An enhanced lightweight speck system for cloud-based smart healthcare

M AbdulRaheem, GB Balogun, MK Abiodun… - … Conference, ICAI 2021 …, 2021 - Springer
M AbdulRaheem, GB Balogun, MK Abiodun, FA Taofeek-Ibrahim, AR Tomori, ID Oladipo
Applied Informatics: Fourth International Conference, ICAI 2021, Buenos Aires …, 2021Springer
In the realm of information and communication sciences, the Internet of Things (IoT) is a new
technology with sensors in the healthcare sector. Sensors are critical IoT devices that
receive and send crucial bodily characteristics like blood pressure, temperature, heart rate,
and breathing rate to and from cloud repositories for healthcare specialists. As a result of
technical advancements, the usage of these devices, referred to as smart sensors, is
becoming acceptable in smart healthcare for illness diagnosis and treatment. Data …
Abstract
In the realm of information and communication sciences, the Internet of Things (IoT) is a new technology with sensors in the healthcare sector. Sensors are critical IoT devices that receive and send crucial bodily characteristics like blood pressure, temperature, heart rate, and breathing rate to and from cloud repositories for healthcare specialists. As a result of technical advancements, the usage of these devices, referred to as smart sensors, is becoming acceptable in smart healthcare for illness diagnosis and treatment. Data generated from these devices is huge and intrinsically tied to every sphere of daily life including healthcare domain. This information must be safeguarded and processed in a safe location. The term “cloud computing” refers to the type of innovation that is employed to safe keep such tremendous volume of information. As a result, it has become critical to protect healthcare data from hackers in order to maintain its protection, privacy, confidentiality, integrity, and its processing mode. This research suggested a New Lightweight Speck Cryptographic Algorithm to Improve High - Performance Computing Security for Healthcare Data. In contrasted to the cryptographic methods commonly employed in cloud computing, the investigational results of the proposed methodology showed a high level of security and an evident improvement in terms of the time it takes to encrypt data and the security obtainable.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果