scholarly journals Design and Implementation of Secure and Efficient Cloud Centric Smart Health Care System

Author(s):  
Manikandan B ◽  
Aanisha A ◽  
Dinesh Kumar K ◽  
Sowdhamma S ◽  
VeeraKabilan R

In modern healthcare environment provide more user-friendly services at less time and in cost -effective manner. However, it causes data security issues on Electronic Health Record (EHR) transactions. The most challenging issue while handling the medical data is unauthorized accessing by unknown person. In this paper, a secure medical data access is carried out using Identity based proxy re-encryption system. Initially, patient has to register and upload the data in the cloud using the identity based proxy re-encryption system. Then the doctor will access the document using their respective identity and request for it, to get the secret key. This provides data confidentiality, integrity, and reduce the computation cost, while handling the documents in cloud.

Author(s):  
Thomas E. Grissom ◽  
Andrew DuKatz ◽  
Hubert A. Kordylewski ◽  
Richard P. Dutton

Recent healthcare legislation, financial pressures, and regulatory oversight have increased the need to create improved mechanisms for performance measurement, quality management tracking, and outcomes-based research. The Anesthesia Quality Institute (AQI) has established the National Anesthesia Clinical Outcomes Registry (NACOR) to support these requirements for a wide-range of customers including individual anesthesiologists, anesthesia practices, hospitals, and credentialing agencies. Concurrently, the availability of increased digital sources of healthcare data make it possible to capture massive quantities of data in a more efficient and cost-effective manner than ever before. With NACOR, AQI has established a user-friendly, automated process to effectively and efficiently collect a wide-range of anesthesia-related data directly from anesthesia practices. This review will examine the issues guiding the evolution of NACOR as well as some potential pitfalls in its growth and usage.


Author(s):  
Anukul Pandey ◽  
Butta Singh ◽  
Barjinder Singh Saini ◽  
Neetu Sood

The primary objective of this chapter is to analyze the existing tools and techniques for medical data security. Typically, medical data includes either medical signals such as electrocardiogram, electroencephalogram, electromyography, or medical imaging like digital imaging and communications in medicine, joint photographic experts group format. The medical data are sensitive, subject to privacy preservation, and data access rights. Security in e-health field is an integrated concept which includes robust combination of confidentiality, integrity, and availability of medical data. Confidentiality ensures the data is inaccessible to unauthorized access. Integrity restricts the alteration in data by the unauthorized user. Whereas availability provides the readiness of the data when needed by the authorized user. Additionally, confidentiality, integrity and availability, accountability parameter records the back action list which answers the why, when, what, and whom data is accessed. The selected tools and techniques used in medical data security in e-health applications is discussed.


2019 ◽  
Vol 30 (04) ◽  
pp. 665-681
Author(s):  
Yinghui Zhang ◽  
Menglei Yang ◽  
Dong Zheng ◽  
Tiantian Zhang ◽  
Rui Guo ◽  
...  

As a promising public key cryptographic primitive, hierarchical identity-based encryption (HIBE) introduces key delegation mechanisms into identity-based encryption. However, key leakage and recipient anonymity issues have not been adequately addressed in HIBE. Hence, direct applications of traditional HIBE schemes will violate data security and abuse users’ privacy in practice. In this paper, we propose an anonymous unbounded hierarchical identity-based encryption scheme, which achieves bounded leakage resilience and the hierarchy depth is not limited. Our security proofs based on the dual system encryption technique show that the proposed scheme is capable of resisting key leakage and it realizes recipient anonymity in the standard model. In addition, leakage resilience analysis indicates that our scheme allows the leakage rate of approximate 1/3 no matter the hierarchy depth of identities. Finally, performance comparisons show the practicability of our scheme. In particular, the secret key of our construction is of a fixed-length.


