SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 8
Smart and Secure Healthcare Administration over Cloud Environment
Govinda.K1, Rajkumar.R2, Gowthaman.A3
With the development in healthcare and economic fields,
greater number of medical records is generated. There is
urgent need and demand to improve the levels and
standards of modern health-care records management by
using innovative technology. The objective of this study is to
introduce the concept of Cloud Computing and discuss the
challenges of applying Healthcare Cloud (HC)toimprove the
Health Information Science research. With the new concept
of Cloud Computing emerging in recent years, more and
more interests have been sparked from a variety
organizations and individual users, as they increasingly
intend to take advantage of web applications to sharea huge
amount of public and private data and informationina more
affordable way and reliable IT architectureThis documentis
template. We ask that authors follow so.
More specifically, the medical andhealthinformationsystem
based on the cloud computing is desired, in order to realize
the sharing of medical data and health information,
coordination of clinical service, along with the effective and
cost-containment clinical information systeminfrastructure
via the implementation of a distributed and high-integrated
platform.
Since health informatics seek new ways of driving health
information science research forward, for example,
international research collaboration, growing demands are
now placed on computer networks to providehardwareand
software resources and pave a newavenuetosharesensitive
and private medical data fromdifferentgeographic locations.
This new model of service (Cloud Computing) offers
tremendous opportunities for the collaborative health
information science research purpose; unfortunately, it has
also introduced a set of new and unfamiliar challenges, such
as lack of interoperability, standardization,privacy,network
security and culture resistance.Inthispaper,wewill identify
the challenges of applying healthcare cloud in the health
information research and discuss potential approaches to
conquer those barriers, such as audit, disaster recovery,
legal, regulatory and compliance.
Finally, the paper will focus on the security of Cloud
Computing applied in the health information science
research. Research on the various security issues
surrounding healthcare information systems has been
heated over the last few years.
2. LITERATURE REVIEW
The advent of cloud computing in recent years has increased
a lot of interests from different stakeholders, business
organizations, institutions and government agencies. The
growing interest is fueled by the promised new economic
model of cloud computing which brings achange from heavy
IT infrastructure invest for limiting resources that are
internally managed and owned to pay per use for IT service
owned by a service provider. Cloud computing paves a new
avenue to deliver enterprise IT. As all major disruptive
changes in technology and Internet revolution, it represents
an innovative democratized of Web computing. Cloud
computing notonlyupgradethebusinessmodelsandtheway
IT infrastructure is being consumed, but also the underlying
architecture of how we develop, deploy, run and deliver
applications.
Mell and Grance (2010) give a definition of cloud computing
that is a model for enabling convenient, on-demand network
access to a shared pool of configurable computing resource
that can be rapidly provisioned and released with minimal
management effort or service-provider interaction. We have
already seen similar morelimitedapplicationsforyears,such
as Google Docs or Gmail. Nevertheless, cloud computing is
different from traditional systems [2]. Armbrust et al.
introduce that cloud computing offers a wide range of
computing sources on demand anywhere and anytime;
eliminates an up-front commitment by cloud users; allows
users to pay for use of computing resources on a short-term
basis as needed and has higher utilization by multiplexing of
workloads from various organizations. Cloud computing
includes three models: (1) Software as a Service (SaaS): the
applications (e.g. EHRs) are hosted by a cloud service
provider and made available to customers over a network,
typically the Internet. (2) Platform as a Service (PaaS): the
development tools (such as OS system) are hosted in the
123School of Computing Science Engineering, VIT University, Vellore, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Cloud computing is an emergingtechnologythat
is expected to support internet scale critical applications
which could be essential to the healthcare sector. Its
scalability, resilience, adaptability, connectivity, cost
reduction, and high performance features have high potential
to lift the efficiency and quality of healthcare. With the
widespread application of healthcare Information and
Communication Technology, constructing a stable and
sustainable data sharing circumstance has attracted rapidly
growing attention in both academic research area and
healthcare industry. Cloud computing is one of long dreamed
visions of Healthcare Cloud (HC), which matches the need of
healthcare information sharing directly to various health
providers over the Internet, regardless of their location and
the amount of data. This paper, proposestoolrelatedtosecure
health information sharing and integration.
1. INTRODUCTION
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 9
cloud and accessed through a browser (e.g. MicrosoftAzure).
(3) Infrastructure as a Service (IaaS): the cloud user
outsources the equipment used to support operations,
including storage, hardware, servers and networking
components. The cloudserviceproviderownstheequipment
and is responsibleforhousing,runningandmaintainingit[3].
In the clinical environment, healthcare providers are able to
remotely access the corporate Intranet via a local Internet
service provider, since they have the option to have an ISDN
line installed to their home or hospital linking with cloud.
The majority of physicians in healthcare do not always
have the information they require whentheyneedtorapidly
make patient-care decisions, andpatientsoftenhavetocarry
a paper record of their health history informationwiththem
from visit to visit. To address the problems, IBM and Active
Health Management collaborate to create a cloudcomputing
technology-based Collaborative Care solution that gives
