SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1345
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY
RENEWAL IN THE HEALTH CARE SYSTEM.
S Mahammed Nazeeb1, Dr. T Manikumar 2 , Dr.N Naveenkumar 3
1PG Research Scholar, Department of Computer Applications
2Assistant Professor, 3Associate Professor,1,2,3 Department of Computer Applications
1,2,3 Madanapalle Institute of Technology and Science , Andhra Pradesh, 517352
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The contribution of cloud-basedservicestohealth
care facilities is a major problem in the 21st century. In this
paper, presenting its benefits and tools tohospitals, clinicsand
diagnostic centers, applications and services already exist are
categorized, which basically affects: data storage, computing
capabilities, network, PaaS, SaaS, data analytics, business.
ingenuity and project management. Then, other issues of
protection and risk assessment in cloud-based services are
thoroughly analyzed along with other studies. In addition, a
risk-based analysis of the comparative risk between safe and
unsafe cloud systems is included. Finally, conclusions are
presented with a proposed future work.
1. INTRODUCTION
Nowadays, cloud computing has interfered in all sectors of
human life. Marketing, education as well as healthcare are
three of them which have been web digitalized. As far as the
healthcare is concerned, considering how many diagnostic
tests and therapies, like myopia laser and axis tomography,
were not feasible until the 90s decade, is enoughinorderthe
importance of cloud services to be conceptualized. This
happens because such clinical operations require storage of
many patients’ data (e.g. records from medical ultrasounds)
and simultaneously an easy, fast access to them. This can be
achieved only through secured cloud systems. Imagine for a
moment how many terabytes in external or portable disk
drives would be necessary for every hospital and every
doctor if the interactive cloud storage systems did not exist
This means that their contribution to the healthcare sector
should be thoroughly and methodically studied as far as the
benefits, the offered tools and the threats/risks are
concerned. More specifically, these three mentioned factors
must be categorized in a mannerthatwill helpall employees,
as well as scientists in the Information Technology (IT)
sector of Healthcare
2. LITERATURE REVIEW
Literature survey is the most important step in software
development process. Before developing the tool it is
necessary to determine the time factor, economy and
company strength. Once these things are satisfied, ten next
steps are to determine which operatingsystemandlanguage
can be used for developing the tool. Once the programmers
start building the tool the programmers need lot of external
support. This support can be obtained from senior
programmers, from book or from websites. Before building
the system the above consideration are taken into account
for developing the proposed system
Revolutionary Impact for Cloud Solutions on HealthcareIt is
challenging to bring about changes in the healthcare sector
due to many legacy programs and very sensitive personal
information. Globally, many governments are experiencing
countless problems in their efforts to digitize health care
services. The healthcare structure as a business is facing
unprecedented challenges due to expected growth and
growing demand. [1]
Predicting the real-time threat of cloud-based assets using
big data statistics with reports of cloud-related violations
becoming a daily occurrence, businesses looking for secure
cloud infrastructure that can support their applications and
data in the cloud. Current cloud security solutionshavebeen
struggling to keep up with the rapid deployment of
organization data and applications in the cloud. Traditional
IT security services have long provided current information
about vulnerability and attack, but no longer apply to the
latest threat. But legacy security solutions work for silo and
can easily ignore the big picture. Older tools no longer work
to prevent attacks. There is therefore a need for greater
security awareness and security measures for all businesses
using cloud infrastructure. A comprehensive approach to
cloud protection is needed to respond quickly to changes in
the organization's environment. This approach should
include monitoring tools to bring the latest security
intelligence to cloud infrastructure as well as big data
analysis to predict and prevent future threats. This research
paper proposes a real-time security solution that provides
predictive threat analysis to protect IT resources in the
cloud. This model can be used as a proposed security
mechanism where organizations work together to share the
latest threats to predict threats, thus allowing businesses to
deliver new products and services quickly, without
disruption or security breaches. [1] [2]
Cloud Sourcing Risk Analysis in the Health and Community
Health Industry The task of protecting health care
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1346
information systems (HIS) from instant onlinesecurityrisks
is integrated with cloud computing. HIS data and resources
are naturally shared with other outreachprograms,decision
making, emergencies, and other health-related concepts. In
the face of a host of multi-stakeholderneeds,diverse,diverse
cloud models are embraced across the healthcareandpublic
healthcare industry, which undermines the real origins of
sharing and deploying cloud computing in this domain. The
mistaken view of security is one of the main obstacles to the
adoption of the cloud as a de facto standard in the field of
health care and public health. In this paper, we demonstrate
similarities in the security features of cloud computing
