SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 292
Personal Health Record over
Encrypted Data Using Cloud Service
Dinesh Soni1, Dr. Lakshmi JVN2
1Master of Computer Application, 2Associate Professor,
1,2Jain University, Bengaluru, Karnataka, India
ABSTRACT
CBPHR- Cloud Based Personal Health Recordsystemsare usedforstorageand
management of patient records. Cloud computing provides real time health
care data in a convenient and cost effective manner. Due to the lack of
visibility in cloud platform, the users are always concerned with data privacy
and security. This is the main obstacle in widely adopting CBPHR systems in
health care sector. The paper is discussing a cloud based patienthealthrecord
management scheme which is highly secured. In this approach, indexes are
encrypted under differentsymmetrickeysandalsotheencrypteddata indexes
from various data providers can be mergebycloudwithoutknowingtheindex
content. It also provides efficient and privacy preserving query processing
using a single data query submitted by the data user. Encrypted data will be
processed by cloud from all related data providers without knowing its query
content.
KEYWORDS: CBPHR, Access Controls, Encryption, Trapdoor Key, File Key
How to cite this paper: Dinesh Soni | Dr.
Lakshmi JVN "Personal Health Record
over Encrypted Data Using Cloud Service"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-5 |
Issue-4, June 2021,
pp.292-294, URL:
www.ijtsrd.com/papers/ijtsrd41230.pdf
Copyright © 2021 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
I. INTRODUCTION
There has been a massive adoptionofcloudcomputingin the
generation, storage, manipulation and sharing of data. The
same happens in healthcare sector. Cloud computing has
benefits for both healthcare professionals and patients.
Usage of cloud solutions can cut down operational expenses
and is also very convenient for the users because of the
accessibility. [6] Cloud Based Personal Health Record
systems should be designed in such a way where the health
records should be stored and processed in a highly secured
manner. Patient care should be given utter importance and
should be improved with time. Cloud computing provides
personalized care for the patients as they are provided with
personal spaces to view and understand their healthreports
any time and from anywhere. Security and privacy of
healthcaredocuments whicharealwaysconsideredsensitive
is the problem in adopting cloud computing for the storage
and processing of such data. [1]
Healthcare data management system involves consultation
and prescription files, diagnosis reports and other digital
media like x-ray and scanning reports. All these data can be
uploaded and accessed by the users of the cloud platform.
This multi user environment can be vulnerable with an
increase in usage and popularity. In this paper, a Cloud
Based Personal Health Record (CBPHR) system is proposed
that uses encryption technique to protect the privacy of the
uploaded data. In this approach, authentication and
authorization of cloud users are given great importance. In
section II, existing system andinsectionIII,proposedsystem
is discussed. In section IV, the architecture diagram is
presented. In section V, the paper is concluded with future
recommendations.
II. Existing System
A Cloud Based Patient Health Record (CBPHR) system
should always be designed in such a way so that it can
perform the expected operations in a relevant and feasible
manner to all the users.[4] The users of healthcare system
comprises of hospital staff members like doctors,nurses,lab
technicians, microbiologists and even the receptionists. All
these people can be categorized as data owners who are the
sources of clinical data. Other than healthcare professionals,
patients are the most important part of a healthcare
management system as they are the primary data users.
While the security and privacy of the data users are of great
importance, still most of the healthcare management
systems are not sufficiently secured. [5]
Some of the Personal Health Record (PHR) systems are
deployed on cloud while others makes use of traditional
approach. [2] Encryption is a technique through which we
can hide the true sense of our information is somewhat
common in CBPHR systems. But still manyofthoseusers can
download the files without proper authentication. Storing a
data securely is not sufficient for a secure system but also
the access to the data should be restricted. This may cause a
disagreement among the users because the process is tiring
and time consuming. Most CBPHR systems are openly
accessible to people and anybody can create a user
IJTSRD41230
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 293
account.[7] This is a disadvantage because anybody with a
little knowledge about a patient can easily create a fake
account and access that person’s personal data.
Creating an ideal CBPHR system requires processes like
access control and encryption. Here, the access control
strategy should not be limited to data uploading or
downloading but also in the creation of user accounts. [3]
III. Proposed System
The proposed system is a Cloud Based Personal Health
Record (CBPHR) system that integrates the concepts of
access control and encryption. In this approach, the entire