physicians and patients access to the information they need
to improve the overall quality of care, without the need to
invest in new infrastructure [5]. IBM facilitated American
Occupational Network and HyGen Pharmaceuticals to
improve patient care by digitizing health records and
streamlining their business operations using cloud-based
software from IBM Med Trak systems, Inc. and The System
House, Inc. Their technology handlesvarioustasksasa cloud
service through the internet instead of developing,
purchasing and maintaining technology onsite [5]. Acumen
solution’s cloud computing CRM and project management
system were selected by the U.S. Department of Health &
Human Services’ office of the National.
Coordinator for Health IT is to manage the selection and
implementation of EHR systems across the country. The
software will enable regional extension centers to manage
interactions with medical providers related to the selection
and implementation of an EHR system. Sharp Community
Medical Group in San Diego will be using the collaborative.
Care solution to change the way physicians and nurse’s
access information throughout the hospital group’s multiple
electronic medical record systems to apply advanced
analytical and clinical decision support to help give doctors
better insight and work more closely with patientcareteams
[6]. One of similar example of applying cloud service in the
healthcare area is the architecture of the hospital file
management system (HFMS). A HFMS cluster contains a
master server and multiple blocks of servers by multiple
client access.
3. PROPOSED METHOD
In the proposed method describes security challenges in
healthcare information sharing, and different security
concerns related to threats and vulnerabilities are analyzed
and a method of alleviating these barriers. There are steps
taken to reduce the risk that an EHR system will be hacked:
Keep the EHR on a segregated network, if possible.Shelter
the EHR from the rest of the network infrastructure.
Otherwise it's very easy for a provider's practice
management system or mobile or medical device to pass
on a virus or other infiltration to the EHR system.
Check for vulnerabilities. Run risk assessments and
conduct audits. Correct weaknesses discovered.
Consider buying and running a data loss prevention
software program, which runs on the perimeter server.
Apply security patches to internet applications that are
connected to the EHR systems, such as internet explorer,
java and adobe acrobat.
Make sure that the firewalls are installed properly, and
that the antivirus programs are operational. Hackers are
looking for easy access into computer networks. Don't
make the EHR system that easy a target.
Comply with objective, specific measures, such as those
recommended by the National Institute of Standards and
Technology or HITRUST, so you can defend the adequacy
of the safeguards you took to protect patient information.
Make sure that the EHR and health IT vendor contracts
support off-the-shelf antivirus software.
Designate who within the organization is responsible for
maintaining the integrity of the system.
Clearly delineate with the EHR/Health IT vendorwhowill
be responsible for security patches. Don't assume thatthe
vendor will do it; many vendors don't.
Make sure that any medical software you're working with
runs without "super user" rights. This makes it harder for a
hacker to gain access to the records.
3.1 Security Measures
Cloud security architecture is effective only if the correct
defensive implementations are in place. An efficient cloud
security architecture should recognize the issues that will
arise with security management. The security management
addresses these issues with security controls. Thesecontrols
are put in place to safeguard any weaknesses in the system
and reduce the effect ofan attack.Whiletherearemanytypes
of controls behind a cloud security architecture, they can
usually be found in one of the following categories-
Deterrent controls: These controls are intended to
reduce attacks on a cloud system. Much like a warning sign
on a fence or a property, deterrent controls typically reduce
the threat level by informing potential attackers that there
will be adverse consequences for them if they proceed.
(Some consider them a subset of preventive controls.)
Preventive controls: Preventive controls strengthen the
system against incidents, generally by reducing if not
actually eliminating vulnerabilities. Strongauthenticationof
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 10
cloud users, for instance, makes it less likely that
unauthorized users can access cloud systems, and more
likely that cloud users are positively identified.
Physical security: Cloud service providers physically
secure the IT hardware (servers, routers, cablesetc.)against
unauthorized access, interference, theft, fires,floodsetc. and
ensure that essential supplies (such as electricity) are
sufficiently robust to minimize the possibility of disruption.
This is normally achieved by servingcloudapplicationsfrom
'world-class' (i.e. professionally specified, designed,
constructed, managed, monitored and maintained) data
centers.
Personnel security: Various information security
concerns relating to the IT and other professionals
associated with cloud services are typicallyhandledthrough
pre-, para- and post-employment activities such as security
screening potential recruits,securityawarenessandtraining
programs, proactive
Privacy: Providers ensure that all critical data (credit card
numbers, for example) are masked or encrypted and that
only authorized users have access to data in its entirety.
Moreover, digital identities and credentials must be
protected as should any data that the provider collects or
produces about customer activity in the cloud.
3.2 Attribute Based Encryption
In the CP-ABE, the encryptor controls access strategy, as the
strategy gets more complex, the design of system public key
becomes more complex, and the security of the system is
proved to be more difficult. The main research work of CP-
ABE is focused on the design of the access structure. In the
KP-ABE, attribute sets are used to explain the encrypted
texts and the private keys with the specified encrypted texts
that users will have the left to decrypt.
Algorithm
1. Setup
The setup algorithm chooses bilinear group triple (G1; G2;
GT) of prime order p and a bilinear map e:
G1 _ G2! GT. The algorithm also picks generators g of G1 and
h of G2. Then it chooses 3 random
Exponents e,i in Z^p. It then sets u = g_ and v = e (g; h).
After that it chooses a suitable encoding_sending eachofthe
m attributes at 2 P onto a (di_erent)
Element _ (at) = x 2 Z_p. It then chooses a set of m - 1 dummy
attributes D = fd1; dm^1g. By the
Notation Di for i < m - 1, we will denote the set of the dummy
attributes from d1 to di.
PK (public parameters): {f P; u; v; h; fh in igi=0; 2m-1; D; t}
MK (master secret key): f; g; h g
2. Key Generation
KeyGen (PK, A, MK)
Given a set of attributes a _ P, the central authority picks an r
2 Z_ p at random and computes the secret
Key for the user as follows:
SKA =nfg
3. Encryption
Enc (PK, T, M)
For every non-leaf node x of the access tree T, we choose a
polynomial qx. We, proceed in a top down
Manner in selecting the polynomials, starting from the root
R. For a node x we set the degree of the node
Dx = kx ^ 1, one less than the threshold value that needs to
be satis_ed at the gate at that node.
Now, beginning at the root, we choose a random s 2R Z_ p
and set qr (0) = s. Then choose dr other points of the
polynomial qr to de_ne it completely. For all other non-leaf
nodes x, we set
Qx (0) = qparent(x)^Index(x)
_
And choose dx other points to completely de_ne qx.
For the last level of non-leaf nodes, x 2 T, we compute the
following two values:
Cx1 = u^ qx (0)
Cx2 = h ^ qx (0):_Qat2Sx (+_ (at)) Qd2Dm+kx^1^sx (+d)
The cipher text is given by:
CT = f ~ C = M _ e (g; h)_s ; C0 = h_s ; fCx1;Cx2g8x2 T
Attribute based CP-KBE encryption algorithm flow chart
Chart – 1: Flow chart for CP-KBE
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 11
3.2 Fully homomorphic Encryption
Fully homomorphic encryption allows straightforward
computations on encrypted information, and also allows
computing sum and product for the encrypted data without
decryption.
ALGORITHM
In the following examples, the notation is used to
denote the encryption of the message x.
In the full homomorphic cryptosystem,ina cyclic group of
order with generator ,ifthepublic keyis ,
where ,and isthesecretkey, thentheencryption
of a message is , for some
random . The homomorphic
property is then
Chart – 2 : Diagrammatic representation of FULL
Homomorphic Encryption
DATA SET for FULL HOMOMORPHIC ENCRYPTION
X AXIS
(modules
)
0 10 20 30 40 50 60 70 80 90 100
Y AXIS
(time)
10^(-4) 10^(-
4)
10^(-
3)
10^(-
3)
10^(-
3)
10^(-
3)
10^(-
3)
10^(-
3)
10^(-
3)
10^(-
2)
10^(-
2)
DATA SET for ABE
X AXIS
(modules)
0 10 20 30 40 50 60 70 80 90 100
Y AXIS
(time)
1 1 10 10 10 10 100 100 1000 1000 10000
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 12
The chart3 is based on time. Here the dark line refers to
ABE method and light line belongs to FULL Homomorphic
method. So Homomorphic method is good.
4. CONCLUSIONS
Little literature in the health information science research
addresses the critical challenges and solutions of applying
Cloud Computing. While the use of Cloud Computing
continues to increase, legal concerns are also increasing.
Although Cloud Computing providers may run afoul of the
obstacles, the long run providers will successfully navigate
these challenges. By using Cloud Computing security
framework, the collaborative parties can answer questions
related to governance and best practice and determine
whether the organization is capable of IT governance in the
Cloud Computing applications. Also it is observed that ABE
method of encryption is better than Full Homomorphic
method. The reason being in ABE we can define our own
encryption algorithm and hence it is more secure.
REFERENCES
[1] ANSI, ISO/TS 18308 Health Informatics-Requirements
for an Electronic Health Record Architecture, ISO 2003.
[2] Mell, P., Grance, T. “The NIST definition of cloud
computing.” Communication oftheACM,53(6),50,2010.
[3] Armbrust, M., et al. “A view of cloud computing.”
Communication of the ACM, 53 (4), page 50-58, 2010.
[4] Guo L, Chen F, Chen L, Tang X. The building of cloud
computing environment for e-health. In: Proceedings of
the 2010 International Conference on E-Health
Networking, Digital Ecosystems and Technologies
(EDT). New York, NY: IEEE; 2010Presentedat:TheIEEE
International Conference on E-Health Networking; July
1-3, 2010; Lyon, France.
[5] IBM and ActiveHealth Management. ActiveHealth and
IBM Pioneer CloudComputingApproachtoHelpDoctors
Deliver High Quality, Cost Effective Patient Care.
http://www-
03.ibm.com/press/us/en/pressrelease/32267.wss.
Accessed on September 1st, 2011.
[6] Acmen Solution. Acumen nabs ONC cloud computing
contract.URL:http://www.cmio.net/index.php?option=
com_articles&view=article&i d=20648: acumen-nabs-
onc-cloud-computing-contract&division=cmio.Accessed
on June 27, 2012,
[7] Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH,
Konwinski A, et al. EECSDepartment,UCBerkeley.2009.
above the Clouds: A Berkeley View of Cloud Computing.
Technical Report. URL: http:// www.eecs.berkeley.edu
/Pubs/TechRpts/2009/EECS-2009-28.pdf accessed on
June 28, 2012,
[8] Pearson S. Taking account of privacy when designing
cloud computing services. In: Proceedings of the ICSE
Workshop on Software Engineering ChallengesofCloud
Computing (CLOUD'09). New York, NY: IEEE; 2009
Presented at: the IEEE First international workshop on
software engineering challenges for Cloud Computing
(ICSE); May 16-24, 2009; Vancouver, BC, Canada.
[9] CSA. Security Guidance for Critical Areas of Focus in
Cloud Computing V2.1. Cloud Security Alliance. 2009.
[10] A. Harrington, C. Jensen. Crytographic Access Control in
a Distributed File System. Proceeding of the eight ACM
symposium on Access control models and tecnologies,
2003, 158-165.
[11] BSI BS ISO/IEC 27001: 2005/BS 7799-2:2005:
Information Technology-Security Techniques-
Information Security Management Systems-
Requirements. British Standards Institution. (2005 a).
[12] M. H. Kuo, Opportunities and Challenges of Cloud
Computing to Improve Health Care Services, J Med
Internet Res 2011;13(3):e67.
[13] http://www.hhs.gov/ocr/privacy/hipaa/administrative
/breachnotificatio nrule/breachtool.html accessed on
August 14, 2012.
BIOGRAPHIE
Dr.K.Govinda received the degree in
computer science and engineering
from NAGARJUNA University in 1998.
he is Associate Professor in School of
Computing Science and Engineering,
VIT University. His interests are
database, data warehousing andcloud
computing
Chart – 3: Comparison of ABE and Homomorphic.

