Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, Advanced Science and Technology Letters
This Paper briefly sketches out the usage of security system in Mobile Cloud Computing which is including the monitoring, recording, tracking and giving notification to the user. For encryption-decryption will use Elliptic Curve Cryptography (ECC). The functionality of re-encryption "tag" and "mark" for data access system for every legal user. It suggests the cloud computing based on encryption and decryption services with functional reencryption which the encrypted medical data could be accessed and decryption from anywhere by whomever that has the ability to access according to the access policy. This paper proposed the discussion of the idea of medical usage of the cloud computing and the security accessing data by people who has been authorized according to the access policy.
International Journal of Computer Applications, 2015
Mobile cloud Computing has become part of cloud computing that also deals with various issues of cloud services when is accessed by portable devices in wireless environment. The Healthcare data is relatively sensitive compared to other data which need at most supervision. When Cloud services are accessed by the mobile devices additional challenge like security arises. Providing the Security and privacy for the medical data is an interesting topic to deal with. In this paper the survey is done about the various challenges faced in Mobile Cloud Computing and the existing scenarios.
International Journal of Engineering & Technology, 2018
Almost all the human living in Earth forgets to take care of their health. To say specifically, the elder ones and the younger ones need con-tinuous examination to note down the variation in their health issues (either improvement or a decrement). This can be achieved through the digitalization of the data. In the present day scenario information security and privacy in healthcare systems is an issue that is growing at alarming rate. The espousal of digital records of the patient, the enlarged order, provider integration and the growing need to exchange in-formation between patients, providers and payers each targets at the necessity for a developed information system. Inspite of so many measures taken to prevent the theft of patient's healthcare records offenders find some loophole or the other to get the records. This article strives to list certain health issues faced by a majority of people, threats to HIS, the method adopted to store huge amount of data and measures to prev...
International Journal of Computer Applications, 2016
Cloud computing is emerging as a promising prototype for computing and is drawing the attention from both academia and industry. The cloud-computing model is transferring the computing infrastructure to third-party service providers that manage the hardware and software resources with important cost reductions. It is emerging as a new computing example in the medical field apart from other business domains. Wide number of health firms has started shifting electronic health information to the cloud environment. Initiating cloud services in health sector will not only simplify the exchange of electronic medical records between the hospitals and clinics, but also enables the cloud to act as a medical record storage center. Besides, moving to cloud environment eases the healthcare organizations from the monotonous tasks of infrastructure management and also reduces development and maintenance costs. The medical data stored in cloud makes the treatment systematic by retrieving patient's medical history from the database before going for the treatment and get to know about the health issues of the patient.
Human-centric Computing and Information Sciences, 2020
As cloud computing technology matures, along with an increased application of distributed networks, increasingly larger amounts of data are being stored in the cloud, and are thus available for pervasive application. At the same time, current independent medical record systems tend to be inefficient, and most previous studies in this field fail to meet the security requirements of anonymity and unlinkability. Some proposed schemes are even vulnerable to malicious impersonation attacks. The scheme proposed in this study, therefore, combines public and private clouds in order to more efficiently and securely preserve and manage electronic medical records (EMR). In this paper, a new secure EMR authorization system is proposed, which uses elliptic curve encryption and public-key encryption, providing a health care system with both public and private cloud environments with a message authentication mechanism, allowing the secure sharing of medical resources. The analysis shows that the p...
Medical information is usually stored in a centralized database; its recently fast growth makes it even harder for the traditional local database center to handle over time. Investing in an effective data center locally is not a cost efficient; therefore, high-tech platforms are needed to manage these digital records. Today, cloud computing has become a promising paradigm for medical institutions to store and share their medical information since it offers large storage capacity and huge computing capabilities for a limited cost. On the other hand, it still has potential risks and challenges. However, outsourcing medical information to a public cloud storage provider causes the patient's privacy and medical image security to become a critical concern. In this research, we proposed a novel and secure framework used for storing and sharing medical information over a public cloud based environment. Our approach relies on cryptography and steganography to protect medical information not only during transmission but also when it is stored on the cloud server that is managed by an untrusted party. For cryptography, our encryption algorithm MJEA (for Modified Jamal Encryption Algorithm) has been used; it is a symmetric block encryption algorithm with 64-bit block size and 120-bit key size. This algorithm is used to encrypt the medical image. The encrypted form of the medical image has been used as a cover image to hide the patient's information and the encryption key. As a result, the security techniques used in the proposed framework ensure confidentiality, integrity and authenticity for medical information before outsourcing it to be stored on the cloud server.