patient documents are uploaded in encrypted format. A
trapdoor key is used by the data provider to upload the
documents. The same way the data users can access the
reports and other documents through the platform using a
file key. Here, trapdoor key acts as the encryption key and
file key acts as the decryption key. The proposed method
gives great importance to access control. The data providers
and data users require permission from cloud server to
access the cloud platform.
The system involves 4 modules namely, Data Owner, Data
User, Authority, Attributor and Cloud Server. Data Owner
can be a doctor or hospital staff who creates data. Once a
doctor registers an account,thecloudserverhastoauthorize
the particular person to login. The data owner can upload
patient files to the system using a trapdoor key provided by
the admin or authority module. A data owner can view and
edit their patient details accordingly.Thesame way,thedata
user can search for their own reports and canalsodownload
it using a file key provided by the attributor module. The
data user account creation happensthesame wayasthedata
owner. They should also be authenticated by the cloud
server before accessing the data. If the data user enters the
wrong file key, the application suspects this user to be an
attacker. The main goal of the approach is to secure the
system against chosen-keyword attack. Based on the search
file, they can be able to request the key from the attributor.
Once they received the key from the attributor, thedata user
can download the file. Cloud server is theauthorizedmodule
to grant permission, monitor all the patient details, Clinical
report details, attacker details and result analysis of a
particular system. The system is really much secured
because it is completely encrypted and the privileges are
being taken care of. [8]
IV. System Architecture
The below figure [fig 1] is showing the system architecture.
It is a pictorial representation of the entire cloud based
patient health record system. In this, all the modules and
their interdependencies are demonstrated. The encryption,
decryption and authorizationprocessesarealsodisplayedin
detail.
Fig 1: System Architecture
V. Conclusion and Future Enhancements
The paper proposes an efficient and privacy preserving
technique where data and data indexes are encrypted using
different symmetric keys and also the encrypted data from
multiple providers can merge in the cloud without knowing
its content. This is a cloud based patient health record
system with secured data storageandmanipulationfeatures.
This is a system that is helpful to the patients because of its
usability and simplicity. The proposed approach is also
giving importance to the authorization and authentication
processes.
As a future enhancement, we can transformclinical data into
knowledge for better patient care. Supervised Learning
concept in Machine learning and Artificial Intelligence
technology can be used for analyzingandtrainingthesystem
based on existing records like clinical data, genetical data
and medical history. This is helpful for predicting any
possible disease. This kind of systems can also monitor the
patient in real time. Here, wireless patient monitoring
devices like heart rate monitor, pulse oximeter,
sphygmomanometeretc.canbeconnectedtothedatabaseor
server to store and monitor the patient’s body changes. This
can benefit both the technology and healthcare industry to
save the human life.
VI. References
[1] M. P. Radhini, P Ananthaprabha, P. Parthasarathi,
Secure Sharing of Medical Records Using
Cryptographic Methods in Cloud, International
Journal of Computer Science and Mobile Computing,
Vol. 3, Issue. 4, April 2014, pg. 514 – 521
[2] Ismail Keshta, Ammar Odeh, , Security and privacy of
electronic health records: Concerns and challenges,
Egyptian Informatics Journal, 2020, ISSN 1110-8665
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 294
[3] Fernández-Alemán JL, Señor IC, Lozoya PÁ, Toval A.
Security and privacy in electronic health records: a
systematic literature review. J Biomed Inform. 2013
Jun; 46(3): 541-62. doi: 10. 1016/j. jbi. 2012. 12. 003.
Epub 2013 Jan 8. PMID: 23305810.
[4] Pradeep Deshmukh, , Design of cloud security in the
EHR for Indian healthcare services,
Journal of King Saud University - Computer and
Information Sciences, Volume 29, Issue 3,
2017, Pages 281-287, ISSN 1319-1578
[5] Samuel, Victoria & Adewumi, Adewole & Dada,
Benjamin &Omoregbe, Nicholas & Misra, Sanjay
&Odusami, Modupe. (2019).DesignandDevelopment
of a Cloud-Based Electronic Medical Records (EMR)
System. 10. 1007/978-981-13-6351-1_3.
[6] Adebayo, Abayomi-Alli &Ikuomola, Aderonke &
Robert, Ifeoluwa & Abayomi-Alli, Olusola. (2014). An
Enterprise Cloud-Based Electronic Health Records
System. 2. 21-36.
[7] Pradeep Deshmukh, Design of cloud security in the
EHR for Indian healthcare services, Journal of King
Saud University-Computer andInformationSciences,
Volume 29, Issue 3, 2017, Pages 281-287, ISSN 1319-
1578.
[8] Jesús Romero, Pablo López, José Luis Vázquez
Noguera, Cristian Cappo, Diego P. Pinto-Roa and
Cynthia Villalba , INTEGRATED, RELIABLE AND
CLOUD-BASED PERSONAL HEALTH RECORD: A
SCOPING REVIEW, Health Informatics - An
International Journal (HIIJ) Vol. 5, No. 2/3, August
2016.

