A Proposed Secured Health Monitoring System for the Elderly using Block chain Technology in Nigeria

https://doi.org/10.55529/jecnam.24.31.53

Authors

  • Maimunatu Ya’u Ibrahim Department of Management and Information Technology, Abubakar Tafawa Balewa University Bauchi, Nigeria
  • Kabiru Ibrahim Musa Department of Management and Information Technology, Abubakar Tafawa Balewa University Bauchi, Nigeria
  • Yakubu Abdullahi Yarima Department of Management and Information Technology, Abubakar Tafawa Balewa University Bauchi, Nigeria
  • Aminu Ahmad Department of Management and Information Technology, Abubakar Tafawa Balewa University Bauchi, Nigeria

Keywords:

Internet of things (IoT); Blockchain; Cloud Computing, Health Monitoring, Behavioural Reasoning Theory (BRT)

Abstract

A large number of connected smart objects and sensors, as well as the establishment of seamless data exchange between them, have been made possible by the Internet of Things (IoT) technology's recent rapid development. As a result, there is a high demand for platforms for data analysis and data storage, such as cloud computing and fog computing. IoT makes it possible to customize apps for older persons as well as for rapidly expanding markets that must modify their products to match the preferences of their customers. This study suggests a framework for a decision-support system and a protected health monitoring system using IoT data collected from senior residents' homes. The study intends to provide security to the users’ data from the point of acquiring of the data to the relaying of the data to cloud and to the alert generation using blockchain technology. Further research should focus on key management and security, as well as the capability to easily replace lost or compromised keys.

Published

2022-06-25

How to Cite

Maimunatu Ya’u Ibrahim, Kabiru Ibrahim Musa, Yakubu Abdullahi Yarima, & Aminu Ahmad. (2022). A Proposed Secured Health Monitoring System for the Elderly using Block chain Technology in Nigeria. Journal of Electronics, Computer Networking and Applied Mathematics , 2(04), 31–53. https://doi.org/10.55529/jecnam.24.31.53

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.