Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2017 (2017), Article ID 3734764, 11 pages
https://doi.org/10.1155/2017/3734764
Research Article

An Intelligent and Secure Health Monitoring Scheme Using IoT Sensor Based on Cloud Computing

1School of Computer Science, Shenyang Aerospace University, Shenyang City, Liaoning Province, China
2Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung, Taiwan
3School of Information Engineering, Changchun University of Science and Technology, Changchun 130600, China

Correspondence should be addressed to Chin-Ling Chen; wt.ude.tuyc.liam@clc

Received 3 June 2016; Accepted 28 November 2016; Published 3 January 2017

Academic Editor: Hai-Feng Ji

Copyright © 2017 Jin-Xin Hu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. World Health Organization, http://www.who.int/mediacentre/factsheets/fs381/en/.
  2. H. Baldus, K. Klabunde, and G. Müsch, “Reliable set-up of medical body-sensor networks,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 2920, pp. 353–363, 2004. View at Google Scholar · View at Scopus
  3. H. J. La, H. T. Jung, and S. D. Kim, “Extensible disease diagnosis cloud platform with medical sensors and IoT devices,” in Proceedings of the 3rd International Conference on Future Internet of Things and Cloud (FiCloud '15), pp. 371–378, IEEE, Rome, Italy, August 2015. View at Publisher · View at Google Scholar · View at Scopus
  4. Z. Zhang and X. Hu, “ZigBee based wireless sensor networks and their use in medical and health care domain,” in Proceedings of the 7th International Conference on Sensing Technology (ICST '13), pp. 756–761, Wellington, New Zealand, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. https://en.wikipedia.org/wiki/Body_area_network.
  6. F. Banaie and S. A. H. Seno, “A cloud-based architecture for secure and reliable service provisioning in wireless sensor network,” in Proceedings of the International Conference on Computer and Knowledge Engineering (ICCKE '14), pp. 96–101, Mashhad, Iran, October 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. C. Vecchiola, S. Pandey, and R. Buyya, “High-performance cloud computing: a view of scientific applications,” in Proceedings of the 10th International Symposium on Pervasive Systems, Algorithms, and Networks (ISPAN '09), pp. 4–16, IEEE, Kaohsiung, Taiwan, December 2009. View at Publisher · View at Google Scholar
  8. https://support.rackspace.com/white-paper/understanding-the-cloud-computing-stack-saas-paas-iaas.
  9. C.-L. Chen, T.-T. Yang, M.-L. Chiang, and T.-F. Shih, “A privacy authentication scheme based on cloud for medical environment,” Journal of Medical Systems, vol. 38, article no. 143, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. A. Hendre and K. P. Joshi, “A semantic approach to cloud security and compliance,” in Proceedings of the IEEE 8th International Conference on Cloud Computing (CLOUD '15), pp. 1081–1084, New York, NY, USA, June 2015. View at Publisher · View at Google Scholar
  11. C.-L. Chen, T.-T. Yang, and T.-F. Shih, “A secure medical data exchange protocol based on cloud environment,” Journal of Medical Systems, vol. 38, no. 9, article 112, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. P. Tudor, W. Martin, B. Natalia, P. Zeeshan, and B. Leon, “Ambient Health Monitoring: the smartphone as a body sensor network component,” Innovation in Medicine and Healthcare Inmed, vol. 6, no. 1, pp. 62–65, 2013. View at Google Scholar
  13. Z.-Y. Wu, Y.-C. Lee, F. Lai, H.-C. Lee, and Y. Chung, “A secure authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 3, pp. 1529–1535, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. S. Sahaa and S. Kumar Tomar, “Issues in transmitting physical health information in m-healthcare,” International Journal of Current Engineering and Technology, vol. 3, no. 2, pp. 411–413, 2013. View at Google Scholar
  15. Q. Pu, J. Wang, and R.-Y. Zhao, “Strong authentication scheme for telecare medicine information systems,” Journal of Medical Systems, vol. 36, no. 4, pp. 2609–2619, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. S. Ben Othman, A. Trad, and H. Youssef, “Security architecture for at-home medical care using Wireless Sensor Network,” in Proceedings of the 10th International Wireless Communications and Mobile Computing Conference (IWCMC '14), pp. 304–309, IEEE, Nicosia, Cyprus, August 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Kalra and S. K. Sood, “Secure authentication scheme for IoT and cloud servers,” Pervasive and Mobile Computing, vol. 24, pp. 210–223, 2015. View at Publisher · View at Google Scholar
  18. A. Lounis, A. Hadjidj, A. Bouabdallah, and Y. Challal, “Healing on the cloud: secure cloud architecture for medical wireless sensor networks,” Future Generation Computer Systems, vol. 55, pp. 266–277, 2016. View at Publisher · View at Google Scholar · View at Scopus
  19. X.509—Wikipedia, https://en.wikipedia.org/wiki/X.509.
  20. D. Johnson and A. Menezes, “The elliptic curve digital signature algorithm (ECDSA),” Tech. Rep. CORR 99-34, Department of C & O, University of Waterloo, 1999. View at Google Scholar