global m-health monitoring and control system using user base prototype security algorithm

B.Chokkalingam,K.Dhivya,S.Hariprasath

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:4         Issue:3         Year: 30 March,2016         Pages:564-568

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

The project deals with the hospital branch, doctor’s details and patient’s details management. Since in distributed environment delivers convenient, on-demand access to share pools of data, applications and hardware over the internet, it provides unlimited infrastructure to store and execute patient data and program. Due to this redundancy the data can be easily modified by unauthorized users which can be stored in the database. This leads to loss of data privacy and security to database. The proposed scheme ensures that cyclic redundancy check and time-tested practices and technologies for managing trust relationships in traditional enterprise environments can be extended to work effectively in both private and public clouds. Those practices include data encryption, strong authentication and fraud detection, etc.

Kewords

TripleDES

Reference

1. Alistair Mc Monnies, “Object-oriented programming in Visual C#. NET”, Pearson Education, and ISBN: 81-297-0649-0, First Indian Reprint 2004. 2. Robert D.Schneider, Jetty R.Garbus, “Optimizing SQL Server”, Second Edition, Pearson Education Asia, ISBN: 981-4035-20-3 3. Herbert Schildt, “C# 2.0, The Complete Reference, Osborne Complete Reference Series. 4. G. Ghinita, Y. Tao, and P. Kalnis, "On the Anonymization of Sparse, High-Dimensional Data," Proc. IEEE Intl Conf. Data Eng. (ICDE), pp. 715-724, 2008.