More Related Content

What's hot

Healthcare in the Clouds
Healthcare in the CloudsHealthcare in the Clouds
Healthcare in the CloudsGail Wilcox
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMatthew J McMahon
 
Impact of cloud computing on health industry
Impact of cloud computing on health industryImpact of cloud computing on health industry
Impact of cloud computing on health industrySuyati Technologies
 
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUDAUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUDIndium Software
 
Cscchealthcare110512
Cscchealthcare110512Cscchealthcare110512
Cscchealthcare110512Accenture
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...IOSR Journals
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET Journal
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...IJCSIS Research Publications
 
DriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical RecordDriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical Recorddricloud
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2CitiusTech
 
Securing the e health cloud
Securing the e health cloudSecuring the e health cloud
Securing the e health cloudBong Young Sung
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Cloud computing applications for e health
Cloud computing applications for e healthCloud computing applications for e health
Cloud computing applications for e healthHector Martin Garcia
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureJerry Fahrni
 

What's hot (20)

Healthcare in the Clouds
Healthcare in the CloudsHealthcare in the Clouds
Healthcare in the Clouds
 
McMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy PaperMcMahon and Associates Cloud Usage Policy Paper
McMahon and Associates Cloud Usage Policy Paper
 
Impact of cloud computing on health industry
Impact of cloud computing on health industryImpact of cloud computing on health industry
Impact of cloud computing on health industry
 
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUDAUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
AUTOMATED TESTING OF LAB MANAGEMENT SERVICES ON CLOUD
 
Cscchealthcare110512
Cscchealthcare110512Cscchealthcare110512
Cscchealthcare110512
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
DriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical RecordDriCloud. Cloud based Electronic Medical Record
DriCloud. Cloud based Electronic Medical Record
 
50120140503020
5012014050302050120140503020
50120140503020
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
HP Whitepaper BYOD in Healthcare
 HP Whitepaper BYOD in Healthcare  HP Whitepaper BYOD in Healthcare
HP Whitepaper BYOD in Healthcare
 
Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2Speeding up Healthcare Application with HTTP/2
Speeding up Healthcare Application with HTTP/2
 
Securing the e health cloud
Securing the e health cloudSecuring the e health cloud
Securing the e health cloud
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Cloud computing applications for e health
Cloud computing applications for e healthCloud computing applications for e health
Cloud computing applications for e health
 
Cloud computing and health care - Facing the Future
Cloud computing and health care - Facing the FutureCloud computing and health care - Facing the Future
Cloud computing and health care - Facing the Future
 
Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 

Similar to Healthcare Cloud Security Challenges

DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systemsijtsrd
 
Future of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdfFuture of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdfMarie Weaver
 
The Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud ComputingThe Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud ComputingIOSR Journals
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud SolutionIRJET Journal
 
Cloud Computing for Medical Application and Health Care
Cloud Computing for Medical Application and Health CareCloud Computing for Medical Application and Health Care
Cloud Computing for Medical Application and Health CareIRJET Journal
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitalsijtsrd
 
How cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdfHow cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdfLaura Miller
 
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management SystemSecurity and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management Systemijtsrd
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, ChereCheek752
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docxSPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docxrosiecabaniss
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing reportvaishalshah01
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...IRJET Journal
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET Journal
 

Similar to Healthcare Cloud Security Challenges (20)

DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
 
Future of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdfFuture of Cloud Computing in Healthcare.pdf
Future of Cloud Computing in Healthcare.pdf
 
The Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud ComputingThe Delivery of Web Mining in Healthcare System on Cloud Computing
The Delivery of Web Mining in Healthcare System on Cloud Computing
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
E-Health Care Cloud Solution
E-Health Care Cloud SolutionE-Health Care Cloud Solution
E-Health Care Cloud Solution
 
Cloud Computing for Medical Application and Health Care
Cloud Computing for Medical Application and Health CareCloud Computing for Medical Application and Health Care
Cloud Computing for Medical Application and Health Care
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
 
How cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdfHow cloud computing is beneficial for the Healthcare industry.pdf
How cloud computing is beneficial for the Healthcare industry.pdf
 
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management SystemSecurity and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management System
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16,
 
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docxSPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
SPECIAL SECTION ON HEALTHCARE BIG DATAReceived August 16, .docx
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
[IJET V2I3P4] Authors: Manjunath Aski, Prathibha P
 
Health Information Technology Implementation Challenges and Responsive Soluti...
Health Information Technology Implementation Challenges and Responsive Soluti...Health Information Technology Implementation Challenges and Responsive Soluti...
Health Information Technology Implementation Challenges and Responsive Soluti...
 
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
The Cloud Computing Approach for Secured Health Maintenance Record of Patient...
 
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
IRJET- A Smart Medical Monitoring Systems using Cloud Computing and Internet ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