models, by identifying keyassetsonHIS,andevaluatingtheir
impact on HIS. We also assessed the risk exposure of cloud
computing models by performing key analyzes. To the best
of our knowledge, this is the first study of its kind of risk
analysis of cloud computing models to demonstrate its HIS
validity. [3] [4]
How Healthcare Can Benefit from Data Integration In
recent years, healthcare institutions have been looking for
ways to improve levels of patient care and make better
informed clinical decisions. They have also been endlessly
searching for ways to cut costs and make better business
decisions. This is now possible through digitization and big
data. Today, the digital transformation of healthcare
institutions has also been enhanced by the increased
integration of the Internetof Things(IoT)thatalsogenerates
data. These innovations have helped the industry enhance
efficiencies by streamlining processes while enablingaccess
to the vital data they need to make these important
decisions. Smart devices like wearables along with cloud
technology and increased connectivity have brought about
the seamless access to personalized medicinedrivenbydata
integration and analytics.However,accordingtoVerizon, the
level of IoT adoption in the industry is still comparatively
low with only an 11% increase. When compared to
manufacturing that saw an increase of 84% over the same
period of time, you can say that healthcare still has a long
way to go. [5][6]
Compared to the security and privacy issues of the e-health-
based cloud system, it does not provide reliableandaccurate
access control requirements. A patient may not have access
to his or her confidential information without following
HIPAA rules. There is a problem of accepting threats to the
security and privacy of patient health data, as well as the
common belief that these cannot be adequately addressed
[7].
LIMITATIONS:
a) Patient's data can be shared.
b) Not secured.
c) Chance of privacy disclosure
3. PROPOSED METHODOLOGY:
The proposed scheme offers an eye-catching categorization
of cloud benefits and threats in the healthcare sector
providing many important tools and applications. In this
way, the information exchangeandmanagementare boosted
because less time is consumed[8].Adoptingcloudservices in
health sector demands that security issues be taken into
consideration. This is madeclearerbelowwheresomemajor
web-based dangers are analyzed. Cyber-attacks and the fact
that authorized users (doctors, nurses and patients) lack
knowledge of technical issues are the two most important
challenges[9][10].
ADVANTAGES:
a) No chance of data loss.
b) Highly secured and trustable.
c) Access authentication with strong passwords
and authorization
SYSTEM ARCHITECTURE:
Fig: 3.1 System Architecture
3.1IMPLEMENTATION:
a) Collect data from “AllRecipes.com” as we searched
item name.
b) Collect the reviews of the selected recipe
Finally we found that review type (Negative, positive and
neutral) and classify the reviews
4. RESULTS & DISCUSSION
1. Doctor: The doctor checks the health of thepatientsand
sends reports to the patients.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1347
2. Patient: Patients can book a slot for checkup and view
their health reports.
3 Dashboard module: In this module, patients can view
and book their appointments on which day they need.
4. Appointments module: In this module, Doctor’s can
view the booked appointments for treatment, and he
can conform the appointment of the patient. After
treatment he can also able to send a report to the patients.
5. View Schedule: In this module, patients can view the
appointment timings after booking the appointment
his/her interested day.
Fig:4.1 Home page
Fig 4.2:Doctor registration
Fig 4.3: Doctor login
Fig 4.4: Features
Fig 4.5: Patient Registration
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1348
Fig 4.6: Patient login
Fig 4.7: Schedules
Fig4.8:Reports
5. CONCLUSION
In this paper we are implementing an eye-catching
categorization of cloud benefits andthreatsinthehealthcare
sector providing many important tools and applications. In
this way, the information exchange and management are
boosted because less time is consumed. This fact is a
necessary precondition for the implementation ofthefuture
trends which are next described.
REFERENCES
[1] Sinhasane, S. (2019). Revolutionary Impact of Cloud
Solutions on Healthcare. [Online] Gartner, Inc.,
https://gtnr.it/2PAcf79, Accessed on 27th February
2020
[2] Spok (2019) “Infographic: How Healthcare Deploys
Software as a Service (SaaS)”, https://bit.ly/38uLcR4,
Accessed on 6th March 2020
[3] Thriveni T. K. and Dr Prashanth C S R (2015) “Real-
time threat predictionforcloudbasedassetsusing big-
data analytics”, https://bit.ly/2YgTbQ6, Accessed on
20th June 2020
[4] Abrar H., Hussain S. J., Chaudhry J., SaleemK., OrgunM.
A., Muhtadi J. A. and Valli C. (2018) “Risk Analysis of
Cloud Sourcing in Healthcare and Public Health
Industry”, https://bit.ly/38fEEWr, Accessed on 24th
February 2020
[5] Zola A. (2018) “How Healthcare Can BenefitfromData
Integration”, Intersog, https://bit.ly/3aAOtA3,
Accessed on 6th March 2020
[6] King T. (2018) “Healthcare Data Integration: 5
Software Tools to Consider”, Solutions Review,
https://bit.ly/2TvLbZb, Accessed on 6th March 2020
[7] Victoria S. (2018) “3 Types of Collaboration Software
Tools to Improve Your Workflow”, RubyGarage,
https://bit.ly/2Irl7b3, Accessed on 6th March 2020
[8] LaPointe J. (2017) “Top 10 Enterprise Resource
Planning (ERP) Vendors By Hospital Use”, Revcycle
Intelligence, xtelligent Healthcare Media,
https://bit.ly/2VTS5ck, Accessed on 7th March 2020
[9] Cloud Computing for Dummies by Judith S. Hurwitz,
Robin Bloor, Marcia Kaufman, Fern Halper
[10] Cloud Computing: Concepts, Technology &
Architecture by Zaigham Mahmood, Ricardo Puttini,
Thomas Erl

