in this sense, it is commonly used in systems such as the one shown in Figure 2—that is, hybrid schemes that apply symmetric encryption only in the user’s environment (communication between sensors and the mobile device) and asymmetric principles in the remainder (mobile and cloud, including healthcare providers and family).