Healthcare Cloud Security Challenges

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 8 Smart and Secure Healthcare Administration over Cloud Environment Govinda.K1, Rajkumar.R2, Gowthaman.A3 With the development in healthcare and economic fields, greater number of medical records is generated. There is urgent need and demand to improve the levels and standards of modern health-care records management by using innovative technology. The objective of this study is to introduce the concept of Cloud Computing and discuss the challenges of applying Healthcare Cloud (HC)toimprove the Health Information Science research. With the new concept of Cloud Computing emerging in recent years, more and more interests have been sparked from a variety organizations and individual users, as they increasingly intend to take advantage of web applications to sharea huge amount of public and private data and informationina more affordable way and reliable IT architectureThis documentis template. We ask that authors follow so. More specifically, the medical andhealthinformationsystem based on the cloud computing is desired, in order to realize the sharing of medical data and health information, coordination of clinical service, along with the effective and cost-containment clinical information systeminfrastructure via the implementation of a distributed and high-integrated platform. Since health informatics seek new ways of driving health information science research forward, for example, international research collaboration, growing demands are now placed on computer networks to providehardwareand software resources and pave a newavenuetosharesensitive and private medical data fromdifferentgeographic locations. This new model of service (Cloud Computing) offers tremendous opportunities for the collaborative health information science research purpose; unfortunately, it has also introduced a set of new and unfamiliar challenges, such as lack of interoperability, standardization,privacy,network security and culture resistance.Inthispaper,wewill identify the challenges of applying healthcare cloud in the health information research and discuss potential approaches to conquer those barriers, such as audit, disaster recovery, legal, regulatory and compliance. Finally, the paper will focus on the security of Cloud Computing applied in the health information science research. Research on the various security issues surrounding healthcare information systems has been heated over the last few years. 2. LITERATURE REVIEW The advent of cloud computing in recent years has increased a lot of interests from different stakeholders, business organizations, institutions and government agencies. The growing interest is fueled by the promised new economic model of cloud computing which brings achange from heavy IT infrastructure invest for limiting resources that are internally managed and owned to pay per use for IT service owned by a service provider. Cloud computing paves a new avenue to deliver enterprise IT. As all major disruptive changes in technology and Internet revolution, it represents an innovative democratized of Web computing. Cloud computing notonlyupgradethebusinessmodelsandtheway IT infrastructure is being consumed, but also the underlying architecture of how we develop, deploy, run and deliver applications. Mell and Grance (2010) give a definition of cloud computing that is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resource that can be rapidly provisioned and released with minimal management effort or service-provider interaction. We have already seen similar morelimitedapplicationsforyears,such as Google Docs or Gmail. Nevertheless, cloud computing is different from traditional systems [2]. Armbrust et al. introduce that cloud computing offers a wide range of computing sources on demand anywhere and anytime; eliminates an up-front commitment by cloud users; allows users to pay for use of computing resources on a short-term basis as needed and has higher utilization by multiplexing of workloads from various organizations. Cloud computing includes three models: (1) Software as a Service (SaaS): the applications (e.g. EHRs) are hosted by a cloud service provider and made available to customers over a network, typically the Internet. (2) Platform as a Service (PaaS): the development tools (such as OS system) are hosted in the 123School of Computing Science Engineering, VIT University, Vellore, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Cloud computing is an emergingtechnologythat is expected to support internet scale critical applications which could be essential to the healthcare sector. Its scalability, resilience, adaptability, connectivity, cost reduction, and high performance features have high potential to lift the efficiency and quality of healthcare. With the widespread application of healthcare Information and Communication Technology, constructing a stable and sustainable data sharing circumstance has attracted rapidly growing attention in both academic research area and healthcare industry. Cloud computing is one of long dreamed visions of Healthcare Cloud (HC), which matches the need of healthcare information sharing directly to various health providers over the Internet, regardless of their location and the amount of data. This paper, proposestoolrelatedtosecure health information sharing and integration. 1. INTRODUCTION
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 9 cloud and accessed through a browser (e.g. MicrosoftAzure). (3) Infrastructure as a Service (IaaS): the cloud user outsources the equipment used to support operations, including storage, hardware, servers and networking components. The cloudserviceproviderownstheequipment and is responsibleforhousing,runningandmaintainingit[3]. In the clinical environment, healthcare providers are able to remotely access the corporate Intranet via a local Internet service provider, since they have the option to have an ISDN line installed to their home or hospital linking with cloud. The majority of physicians in healthcare do not always have the information they require whentheyneedtorapidly make patient-care decisions, andpatientsoftenhavetocarry a paper record of their health history informationwiththem from visit to visit. To address the problems, IBM and Active Health Management collaborate to create a cloudcomputing technology-based Collaborative