Mobile health (mHealth)monitoring using Cloud, applies the common mobile communications and cloudcomputing technologies to provide feedback decision support, which has beenconsidered as a new approach to improve the quality of healthcare service whilelowering the healthcare cost. Unfortunately it is also at a position of serious risk on both clients/ mobile user’s privacy and intellectual property of monitoring service providers, which could prevent the wide adoption of mHealth technology. Mobile health monitoring system provides an ease of efficient information flow and security to information from user to the company (our system) and vice versa.
Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems, 2018
Health care institutions gather and store sensitive information from patients with the goal of providing the best care. e medical history of a patient is essential to guarantee that the right diagnosis is achieved and help the clinical sta act in the shortest time possible. is information is highly sensitive and must be kept private for the responsible sta only. At the same time, the medical records should be accessible by any health care institution to ensure that a patient can be a ended anywhere. To guarantee data availability, health care institutions rely on data repositories accessible through the internet. is exposes a threat since patient data can be accessed by unauthorized personnel. It is also extremely di cult to manage access to data using standard access control mechanisms due to the vast amount of users, groups and patients and the constant adjustment in privileges that must be done to maintain con dentiality. is paper proposes a solution to the di culty that is managing user access control to a complex universe of user data and guarantee con dentiality while using cloud computing services to store medical records. CCS CONCEPTS •Security and privacy → So ware security engineering;
Over the years, data theft has been rampant in financial institutions, however at present medical data is in the spotlight. Healthcare industry is considered as a potential target for hackers and cyber criminals for accessing patients' data. Electronic Health Record (EHR) provide flexibility, timely access and interoperability of patient information which is key in decision making by physicians and medical officers. With the advancement of technology, cloud has been spotted as a solution for healthcare practitioners to implement interconnected EHR as it reduces cost and hassle of infrastructure maintenance. Cloud platform allows data to be replicated in different geographical locations and retrieved and shared among various organizations in a timely manner. Healthcare sector is facing a dilemma on how patients' information can be protected while it is being managed by cloud vendors. Several cloud-based EHR apply cryptographic techniques to encrypt data at rest/data in motion and access control to eliminate unauthorized access. As a result, existing access control mechanisms in cloud mainly focuses on giving data access to physicians and other medical officers but overlooks privacy requirements of patients. This research discusses various access control models, their merits, limitations, and roles to promote privacy in cloud based solutions.
Cloud Computing, an Internet-based computing being ubiquitous in nature has spread its capability to various sectors. The cloud service due to its immense computing power, nominal cost of services, high performance, scalability, accessibility as well as availability is highly desirable. Infrastructure as a service (IaaS) is one of the most basic yet widely adopted cloud service model. It provides infrastructure such as physical computing resources, location, data partitioning, scaling, security and backup from large pools of equipment and is widely accepted and used. Health industry, being one of the largest and fastest growing industries is the primary consumer of recent technology and makes maximum use of Cloud service. Health organizations hold records of many patients and all these records are to be stored accurately and efficiently. The most common way of execution is that all these records of patients are sent to a third-party computer organization to be stored in a cloud. This method does not exhibit data confidentiality and even poses a threat to data integrity. Our paper proposes the ability of Health organizations to hide data using steganography, encrypt the hidden health records data of patients using cryptographic algorithms in a secure manner and then store these records in cloud to access them at ease with agreeable performance.