More Related Content

What's hot

IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET Journal
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...eSAT Journals
 
Survey of open source health information systems
Survey of open source health information systemsSurvey of open source health information systems
Survey of open source health information systemshiij
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET Journal
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...IJCSIS Research Publications
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis IJECEIAES
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IJECEIAES
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Editor IJCATR
 

What's hot (18)

IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
Survey of open source health information systems
Survey of open source health information systemsSurvey of open source health information systems
Survey of open source health information systems
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Ibrahem
IbrahemIbrahem
Ibrahem
 
An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 

Similar to Personal Health Record over Encrypted Data Using Cloud Service

Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systemsijtsrd
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET Journal
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitalsijtsrd
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...IEEEFINALSEMSTUDENTPROJECTS
 
A Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationA Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationIJAEMSJORNAL
 
Blockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare recordsBlockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare recordsIRJET Journal
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...NAUMAN MUSHTAQ
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataIRJET Journal
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...IJERA Editor
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTijcisjournal
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTijcisjournal
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...IRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET Journal
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfVishalSoni95234
 

Similar to Personal Health Record over Encrypted Data Using Cloud Service (20)

Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
 
A Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationA Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronization
 
Blockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare recordsBlockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare records
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
 

More from YogeshIJTSRD

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An OverviewYogeshIJTSRD
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraYogeshIJTSRD
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisYogeshIJTSRD
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...YogeshIJTSRD
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesYogeshIJTSRD
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderYogeshIJTSRD
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...YogeshIJTSRD
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...YogeshIJTSRD
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriYogeshIJTSRD
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineYogeshIJTSRD
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreYogeshIJTSRD
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceYogeshIJTSRD
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeYogeshIJTSRD
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...YogeshIJTSRD
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...YogeshIJTSRD
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewYogeshIJTSRD
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to BiometricsYogeshIJTSRD
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...YogeshIJTSRD
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentYogeshIJTSRD
 

More from YogeshIJTSRD (20)

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 

Recently uploaded (20)

Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 

Personal Health Record over Encrypted Data Using Cloud Service

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 292 Personal Health Record over Encrypted Data Using Cloud Service Dinesh Soni1, Dr. Lakshmi JVN2 1Master of Computer Application, 2Associate Professor, 1,2Jain University, Bengaluru, Karnataka, India ABSTRACT CBPHR- Cloud Based Personal Health Recordsystemsare usedforstorageand management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patienthealthrecord management scheme which is highly secured. In this approach, indexes are encrypted under differentsymmetrickeysandalsotheencrypteddata indexes from various data providers can be mergebycloudwithoutknowingtheindex content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. KEYWORDS: CBPHR, Access Controls, Encryption, Trapdoor Key, File Key How to cite this paper: Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-5 | Issue-4, June 2021, pp.292-294, URL: www.ijtsrd.com/papers/ijtsrd41230.pdf Copyright © 2021 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) I. INTRODUCTION There has been a massive adoptionofcloudcomputingin the generation, storage, manipulation and sharing of data. The same happens in healthcare sector. Cloud computing has benefits for both healthcare professionals and patients. Usage of cloud solutions can cut down operational expenses and is also very convenient for the users because of the accessibility. [6] Cloud Based Personal Health Record systems should be designed in such a way where the health records should be stored and processed in a highly secured manner. Patient care should be given utter importance and should be improved with time. Cloud computing provides personalized care for the patients as they are provided with personal spaces to view and understand their healthreports any time and from anywhere. Security and privacy of healthcaredocuments whicharealwaysconsideredsensitive is the problem in adopting cloud computing for the storage and processing of such data. [1] Healthcare data management system involves consultation and prescription files, diagnosis reports and other digital media like x-ray and scanning reports. All these data can be uploaded and accessed by the users of the cloud platform. This multi user environment can be vulnerable with an increase in usage and popularity. In this paper, a Cloud Based Personal Health Record (CBPHR) system is proposed that uses encryption technique to protect the privacy of the uploaded data. In this approach, authentication and authorization of cloud users are given great importance. In section II, existing system andinsectionIII,proposedsystem is discussed. In section IV, the architecture diagram is presented. In section V, the paper is concluded with future recommendations. II. Existing System A Cloud Based Patient Health Record (CBPHR) system should always be designed in such a way so that it can perform the expected operations in a relevant and feasible manner to all the users.[4] The users of healthcare system comprises of hospital staff members like doctors,nurses,lab technicians, microbiologists and even the receptionists. All these people can be categorized as data owners who are the sources of clinical data. Other than healthcare professionals, patients are the most important part of a healthcare management system as they are the primary data users. While the security and privacy of the data users are of great importance, still most of the healthcare management systems are not sufficiently secured. [5] Some of the Personal Health Record (PHR) systems are deployed on cloud while others makes use of traditional approach. [2] Encryption is a technique through which we can hide the true sense of our information is somewhat common in CBPHR systems. But still manyofthoseusers can download the files without proper authentication. Storing a data securely is not sufficient for a secure system but also the access to the data should be restricted. This may cause a disagreement among the users because the process is tiring and time consuming. Most CBPHR systems are openly accessible to people and anybody can create a user IJTSRD41230
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 293 account.[7] This is a disadvantage because anybody with a little knowledge about a patient can easily create a fake account and access that person’s personal data. Creating an ideal CBPHR system requires processes like access control and encryption. Here, the access control strategy should not be limited to data uploading or downloading but also in the creation of user accounts. [3] III. Proposed System The proposed system is a Cloud Based Personal Health Record (CBPHR) system that integrates the concepts of access control and encryption. In this approach, the entire patient documents are uploaded in encrypted format. A trapdoor key is used by the data provider to upload the documents. The same way the data users can access the reports and other documents