Journal Menu
By: LadTejaswini Shivaji, BhoiteShravani Vikas, ShingareVaishnavi Laxman, and PilaneSai Ashok.
1-4 Student, Raigad Dnyanpeeth’s Technical Campus Polytechnic, Gat no237, Pune Bangalore Highway, Dhangawadi, Tal. Bhor, Dist. Pune
All nations acknowledge that every individual has the right to maintain excellent health throughout their life and to take all necessary steps to keep improving. A person’s productivity can be significantly impacted by their health. Everyone is happier and more productive when an employee is in good health, which benefits the company as a whole. Recent technological advancements have made a significant contribution to the healthcare sector. Internet of Things (IoT) sensors enable the idea of remote medicine, which has the potential to significantly reduce physicians’ workloads in addition to enabling continuous patient monitoring. But in certain instances, these sensors have been used more frequently, increasing the risk of sensitive data being stolen or changed. Since most of this sensor data is being moved to cloud platforms, there is a higher level of vulnerability. However, there are serious issues with data security and privacy brought on by our growing reliance on IoT devices. Sensitive patient data is constantly being transferred to cloud platforms, putting it at risk for manipulation, illegal access, and data breaches. These flaws have the potential to jeopardize patient privacy, result in poor medical judgment, and even cause life-threatening circumstances. Therefore, it is crucial to protect medical data while preserving the advantages of IoT integration. There needs to be an alternative that safely safeguards the internet of things’ growing convenience. cloud platforms and Internet of Things devices in the medical field. As a result, this technique outlines an effective way to send sensor data to the Thing Speak cloud using the cloud and the Internet of Things (IoT). The server accesses this data concurrently for preprocessing and decision-making through WhatsApp Intimation in order to monitor the patient’s vitals. Secure frameworks that combine cloud and IoT technologies have been created to address 2 these issues. Sending sensor data to the ThingSpeak cloud platform for preprocessing and safe storage is one method. Furthermore, WhatsApp real-time notifications give prompt information about patient vitals, enabling medical professionals to react quickly. These methods show how cloud and IoT system integration, when paired with strong security protocols, can enhance healthcare delivery, boost operational effectiveness, and protect private patient data.
Medical Health Records, Public Clouds, Internet of Medical Things , Data Privacy and Protection,Remote Patient Monitoring
![]()
Citation:
Refrences:
1. Gao X, Yu J, Chang Y, Wang H, Fan J. Checking only when it is necessary: Enabling integrity auditing based on the keyword with sensitive information privacy for encrypted cloud data. IEEE Trans Depend Secure Comput. 2022 Nov-Dec;19(6):3774-89. doi:10.1109/TDSC.2021.3106780.
2. Abdelfattah S, et al. Effective search using known-plaintext/background models and unlinkability for encrypted medical data. IEEE Access. 2021;9:151129-41. doi:10.1109/ACCESS.2021.3126200.
3. Kwon H, Hahn C. Asymptotically optimal and secure multiwriter/multireader similarity search. IEEE Access. 2022;10:101957-71. doi:10.1109/ACCESS.2022.3208962.
4. Wu B, et al. Privacy-protection path finding supporting the ranked order on encrypted graph in big data
environment. IEEE Access. 2020;8:214596-604. doi:10.1109/ACCESS.2020.3040781.
5. Tao L, Xu H, Shu Y, Tie Z. An effective search method using features to match joint keywords on encrypted cloud data. IEEE Access. 2022;10:42836-43. doi:10.1109/ACCESS.2022.3168730.2
6. Liu G, Yang G, Bai S, Zhou Q, Dai H. FSSE: An effective fuzzy semantic searchable encryption scheme over encrypted cloud data. IEEE Access. 2020;8:71893-906. doi:10.1109/ACCESS.2020.2966367.
7. Liu X, Lu T, He X, Yang X, Niu S. Verifiable attribute-based keyword search over encrypted cloud data supporting data deduplication. IEEE Access. 2020;8:52062-74. doi:10.1109/ACCESS.2020.2980627.
8. Cui Y, Gao F, Shi Y, Yin W, Panaousis E, Liang K. An effective attribute-based multi-keyword search scheme in encrypted keyword generation. IEEE Access. 2020;8:99024-36. doi:10.1109/ACCESS.2020.2996940.
9. Liu L, Chen Q. A novel category group index mechanism for efficient ranked search of encrypted cloud data. IEEE Access. 2020;8:54601-10. doi:10.1109/ACCESS.2020.2977430.
10. Qin S, Zhou F, Zhang Z, Xu Z. Privacy-preserving substring search on multi-source encrypted gene data. IEEE Access. 2020;8:50472-84. doi:10.1109/ACCESS.2020.2980375.
11. Shen H, Xue L, Wang H, Zhang L, Zhang J. B+-tree based multi-keyword ranked similarity search scheme over encrypted cloud data. IEEE Access. 2021;9:150865-77. doi:10.1109/ACCESS.2021.3125729.
12. Dai H, Ji Y, Yang G, Huang H, Yi X. A privacy-preserving multi-keyword ranked search over encrypted data in hybrid clouds. IEEE Access. 2020;8:4895-907. doi:10.1109/ACCESS.2019.2963096.
13. Liu L, Chen Q. A novel feature matching ranked search mechanism over encrypted cloud data. IEEE Access. 2020;8:114057-65. doi:10.1109/ACCESS.2020.3002236.