Author(s):  
Anukul Pandey ◽  
Butta Singh ◽  
Barjinder Singh Saini ◽  
Neetu Sood

The primary objective of this chapter is to analyze the existing tools and techniques for medical data security. Typically, medical data includes either medical signals such as electrocardiogram, electroencephalogram, electromyography, or medical imaging like digital imaging and communications in medicine, joint photographic experts group format. The medical data are sensitive, subject to privacy preservation, and data access rights. Security in e-health field is an integrated concept which includes robust combination of confidentiality, integrity, and availability of medical data. Confidentiality ensures the data is inaccessible to unauthorized access. Integrity restricts the alteration in data by the unauthorized user. Whereas availability provides the readiness of the data when needed by the authorized user. Additionally, confidentiality, integrity and availability, accountability parameter records the back action list which answers the why, when, what, and whom data is accessed. The selected tools and techniques used in medical data security in e-health applications is discussed.


Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Cloud computing is a BUZZ word of modern computing scenario. Cloud computing services are flexible and cost effective with resource utilization. Cloud computing have three service models SaaS (Software as a Service) PaaS (Plateform as a Service) and Iaas (Infrastructure as a Service). SaaS provide on demand application services such as email, ERP and CRM etc. Multi user can access applications and they can interact to each other at same time. All users data can be reside at same place. This flexibility of SaaS service also gives the security breaches. Loop holes of SaaS harder to find and maintain. The authors discuss here security vulnerabilities of SaaS with possible solutions. This study would be helpful to elaborate to understand data security issues and privacy solutions over SaaS.


2014 ◽  
Vol 4 (1) ◽  
Author(s):  
Michael P. Gamba ◽  
Magdalena M. Ocbian ◽  
Maryjean N. Gamba

The presence of vast communication and information nowadays necessitates the need for a system to readily access and transfer data. The study aimed to develop records archiving and document repository to overcome the barrier of server client method of deploying the documents from one place to another and easier data access to its stakeholders. The Sorsogon State College in the Philippines has four campuses which are located strategically in four municipalities of Sorsogon province. Their distance from each other sometimes causes a problem particularly along communication and real time updates. General User Interface (GUI) of the application has been built on top of all web-enabled computers and even to the mobile devices, so it requires only installed web browsers to render the GUI onto their devices regardless of its platform and specifications. The installation of web-based archiving and repository on its main campus enables satellite campuses to connect to the college private server in a cost-effective manner through virtual private network that connects on top of the Internet service provider. This study overcomes the vulnerability of security by means of allowing user credentials to login at the private server using a 1024 bit Rivest-Shamir-Adleman (RSA) private/public key exchange and 256-bit Advance Encryption System (AES) encryption through its virtual private network. Contents of the uploaded files were being encrypted at 128-bit to prevent intranet users from sneaking the file contents. Keywords - ICT, document archive, web, GUI, developmental research, Sorsogon City, Philippines,


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Tianyu Chi ◽  
Baodong Qin ◽  
Dong Zheng

In recent years, it has become popular to upload patients’ medical data to a third-party cloud server (TCS) for storage through medical Internet of things. It can reduce the local maintenance burden of the medical data and importantly improve accuracy in the medical treatment. As remote TCS cannot be fully trusted, medical data should be encrypted before uploading, to protect patients’ privacy. However, encryption makes search capabilities difficult for patients and doctors. To address this issue, Huang et al. recently put forward the notion of Public-key Authenticated Encryption with Keyword Search (PAEKS) against inside keyword guessing attacks. However, the existing PAEKS schemes rely on time-consuming computation of parings. Moreover, some PAEKS schemes still have security issues in a multiuser setting. In this paper, we propose a new and efficient PAEKS scheme, which uses the idea of Diffie-Hellman key agreement to generate a shared secret key between each sender and receiver. The shared key will be used to encrypt keywords by the sender and to generate search trapdoors by the receiver. We prove that our scheme is semantically secure against inside keyword guessing attacks in a multiuser setting, under the oracle Diffie-Hellman assumption. Experimental results demonstrate that our PAEKS scheme is more efficient than that of previous ones, especially in terms of keyword searching time.


