Security and privacy in cloud-assisted wireless wearable communications: Challenges, solutions, and future directions


Cloud-assisted wireless wearable communications are increasingly pervasive with the profound development of sensor, wireless communication, and cloud computing technologies, additionally to the wide adoption of e-health, location-based mostly service, and mobile good communities. In this article we tend to mainly focus on the goals and tactics of privacy-preserving knowledge aggregation in cloud-assisted wireless wearable communications. With respect to the distinctive security and privacy necessities and the potency consideration for resource-constrained wearable devices, we have a tendency to identify the inappropriateness of secure multiparty computation and totally homomorphic encryption and offer new generalized solutions to tackle the difficult issue of efficient privacy-preserving information aggregation and outsourced computation in wireless wearable communications. Last but not least, a series of interesting open problems are instructed along with potential solutions to solid light-weight on the research during this rising area.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here offering final year Java Based Information Security MTech Projects, Information Security IEEE Projects, IEEE Information Security Projects, Information Security MS Projects, Java Based Information Security BTech
PROJECT TITLE :Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing - 2018ABSTRACT:Virtualized infrastructure in cloud computing has become an enticing target for cyberattackers to
PROJECT TITLE :Transmit-Power Minimization for NOMA-Enabled Traffic Offloading With Security Provisioning - 2018ABSTRACT:Non-orthogonal multiple access (NOMA) has been proposed as an effective technique to deal with the enormous
PROJECT TITLE :Beamforming Optimization for Physical Layer Security in MISO Wireless Networks - 2018ABSTRACT:A wireless network of multiple transmitter-user pairs overheard by an eavesdropper, where the transmitters are equipped
PROJECT TITLE :A Systems Theoretic Approach to the Security Threats in Cyber Physical Systems Applied to Stuxnet - 2018ABSTRACT:Cyber physical systems (CPSs) are increasingly being adopted in a very big selection of industries

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry