in preparing a treatment plan and to redeem medical reserves.

Analyzing the Performance of Cryptographic Algorithms in Cloud Environment

Devi. T; Ganesan. R

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2314-2323

People across the globe are very much interested in using latest technology at a lower cost. This is the reason for popularity of cloud services with the help of Internet across the globe. Storing of data in cloud is one of the major functions as outsourcing reduces the burden of local storage and issues related to them. The research focus is on protection of data stored on cloud which is usually sensitive data or private data as well. The protection mechanisms should be in such a way that the mechanisms for protection should be stringent thereby preventing access by the attackers. Manipulation by intruders should also be prevented. Cryptography helps in changing the critical data to a unreadable form so that manipulation by outsiders is not possible. In order to provide security, several approaches and algorithms are available. These algorithms are used based on the requirement of the user or the organization. The paper compares various algorithms available to secure the sensitive data stored in cloud. Key size of the algorithms are compared along with the performances based in the expenses produced in their usage. The results are shown in table which show the algorithms suitable for the purpose of encryption in cloud.