Zenodo (CERN European Organization for Nuclear Research), 2022
Electronic healthcare (E-healthcare) is a combination of hardware, software, process, infrastructure, people, and protocol that is developed for the management of healthcare data including collection, storage, analysis, decision making, and transmission. It supports functional management of a hospital as well as provides an infrastructure that supports policy decisions over healthcare data. E-healthcare has grown decade by decade starting from 1960 to the present era and is divided into four-generation versions namely V.1.0 to V.4.0. E-healthcare in generation V.4.0 is dedicated to smart medical technology with cloud and fog-based computing systems including diseaseoriented sensing systems, IoT, artificial intelligence, high-speed internet, and advanced internet protocols. This paper proposed a security protocol over a cloud-based system using an integrated version of ECC called ECIES that provides security and privacy protections to pervasive healthcare with ensuring integrity and confidentiality. The proposed methodology is simulated using Network Simulator-2 and analyzed using different performance metrics like routing load (Overhead), packet delivery ratio, end-to-end delay, and throughput under the scenarios of cloud-only and secured cloud scenarios. Further, the Proposed work is analyzed against various security attacks like MiTM (Man in the Middle), Security against Selected Cipher Text Attacks, Unforgeability and Nonrepudiation, etc. Obtained findings indicate that the proposed method has a greater security level and reduced response delay with higher throughput. Finally, the paper concludes the proposed work and highlights the recommendation and future works.
Computational Intelligence and Neuroscience
Traditional healthcare services have changed into modern ones in which doctors can diagnose patients from a distance. All stakeholders, including patients, ward boy, life insurance agents, physicians, and others, have easy access to patients’ medical records due to cloud computing. The cloud’s services are very cost-effective and scalable, and provide various mobile access options for a patient’s electronic health records (EHRs). EHR privacy and security are critical concerns despite the many benefits of the cloud. Patient health information is extremely sensitive and important, and sending it over an unencrypted wireless media raises a number of security hazards. This study suggests an innovative and secure access system for cloud-based electronic healthcare services storing patient health records in a third-party cloud service provider. The research considers the remote healthcare requirements for maintaining patient information integrity, confidentiality, and security. There will...
Journal of Computer Science
As technology keeps on evolving, different organisations make use of the recent trends in technology and the health sector is no exception. As the cost of healthcare services is increasing, healthcare professionals are becoming scarce. Healthcare organisations have also adopted the latest technology of cloud computing. The introduction of cloud computing has proved to be a feasible idea on the information technology community. Rather than keeping the patient's information in a file in a health facility he/she was treated in, the information is stored in a cloud so that it can be shared amongst all health organisations and health professionals. Information is stored in a central place where it can be easily accessed, thus saving time and avoiding repetition of always writing the information each time a patient is attended to in a different facility. However, there are issues with sharing such information on the cloud since it is sensitive information. Ensuring this sensitive information security, availability and scalability are a major factor in the cloud computing environment. In this study, we proposed a mathematical model for measuring the availability of data and machines (nodes). We also present the current state-of-the-art research in this field by focusing on several shortcomings of current healthcare solutions and standards and we further proposed a system that will encrypt data before it is being sent to the cloud. The system is intended to be linked to the cloud in such a way that, before the client submits the data to the cloud and, the data will go through that system for encryption. The paper presents the steps to achieve the proposed system and also a sample encrypted and decrypted file.
The multiple number of Hospital records are integrated into the Cloud server. Mongo lab is used as Data storage cloud server.Personal information & Medical Data are separately Encrypted & stored in different servers. Medical data is anonymised, Re-encrypted and stored in the main cloud server. Data is transferred / retrieved from cloud server after verifying the OTP. Big Data is used here.Data Anonymization enables dual i.e double security for the sensitive medical details of the user.By hiding the sensitive informations of every end users.
Cloud computing plays a vital role in our emerging life. It allows all peoples to access easily and to store all kind of information with high end security. Cloud based systems are user-friendly in nature and growing technology in this busy world. It is useful to store all personal health information in cloud based system and to maintain files and helpful to back up all the details when it is needed at any situation. Cloud based computing offers many benefits to all kinds of people effectively. Main benefit of health care cloud system is about digital transformation of personal health care information to various hospitals at the time of emergencies. By the privacy of patient, all the records are maintaining confidentiality by providing security. People should analyze the facility and safety measure about the secure cloud computing in health care management using electronic record system which is in digital format. In this paper, we are discussed about Electronic healthcare record and m-Healthcare application to secure all those information maintained by the patient.
JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES
Nowadays, cloud computing is an interesting research area among the researchers. It is an internet-based pool of heterogeneous resources. Cloud environment is very much reliable to make availability of resources when required to online users. Reliable computing services can be handled without any own infrastructures, so it would be considered as an alternate cost effective technique. Most of the organizations utilized the technique of cloud computing to host their applications. The service of the health care unit is the most essential service for the people. There is a necessity to store the sensitive information related to the patient's medical history in a secure way. Therefore, the research and development in the Personal Health records and Electronic Health records is negligible area. Thus the most robust encryption and decryption should be encountered. One among the advanced technology in cloud computing is the maintenance of Electronic Health Records (EHR). The main objective of this paper is to propose and implement a methodology to exchange the health information about a particular person in a secured cloud environment. The medical information about a patient from distributed manner is also maintained in EHR by cloud environment. The stored information of the user provides the facility of collecting, sharing, exchanging and organizing that information through users. Therefore, an efficient approach for securing e-health cloud system using identity based cryptography techniques is presented in this research study.
IAEME, 2019
Cloud computing offers many services among one is Storage as a service. Using this service user can outsource his data and whenever required he can download or he can share with others. Using cloud computing PHR owner can share his documents, but due to security challenges in cloud computing the health records of owner must be encrypted before outsourcing. In order to provide security for owner health records ABE (attribute based encryption) is best suitable for other encryption techniques. Using ABE the PHR owner can define access control over his encrypted cloud data. But using ABE dynamic polices over encrypted cloud data is big challenge. In this paper for achieving grant and revoke privileges over encrypted data Timestamp server is introduced.
IRJET, 2022
There is significant amount of medical data which is generated on the daily basis. The generated data is very much important for making the decision and delivering the best care to the patient. But somehow medical industry lags the technology due to the lack of IT infrastructure provided to the healthcare industry. In my term paper, I will study that what exactly is cloud computing and how this technology can be implemented in the healthcare industry. Cloud Computing is a cost-effective method that provides real time data collection, storage of data and exchange data between the medical organization. There are three types of cloud computing which includes private, public and hybrid cloud. Private cloud must be adopted by the healthcare industry as to provide the high data security to the patients. The privacy and security are two main major concerns for using the cloud-based healthcare services. Healthcare industry should have Electronic Medical Records in order the use the cloud-based services. Cloud computing has benefited the healthcare industry but there are many challenges that they faced. In this paper I will study that how some of the challenges can be overcome. I will also conduct survey as to analyse the current situation of medical industry and study that cloud computing can benefit the medical industry or not
Journal of medical systems, 2014
In recent years, health care technologies already became matured such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concern issue. In spite of many literatures discussed about medical systems, but these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a secure medical data exchange protocol based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples use medical resources on the cloud environment to seek medical advice conveniently.
Personal Health Records (PHRs) is based on cloud virtual machine in web oriented application in which the lifelong health data of patients, who should be able to show them conveniently and securely to selected disables in an institution. The MyPHRMachines, a cloud-based PHR system taking a radically new architectural solution to health record portability. In MyPHR Machines, health-related data and the application software to view and analyze it are separately deployed in the PHR system. After uploading their medical data to MyPHRMachines, patients can access them again from remote virtual machines that contain the right software to visualize and analyze them without any need for conversion. Patients can share their remote virtual machine session with selected caregivers, my aim at providing patients (and their trusted caregivers) remote desktop or tablet computer access to all their PHR data, and support this access by the software that matches the data format. Since do not tackle semantic data integration in the paper, one can more specifically label this as health record mobility and portability. The person will need only a Web browser to access the pre-loaded fragments of their lifelong PHR.
2019
Mobile Cloud Computing (MCC) allows mobile users to have on-demand access to cloud services. A mobile cloud model helps in analyzing the information regarding the patients’ records and also in extracting recommendations in healthcare applications. In mobile cloud computing, a fine-grained level access control of multi-server cloud data is a pre-requisite for successful execution of end users applications. We proposed a Cloud-assisted Health monitoring system (CAM). We first identify the design problems on privacy preservation and then provide our solutions. To ease the understanding, we start with the basic scheme so that we can identify the possible privacy breaches. We then provide an improved scheme by addressing the identified privacy problems. The resulting improved scheme allows the Health service provider (the company) to be offline after the setup stage and enables it to deliver its data or programs to the cloud securely. To reduce clients decryption complexity, we incorpora...
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.