More Related Content

Similar to DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CARE SYSTEM

Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitalsijtsrd
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYIRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systemsijtsrd
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
 
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARECLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCAREUsmanYakubuMaaruf
 
“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”
“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”
“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”IRJET Journal
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...IJERA Editor
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...cloud100
 
Role of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfRole of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfrectified
 

Similar to DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CARE SYSTEM (20)

Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
 
Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYTHE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
 
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARECLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
CLOUD COMPUTING AND BYOD: BENEFITS AND CHALLENGES IN MODERN HEALTHCARE
 
Accenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po VAccenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po V
 
Accenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po VAccenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po V
 
Accenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po VAccenture Cloud Healthcare Po V
Accenture Cloud Healthcare Po V
 
“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”
“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”
“TRIBEOUT, SOCIAL MEDIA PLATFORM FOR COMMUNITY HEALTHCARE”
 
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
Is ‘Enterprise Mobility’ The Way Forward For Enterprises? Part I: Findings an...
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...A study on significance of adopting cloud computing paradigm in healthcare se...
A study on significance of adopting cloud computing paradigm in healthcare se...
 
N018138696
N018138696N018138696
N018138696
 
Role of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdfRole of IoT and Cloud Computing in Digital Healthcare.pdf
Role of IoT and Cloud Computing in Digital Healthcare.pdf
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CARE SYSTEM

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1345 DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CARE SYSTEM. S Mahammed Nazeeb1, Dr. T Manikumar 2 , Dr.N Naveenkumar 3 1PG Research Scholar, Department of Computer Applications 2Assistant Professor, 3Associate Professor,1,2,3 Department of Computer Applications 1,2,3 Madanapalle Institute of Technology and Science , Andhra Pradesh, 517352 ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The contribution of cloud-basedservicestohealth care facilities is a major problem in the 21st century. In this paper, presenting its benefits and tools tohospitals, clinicsand diagnostic centers, applications and services already exist are categorized, which basically affects: data storage, computing capabilities, network, PaaS, SaaS, data analytics, business. ingenuity and project management. Then, other issues of protection and risk assessment in cloud-based services are thoroughly analyzed along with other studies. In addition, a risk-based analysis of the comparative risk between safe and unsafe cloud systems is included. Finally, conclusions are presented with a proposed future work. 1. INTRODUCTION Nowadays, cloud computing has interfered in all sectors of human life. Marketing, education as well as healthcare are three of them which have been web digitalized. As far as the healthcare is concerned, considering how many diagnostic tests and therapies, like myopia laser and axis tomography, were not feasible until the 90s decade, is enoughinorderthe importance of cloud services to be conceptualized. This happens because such clinical operations require storage of many patients’ data (e.g. records from medical ultrasounds) and simultaneously an easy, fast access to them. This can be achieved only through secured cloud systems. Imagine for a moment how many terabytes in external or portable disk drives would be necessary for every hospital and every doctor if the interactive cloud storage systems did not exist This means that their contribution to the healthcare sector should be thoroughly and methodically studied as far as the benefits, the offered tools and the threats/risks are concerned. More specifically, these three mentioned factors must be categorized in a mannerthatwill helpall employees, as well as scientists in the Information Technology (IT) sector of Healthcare 2. LITERATURE REVIEW Literature survey is the most important step in software development process. Before developing the tool it is necessary to determine the time factor, economy and company strength. Once these things are satisfied, ten next steps are to determine which operatingsystemandlanguage can be used for developing the tool. Once the programmers start building the tool the programmers need lot of external support. This support can be obtained from senior programmers, from book or from websites. Before building the system the above consideration are taken into account for developing the proposed system Revolutionary Impact for Cloud Solutions on HealthcareIt is challenging to bring about changes in the healthcare sector due to many legacy programs and very sensitive personal information. Globally, many governments are experiencing countless problems in their efforts to digitize health care services. The healthcare structure as a business is facing unprecedented challenges due to expected growth and growing demand. [1] Predicting the real-time threat of cloud-based assets using big data statistics with reports of cloud-related violations becoming a daily occurrence, businesses looking for secure cloud infrastructure that can support their applications and data in the cloud. Current cloud security solutionshavebeen struggling to keep up with the rapid deployment of organization data and applications in the cloud. Traditional IT security services have long provided current information about vulnerability and attack, but no longer apply to the latest threat. But legacy security solutions work for silo and can easily ignore the big picture. Older tools no longer work to prevent attacks. There is therefore a need for greater security awareness and security measures for all businesses using cloud infrastructure. A comprehensive approach to cloud protection is needed to respond quickly to changes in the organization's environment. This approach should include monitoring tools to bring the latest security intelligence to cloud infrastructure as well as big data analysis to predict and prevent future threats. This research paper proposes a real-time security solution that provides predictive threat analysis to protect IT resources in the cloud. This model can be used as a proposed security mechanism where organizations work together to share the latest threats to predict threats, thus allowing businesses to deliver new products and services quickly, without disruption or security breaches. [1] [2] Cloud Sourcing Risk Analysis in the Health and Community Health Industry The task of protecting health care