through the platform using a file key. Here, trapdoor key acts as the encryption key and file key acts as the decryption key. The proposed method gives great importance to access control. The data providers and data users require permission from cloud server to access the cloud platform. The system involves 4 modules namely, Data Owner, Data User, Authority, Attributor and Cloud Server. Data Owner can be a doctor or hospital staff who creates data. Once a doctor registers an account,thecloudserverhastoauthorize the particular person to login. The data owner can upload patient files to the system using a trapdoor key provided by the admin or authority module. A data owner can view and edit their patient details accordingly.Thesame way,thedata user can search for their own reports and canalsodownload it using a file key provided by the attributor module. The data user account creation happensthesame wayasthedata owner. They should also be authenticated by the cloud server before accessing the data. If the data user enters the wrong file key, the application suspects this user to be an attacker. The main goal of the approach is to secure the system against chosen-keyword attack. Based on the search file, they can be able to request the key from the attributor. Once they received the key from the attributor, thedata user can download the file. Cloud server is theauthorizedmodule to grant permission, monitor all the patient details, Clinical report details, attacker details and result analysis of a particular system. The system is really much secured because it is completely encrypted and the privileges are being taken care of. [8] IV. System Architecture The below figure [fig 1] is showing the system architecture. It is a pictorial representation of the entire cloud based patient health record system. In this, all the modules and their interdependencies are demonstrated. The encryption, decryption and authorizationprocessesarealsodisplayedin detail. Fig 1: System Architecture V. Conclusion and Future Enhancements The paper proposes an efficient and privacy preserving technique where data and data indexes are encrypted using different symmetric keys and also the encrypted data from multiple providers can merge in the cloud without knowing its content. This is a cloud based patient health record system with secured data storageandmanipulationfeatures. This is a system that is helpful to the patients because of its usability and simplicity. The proposed approach is also giving importance to the authorization and authentication processes. As a future enhancement, we can transformclinical data into knowledge for better patient care. Supervised Learning concept in Machine learning and Artificial Intelligence technology can be used for analyzingandtrainingthesystem based on existing records like clinical data, genetical data and medical history. This is helpful for predicting any possible disease. This kind of systems can also monitor the patient in real time. Here, wireless patient monitoring devices like heart rate monitor, pulse oximeter, sphygmomanometeretc.canbeconnectedtothedatabaseor server to store and monitor the patient’s body changes. This can benefit both the technology and healthcare industry to save the human life. VI. References [1] M. P. Radhini, P Ananthaprabha, P. Parthasarathi, Secure Sharing of Medical Records Using Cryptographic Methods in Cloud, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 4, April 2014, pg. 514 – 521 [2] Ismail Keshta, Ammar Odeh, , Security and privacy of electronic health records: Concerns and challenges, Egyptian Informatics Journal, 2020, ISSN 1110-8665
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 294 [3] Fernández-Alemán JL, Señor IC, Lozoya PÁ, Toval A. Security and privacy in electronic health records: a systematic literature review. J Biomed Inform. 2013 Jun; 46(3): 541-62. doi: 10. 1016/j. jbi. 2012. 12. 003. Epub 2013 Jan 8. PMID: 23305810. [4] Pradeep Deshmukh, , Design of cloud security in the EHR for Indian healthcare services, Journal of King Saud University - Computer and Information Sciences, Volume 29, Issue 3, 2017, Pages 281-287, ISSN 1319-1578 [5] Samuel, Victoria & Adewumi, Adewole & Dada, Benjamin &Omoregbe, Nicholas & Misra, Sanjay &Odusami, Modupe. (2019).DesignandDevelopment of a Cloud-Based Electronic Medical Records (EMR) System. 10. 1007/978-981-13-6351-1_3. [6] Adebayo, Abayomi-Alli &Ikuomola, Aderonke & Robert, Ifeoluwa & Abayomi-Alli, Olusola. (2014). An Enterprise Cloud-Based Electronic Health Records System. 2. 21-36. [7] Pradeep Deshmukh, Design of cloud security in the EHR for Indian healthcare services, Journal of King Saud University-Computer andInformationSciences, Volume 29, Issue 3, 2017, Pages 281-287, ISSN 1319- 1578. [8] Jesús Romero, Pablo López, José Luis Vázquez Noguera, Cristian Cappo, Diego P. Pinto-Roa and Cynthia Villalba , INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW, Health Informatics - An International Journal (HIIJ) Vol. 5, No. 2/3, August 2016.