Care solution that gives physicians and patients access to the information they need to improve the overall quality of care, without the need to invest in new infrastructure [5]. IBM facilitated American Occupational Network and HyGen Pharmaceuticals to improve patient care by digitizing health records and streamlining their business operations using cloud-based software from IBM Med Trak systems, Inc. and The System House, Inc. Their technology handlesvarioustasksasa cloud service through the internet instead of developing, purchasing and maintaining technology onsite [5]. Acumen solution’s cloud computing CRM and project management system were selected by the U.S. Department of Health & Human Services’ office of the National. Coordinator for Health IT is to manage the selection and implementation of EHR systems across the country. The software will enable regional extension centers to manage interactions with medical providers related to the selection and implementation of an EHR system. Sharp Community Medical Group in San Diego will be using the collaborative. Care solution to change the way physicians and nurse’s access information throughout the hospital group’s multiple electronic medical record systems to apply advanced analytical and clinical decision support to help give doctors better insight and work more closely with patientcareteams [6]. One of similar example of applying cloud service in the healthcare area is the architecture of the hospital file management system (HFMS). A HFMS cluster contains a master server and multiple blocks of servers by multiple client access. 3. PROPOSED METHOD In the proposed method describes security challenges in healthcare information sharing, and different security concerns related to threats and vulnerabilities are analyzed and a method of alleviating these barriers. There are steps taken to reduce the risk that an EHR system will be hacked: Keep the EHR on a segregated network, if possible.Shelter the EHR from the rest of the network infrastructure. Otherwise it's very easy for a provider's practice management system or mobile or medical device to pass on a virus or other infiltration to the EHR system. Check for vulnerabilities. Run risk assessments and conduct audits. Correct weaknesses discovered. Consider buying and running a data loss prevention software program, which runs on the perimeter server. Apply security patches to internet applications that are connected to the EHR systems, such as internet explorer, java and adobe acrobat. Make sure that the firewalls are installed properly, and that the antivirus programs are operational. Hackers are looking for easy access into computer networks. Don't make the EHR system that easy a target. Comply with objective, specific measures, such as those recommended by the National Institute of Standards and Technology or HITRUST, so you can defend the adequacy of the safeguards you took to protect patient information. Make sure that the EHR and health IT vendor contracts support off-the-shelf antivirus software. Designate who within the organization is responsible for maintaining the integrity of the system. Clearly delineate with the EHR/Health IT vendorwhowill be responsible for security patches. Don't assume thatthe vendor will do it; many vendors don't. Make sure that any medical software you're working with runs without "super user" rights. This makes it harder for a hacker to gain access to the records. 3.1 Security Measures Cloud security architecture is effective only if the correct defensive implementations are in place. An efficient cloud security architecture should recognize the issues that will arise with security management. The security management addresses these issues with security controls. Thesecontrols are put in place to safeguard any weaknesses in the system and reduce the effect ofan attack.Whiletherearemanytypes of controls behind a cloud security architecture, they can usually be found in one of the following categories- Deterrent controls: These controls are intended to reduce attacks on a cloud system. Much like a warning sign on a fence or a property, deterrent controls typically reduce the threat level by informing potential attackers that there will be adverse consequences for them if they proceed. (Some consider them a subset of preventive controls.) Preventive controls: Preventive controls strengthen the system against incidents, generally by reducing if not actually eliminating vulnerabilities. Strongauthenticationof
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 10 cloud users, for instance, makes it less likely that unauthorized users can access cloud systems, and more likely that cloud users are positively identified. Physical security: Cloud service providers physically secure the IT hardware (servers, routers, cablesetc.)against unauthorized access, interference, theft, fires,floodsetc. and ensure that essential supplies (such as electricity) are sufficiently robust to minimize the possibility of disruption. This is normally achieved by servingcloudapplicationsfrom 'world-class' (i.e. professionally specified, designed, constructed, managed, monitored and maintained) data centers. Personnel security: Various information security concerns relating to the IT and other professionals associated with cloud services are typicallyhandledthrough pre-, para- and post-employment activities such as security screening potential recruits,securityawarenessandtraining programs, proactive Privacy: Providers ensure that all critical data (credit card numbers, for example) are masked or encrypted and that only authorized users have access to data in its entirety. Moreover, digital identities and credentials must be protected as should any data that the provider collects or produces about customer activity in the cloud. 