Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2017 (2017), Article ID 3734764, 11 pages
https://doi.org/10.1155/2017/3734764
Research Article

An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

1School of Computer Science, Shenyang Aerospace University, Shenyang City, Liaoning Province, China
2Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan
3School of Information Engineering, Changchun University of Science and Technology, Changchun 130600, China

Correspondence should be addressed to Chin-Ling Chen; wt.ude.tuyc.liam@clc

Received 3 June 2016; Accepted 28 November 2016; Published 3 January 2017

Academic Editor: Hai-Feng Ji

Copyright © 2017 Jin-Xin Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Abstract

Internet of Things (IoT) is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly’s privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.