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1346 information systems (HIS) from instant onlinesecurityrisks is integrated with cloud computing. HIS data and resources are naturally shared with other outreachprograms,decision making, emergencies, and other health-related concepts. In the face of a host of multi-stakeholderneeds,diverse,diverse cloud models are embraced across the healthcareandpublic healthcare industry, which undermines the real origins of sharing and deploying cloud computing in this domain. The mistaken view of security is one of the main obstacles to the adoption of the cloud as a de facto standard in the field of health care and public health. In this paper, we demonstrate similarities in the security features of cloud computing models, by identifying keyassetsonHIS,andevaluatingtheir impact on HIS. We also assessed the risk exposure of cloud computing models by performing key analyzes. To the best of our knowledge, this is the first study of its kind of risk analysis of cloud computing models to demonstrate its HIS validity. [3] [4] How Healthcare Can Benefit from Data Integration In recent years, healthcare institutions have been looking for ways to improve levels of patient care and make better informed clinical decisions. They have also been endlessly searching for ways to cut costs and make better business decisions. This is now possible through digitization and big data. Today, the digital transformation of healthcare institutions has also been enhanced by the increased integration of the Internetof Things(IoT)thatalsogenerates data. These innovations have helped the industry enhance efficiencies by streamlining processes while enablingaccess to the vital data they need to make these important decisions. Smart devices like wearables along with cloud technology and increased connectivity have brought about the seamless access to personalized medicinedrivenbydata integration and analytics.However,accordingtoVerizon, the level of IoT adoption in the industry is still comparatively low with only an 11% increase. When compared to manufacturing that saw an increase of 84% over the same period of time, you can say that healthcare still has a long way to go. [5][6] Compared to the security and privacy issues of the e-health- based cloud system, it does not provide reliableandaccurate access control requirements. A patient may not have access to his or her confidential information without following HIPAA rules. There is a problem of accepting threats to the security and privacy of patient health data, as well as the common belief that these cannot be adequately addressed [7]. LIMITATIONS: a) Patient's data can be shared. b) Not secured. c) Chance of privacy disclosure 3. PROPOSED METHODOLOGY: The proposed scheme offers an eye-catching categorization of cloud benefits and threats in the healthcare sector providing many important tools and applications. In this way, the information exchangeandmanagementare boosted because less time is consumed[8].Adoptingcloudservices in health sector demands that security issues be taken into consideration. This is madeclearerbelowwheresomemajor web-based dangers are analyzed. Cyber-attacks and the fact that authorized users (doctors, nurses and patients) lack knowledge of technical issues are the two most important challenges[9][10]. ADVANTAGES: a) No chance of data loss. b) Highly secured and trustable. c) Access authentication with strong passwords and authorization SYSTEM ARCHITECTURE: Fig: 3.1 System Architecture 3.1IMPLEMENTATION: a) Collect data from “AllRecipes.com” as we searched item name. b) Collect the reviews of the selected recipe Finally we found that review type (Negative, positive and neutral) and classify the reviews 4. RESULTS & DISCUSSION 1. Doctor: The doctor checks the health of thepatientsand sends reports to the patients.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1347 2. Patient: Patients can book a slot for checkup and view their health reports. 3 Dashboard module: In this module, patients can view and book their appointments on which day they need. 4. Appointments module: In this module, Doctor’s can view the booked appointments for treatment, and he can conform the appointment of the patient. After treatment he can also able to send a report to the patients. 5. View Schedule: In this module, patients can view the appointment timings after booking the appointment his/her interested day. Fig:4.1 Home page Fig 4.2:Doctor registration Fig 4.3: Doctor login Fig 4.4: Features Fig 4.5: Patient Registration
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 06 | June 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1348 Fig 4.6: Patient login Fig 4.7: Schedules Fig4.8:Reports 5. CONCLUSION In this paper we are implementing an eye-catching categorization of cloud benefits andthreatsinthehealthcare sector providing many important tools and applications. In this way, the information exchange and management are boosted because less time is consumed. This fact is a necessary precondition for the implementation ofthefuture trends which are next described. REFERENCES [1] Sinhasane, S. (2019). Revolutionary Impact of Cloud Solutions on Healthcare. [Online] Gartner, Inc., https://gtnr.it/2PAcf79, Accessed on 27th February 2020 [2] Spok (2019) “Infographic: How Healthcare Deploys Software as a Service (SaaS)”, https://bit.ly/38uLcR4, Accessed on 6th March 2020 [3] Thriveni T. K. and Dr Prashanth C S R (2015) “Real- time threat predictionforcloudbasedassetsusing big- data analytics”, https://bit.ly/2YgTbQ6, Accessed on 20th June 2020 [4] Abrar H., Hussain S. J., Chaudhry J., SaleemK., OrgunM. A., Muhtadi J. A. and Valli C. (2018) “Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry”, https://bit.ly/38fEEWr, Accessed on 24th February 2020 [5] Zola A. (2018) “How Healthcare Can BenefitfromData Integration”, Intersog, https://bit.ly/3aAOtA3, Accessed on 6th March 2020 [6] King T. (2018) “Healthcare Data Integration: 5 Software Tools to Consider”, Solutions Review, https://bit.ly/2TvLbZb, Accessed on 6th March 2020 [7] Victoria S. (2018) “3 Types of Collaboration Software Tools to Improve Your Workflow”, RubyGarage, https://bit.ly/2Irl7b3, Accessed on 6th March 2020 [8] LaPointe J. (2017) “Top 10 Enterprise Resource Planning (ERP) Vendors By Hospital Use”, Revcycle Intelligence, xtelligent Healthcare Media, https://bit.ly/2VTS5ck, Accessed on 7th March 2020 [9] Cloud Computing for Dummies by Judith S. Hurwitz, Robin Bloor, Marcia Kaufman, Fern Halper [10] Cloud Computing: Concepts, Technology & Architecture by Zaigham Mahmood, Ricardo Puttini, Thomas Erl