3.2 Attribute Based Encryption In the CP-ABE, the encryptor controls access strategy, as the strategy gets more complex, the design of system public key becomes more complex, and the security of the system is proved to be more difficult. The main research work of CP- ABE is focused on the design of the access structure. In the KP-ABE, attribute sets are used to explain the encrypted texts and the private keys with the specified encrypted texts that users will have the left to decrypt. Algorithm 1. Setup The setup algorithm chooses bilinear group triple (G1; G2; GT) of prime order p and a bilinear map e: G1 _ G2! GT. The algorithm also picks generators g of G1 and h of G2. Then it chooses 3 random Exponents e,i in Z^p. It then sets u = g_ and v = e (g; h). After that it chooses a suitable encoding_sending eachofthe m attributes at 2 P onto a (di_erent) Element _ (at) = x 2 Z_p. It then chooses a set of m - 1 dummy attributes D = fd1; dm^1g. By the Notation Di for i < m - 1, we will denote the set of the dummy attributes from d1 to di. PK (public parameters): {f P; u; v; h; fh in igi=0; 2m-1; D; t} MK (master secret key): f; g; h g 2. Key Generation KeyGen (PK, A, MK) Given a set of attributes a _ P, the central authority picks an r 2 Z_ p at random and computes the secret Key for the user as follows: SKA =nfg 3. Encryption Enc (PK, T, M) For every non-leaf node x of the access tree T, we choose a polynomial qx. We, proceed in a top down Manner in selecting the polynomials, starting from the root R. For a node x we set the degree of the node Dx = kx ^ 1, one less than the threshold value that needs to be satis_ed at the gate at that node. Now, beginning at the root, we choose a random s 2R Z_ p and set qr (0) = s. Then choose dr other points of the polynomial qr to de_ne it completely. For all other non-leaf nodes x, we set Qx (0) = qparent(x)^Index(x) _ And choose dx other points to completely de_ne qx. For the last level of non-leaf nodes, x 2 T, we compute the following two values: Cx1 = u^ qx (0) Cx2 = h ^ qx (0):_Qat2Sx (+_ (at)) Qd2Dm+kx^1^sx (+d) The cipher text is given by: CT = f ~ C = M _ e (g; h)_s ; C0 = h_s ; fCx1;Cx2g8x2 T Attribute based CP-KBE encryption algorithm flow chart Chart – 1: Flow chart for CP-KBE
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 11 3.2 Fully homomorphic Encryption Fully homomorphic encryption allows straightforward computations on encrypted information, and also allows computing sum and product for the encrypted data without decryption. ALGORITHM In the following examples, the notation is used to denote the encryption of the message x. In the full homomorphic cryptosystem,ina cyclic group of order with generator ,ifthepublic keyis , where ,and isthesecretkey, thentheencryption of a message is , for some random . The homomorphic property is then Chart – 2 : Diagrammatic representation of FULL Homomorphic Encryption DATA SET for FULL HOMOMORPHIC ENCRYPTION X AXIS (modules ) 0 10 20 30 40 50 60 70 80 90 100 Y AXIS (time) 10^(-4) 10^(- 4) 10^(- 3) 10^(- 3) 10^(- 3) 10^(- 3) 10^(- 3) 10^(- 3) 10^(- 3) 10^(- 2) 10^(- 2) DATA SET for ABE X AXIS (modules) 0 10 20 30 40 50 60 70 80 90 100 Y AXIS (time) 1 1 10 10 10 10 100 100 1000 1000 10000
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 12 The chart3 is based on time. Here the dark line refers to ABE method and light line belongs to FULL Homomorphic method. So Homomorphic method is good. 4. CONCLUSIONS Little literature in the health information science research addresses the critical challenges and solutions of applying Cloud Computing. While the use of Cloud Computing continues to increase, legal concerns are also increasing. Although Cloud Computing providers may run afoul of the obstacles, the long run providers will successfully navigate these challenges. By using Cloud Computing security framework, the collaborative parties can answer questions related to governance and best practice and determine whether the organization is capable of IT governance in the Cloud Computing applications. Also it is observed that ABE method of encryption is better than Full Homomorphic method. The reason being in ABE we can define our own encryption algorithm and hence it is more secure. REFERENCES [1] ANSI, ISO/TS 18308 Health Informatics-Requirements for an Electronic Health Record Architecture, ISO 2003. [2] Mell, P., Grance, T. “The NIST definition of cloud computing.” Communication oftheACM,53(6),50,2010. [3] Armbrust, M., et al. “A view of cloud computing.” Communication of the ACM, 53 (4), page 50-58, 2010. [4] Guo L, Chen F, Chen L, Tang X. The building of cloud computing environment for e-health. In: Proceedings of the 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT). New York, NY: IEEE; 2010Presentedat:TheIEEE International Conference on E-Health Networking; July 1-3, 2010; Lyon, France. [5] IBM and ActiveHealth Management. ActiveHealth and IBM Pioneer CloudComputingApproachtoHelpDoctors Deliver High Quality, Cost Effective Patient Care. http://www- 03.ibm.com/press/us/en/pressrelease/32267.wss. Accessed on September 1st, 2011. [6] Acmen Solution. Acumen nabs ONC cloud computing contract.URL:http://www.cmio.net/index.php?option= com_articles&view=article&i d=20648: acumen-nabs- onc-cloud-computing-contract&division=cmio.Accessed on June 27, 2012, [7] Armbrust M, Fox A, Griffith R, Joseph AD, Katz RH, Konwinski A, et al. EECSDepartment,UCBerkeley.2009. above the Clouds: A Berkeley View of Cloud Computing. Technical Report. URL: http:// www.eecs.berkeley.edu /Pubs/TechRpts/2009/EECS-2009-28.pdf accessed on June 28, 2012, [8] Pearson S. Taking account of privacy when designing cloud computing services. In: Proceedings of the ICSE Workshop on Software Engineering ChallengesofCloud Computing (CLOUD'09). New York, NY: IEEE; 2009 Presented at: the IEEE First international workshop on software engineering challenges for Cloud Computing (ICSE); May 16-24, 2009; Vancouver, BC, Canada. [9] CSA. Security Guidance for Critical Areas of Focus in Cloud Computing V2.1. Cloud Security Alliance. 2009. [10] A. Harrington, C. Jensen. Crytographic Access Control in a Distributed File System. Proceeding of the eight ACM symposium on Access control models and tecnologies, 2003, 158-165. [11] BSI BS ISO/IEC 27001: 2005/BS 7799-2:2005: Information Technology-Security Techniques- Information Security Management Systems- Requirements. British Standards Institution. (2005 a). [12] M. H. Kuo, Opportunities and Challenges of Cloud Computing to Improve Health Care Services, J Med Internet Res 2011;13(3):e67. [13] http://www.hhs.gov/ocr/privacy/hipaa/administrative /breachnotificatio nrule/breachtool.html accessed on August 14, 2012. BIOGRAPHIE Dr.K.Govinda received the degree in computer science and engineering from NAGARJUNA University in 1998. he is Associate Professor in School of Computing Science and Engineering, VIT University. His interests are database, data warehousing andcloud computing Chart – 3: Comparison of ABE and Homomorphic.