Research Article
A WSN based Environment and Parameter Monitoring System for Human Health Comfort: A Cloud Enabled Approach
@ARTICLE{10.4108/sis.1.3.e2, author={Manohara Pai and Pooja B and Radhika M. Pai}, title={A WSN based Environment and Parameter Monitoring System for Human Health Comfort: A Cloud Enabled Approach}, journal={EAI Endorsed Transactions on Scalable Information Systems}, volume={1}, number={3}, publisher={ICST}, journal_a={SIS}, year={2014}, month={5}, keywords={Cloud Computing, Confidentiality, Environmental Monitoring, Integration of Clouds, Integrity, Sensor Cloud Architecture, Wireless Body Ares Networks (WBANs), Wireless Sensor Networks (WSNs).}, doi={10.4108/sis.1.3.e2} }
- Manohara Pai
Pooja B
Radhika M. Pai
Year: 2014
A WSN based Environment and Parameter Monitoring System for Human Health Comfort: A Cloud Enabled Approach
SIS
ICST
DOI: 10.4108/sis.1.3.e2
Abstract
The number and type of sensors measuring physical and physiological parameters have seen dramatic increase due to progress in the MEMS and Nano Technology. The Wireless Sensor Networks (WSNs) in turn is bringing new applications in environment monitoring and healthcare in order to improve the quality of service especially in hospitals. The adequacy of WSNs to gather critical information has provided solution but with limited storage, computation and scalability. This limitation is addressed by integrating WSN with cloud services. But, once the data enters the cloud the owner has no control over it. Hence confidentiality and integrity of the data being stored in the cloud are compromised. In this proposed work, secure sensor-cloud architecture for the applications in healthcare is implemented by integrating two different clouds. The sink node of WSN outsources data into the cloud after performing operations to secure the data. Since the SaaS and IaaS environments of Cloud Computing are provided by two different cloud service providers (CSPs), both the CSPs will not have complete information of the architecture. This provides inherent security as data storage and data processing are done on different clouds.
Copyright © 2014 Manohara Pai et al., licensed to ICST. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.