2021 ◽  
Vol 11 (19) ◽  
pp. 9005
Author(s):  
Yara Alghofaili ◽  
Albatul Albattah ◽  
Noura Alrajeh ◽  
Murad A. Rassam ◽  
Bander Ali Saleh Al-rimy

Cloud computing is currently becoming a well-known buzzword in which business titans, such as Microsoft, Amazon, and Google, among others, are at the forefront in developing and providing sophisticated cloud computing systems to their users in a cost-effective manner. Security is the biggest concern for cloud computing and is a major obstacle to users adopting cloud computing systems. Maintaining the security of cloud computing is important, especially for the infrastructure. Several research works have been conducted in the cloud infrastructure security area; however, some gaps have not been completely addressed, while new challenges continue to arise. This paper presents a comprehensive survey of the security issues at different cloud infrastructure levels (e.g., application, network, host, and data). It investigates the most prominent issues that may affect the cloud computing business model with regard to infrastructure. It further discusses the current solutions proposed in the literature to mitigate the different security issues at each level. To assist in solving the issues, the challenges that are still unsolved are summarized. Based on the exploration of the current challenges, some cloud features such as flexibility, elasticity and the multi-tenancy are found to pose new challenges at each infrastructure level. More specifically, the multi-tenancy is found to have the most impact at all infrastructure levels, as it can lead to several security problems such as unavailability, abuse, data loss and privacy breach. This survey concludes by giving some recommendations for future research.


2017 ◽  
Vol 86 (2) ◽  
pp. 37-39
Author(s):  
Stephanie Fong

Quality improvement (QI) practices were originally developed in the manufacturing industry to reduce unnecessary steps in a process, minimize error, and provide maximum benefit to the consumer. QI is defined as a formal approach to the analysis of performance and systemic efforts to improve it. QI methodologies have been adopted by industries outside manufacturing, including healthcare. In the healthcare environment, performance consists of many factors including patient safety, clinical results, and system efficiency. Given the publicly funded, limited resource environment in which the Canadian healthcare system operates, the practice of delivering safe, quality healthcare in an efficient and cost-effective manner is an important factor in promoting the economic viability and sustainability of the system. Surgical practice has been identified as an area in which QI methodologies can be applied, given its resource intensive nature and highly regulated environment. Current research supports the use of QI in surgery, with interventions showing improvements in non-operativetime, on-time starts, and operating room patient volume. Limitations to the application of QI include the heterogeneity of interventions and variability in terms of procedures and patient factors. Further high-quality studies are required to support evidence-based applications of QI in the surgical setting as well as the greater healthcare environment.


2021 ◽  
pp. 1-22
Author(s):  
Md Whaiduzzaman ◽  
Nishat Farjana ◽  
Alistair Barros ◽  
Md. Julkar Nayeen Mahi ◽  
Md. Shahriare Satu ◽  
...  

Fog computing complemented cloud computing integration services in the Internet of Things (IoT) and the web of real-time interactivity. Fog offers faster computing and other services facilities sitting close to user applications. However, secure data transfer in the fog is still a challenging issue requiring attention and efficient deployment of a secure data security scheme. We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems. We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing (HIBAF) data security scheme to enhance data security. We also analyze the system’s performance regarding response time, CPU utilization, run-time encryption-decryption, and key generation time in the fog computing paradigm to an increasing number of users data-loads. Moreover, we evaluate our scheme and compare the outcomes with different cryptography structures to discern our scheme’s effectiveness. Furthermore, we also evaluate secret key updating time, re-encrypted key updating time, and file revoking time by launching DDoS attacks both in the cloud and fog computing environment to compare improvements of HIBAF in the fog computing paradigm. Finally, through this overall evaluation, we have found that the developed HIBAF scheme provides a 33% performance enhancement in a fog environment in terms of data processing, provision, and management compared to the cloud environment.


Sign in / Sign up

Export Citation Format

Share Document