SlideShare a Scribd company logo
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697
ISSN: 2249-6645

A Novel Framework for Securing Medical Records in
Cloud Computing
Md. Irfan1, Sayeed Yasin2
1

M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India.
Asst. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India.

2

ABSTRACT: The patient health records are maintained in a data server under the cloud computing environment. A novel
framework of secure sharing of personal health records (PHRs) under distributed environment in the cloud computing has
been proposed in this paper .Public and personal access models are designed with privacy and security enabled mechanism.
This framework addresses the unique challenges brought by multiple medical records owners and users, in that the
complexity of key management is greatly reduced while guaranteeing the privacy compared with previous works. The
attribute-based encryption (ABE) model is enhanced to support distributed ABE operations with MA-ABE. The system is
improved to support the dynamic policy management model. Thus, PHRs are maintained with security and privacy. It is a
server choice based security model and possess the central key management with attribute authorities.

Keywords: Cloud computing, Data privacy, Encryption, PHR.
I.

INTRODUCTION

Cloud computing is an emerging computing technology where applications and all the services are provided
through Internet. It is a model for enabling on-demand network access to various pool resources. Cloud computing can be
considered as a computing framework with greater flexibility and availability at lower cost [1]. Because of these
characteristics, cloud environment has been receiving a great nowadays. Cloud computing environment services benefit from
economies of scale achieved through versatile use of resources, specialization, and other efficiencies. The Internet has grown
into a world of its own, and its large space now offers capabilities that could support Physicians in their duties in numerous
ways. Nowadays software functions have moved from the individual user’s local hardware to a central server that operates
from a remote location. In recent years, is an emerging trend and medical records is a patient-centric model of health
information exchange and management. A health record is an electronic record of an individual user’s health information by
which the individual controls access to the information and may have the ability to manage, track, and participate in her own
health care.
Generally, medical record service allows a user to create, manage, and control her personal health data in one place
through the web, which has made the storage, retrieval, and sharing of the medical information more efficient. The general
principles of the security rule include that a covered entity must maintain both “reasonable and appropriate” administrative,
technical, and physical safeguards to protect Electronic Personal Health Information, e-PHI [2], which include requirements
to ensure integrity, confidentiality and availability of information; anticipation and protection against possible vulnerabilities
to the privacy of the information or against inappropriate use; and compliance by the entity’s workforce. Generally
information is recorded on secured systems, hard drives, backups, flash drives, shared folders, professional networks etc. As
health care professionals, physicians know that ensuring the accuracy of secret information involves more technical
approaches, to avoid the security pitfalls. Privacy laws that speak to the protection of patients secrecy are complex and often
difficult to understand in the context of an ever-growing cloud-based technology[3]. Due to the high cost of building and
maintaining specialized data centers, many medical record services are outsourced to or provided by third-party service
providers, for example, Samedi, Microsoft HealthVault and Medicine Brain. While it is exciting to have convenient medical
record services for everyone, there are many security and privacy risks which could impede its wide adoption[4].

II.

RELATED WORK

For access control of the outsourced data, partially trusted servers are often assumed. With cryptographic methods,
the aim is trying to enforce who has (read) access to which parts of a patient’s PHR documents in a fine-grained way.
Symmetric key methods are a class of algorithms for cryptography that use the same cryptographic keys for both encryption
of plaintext and decryption of ciphertext. The keys may be identical to each other or there may be a simple transformation to
go between the two keys. The keys, in practice, represent a shared secret key between two or more parties that can be used to
maintain a private information link. In [5], the authors proposed a solution for securing outsourced data on semi-trusted
servers based on symmetric key derivation methods, which can achieve fine-grained access control. Unfortunately, the
complexities of file creation and user grant or revocation operations are linear to the number of authorized users, which is
less scalable.
Public key cryptosystems(PKC) based solutions were proposed due to its ability to separate write and read
privileges. To realize fine-grained access control, the traditional public key encryption (PKE) based methods proposed by the
authors in [6] in their work “Patient controlled encryption: ensuring privacy of electronic medical records, they purpose the
solution scenario and shows how both public and symmetric based encryption used. The disadvantage of their solution is
either incurs high key management overhead, or require encrypting multiple copies of a file using different users’ keys.
www.ijmer.com
2695 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697
ISSN: 2249-6645

A number of works used ABE to realize fine-grained access control for the outsourced data, especially, there has
been an increasing interest in applying ABE to secure electronic healthcare records (EHRs). In [7], the authors proposed an
attribute-based infrastructure for EHR systems, where each patient’s EHR files are encrypted using a broadcast variant of
Cipher Text-ABE (CP-ABE). However, the encrypted text length grows linearly with the number of unrevoked users. In [8],
the authors applied ciphertext policy ABE (CP-ABE) to manage the sharing of PHRs, and introduced the concept of
social/professional domains but they do not use multi-authority ABE . In [9], the authors investigated using ABE to generate
self-protecting EMRs, which can either be stored on cloud servers or mobile phones so that EMR could be accessed when
the health provider is offline.

III.

PROPOSED WORK

A. Patient Centric Framework
The main aim of our framework (Figure 1) is to provide secure patient-centric medical record access and efficient
key management at the same time. The key idea is to divide the system into several security domains (namely, public
domains (PUDs) and personal domains (PSDs)) according to the different users’ data access requirements. The PUDs consist
of users who make access based on their professional roles, such as nurses, doctors and medical researchers. In practice, a
PUD can be mapped to an independent sector in the society, such as the government, health care or insurance sector. For
each PSD, its users are personally associated with the data owner (such as family members or close friends), and they make
accesses to medical records based on access rights assigned by the owner. In both types of the security domains, we utilize
ABE to realize cryptographically enforced, patient-centric PHR access.
Each data owner or patient is a trusted authority of her own PSD, who uses a KP-ABE system to manage the secret
keys and access rights of users in her PSD. In our framework, there are multiple owners, multiple SDs, multiple AAs, and
multiple users. In addition, two ABE systems are involved: for each PSD the YWRL’s revocable KP-ABE scheme is
adopted; for each PUD, our proposed revocable MA-ABE scheme is used.

Figure 1: Proposed Framework
B. System setup and Key Distribution
The system first defines a common universe of data attributes shared by every domain, such as “basic profile”,
“medical history”, “allergies”, and “prescriptions”. An emergency attribute is also defined for the break glass access. There
are two ways for distributing shared secret keys. First, when first using the health record service, a PHR owner can specify
the access privilege of a data reader in her PSD, and let her application generate and distribute corresponding key to the
latter, in a way resembling invitations in GoogleDoc. Second, a reader in domain could obtain the secret key by sending a
request (indicating which types of files she wants to access) to the record owner via HSN, and the owner will grant her a
subset of requested data types. In addition, the data attributes can be organized in a hierarchical manner for efficient policy
generation as shown in figure 2. When the user is granted all the file types under a category, his/ her access privilege will be
represented by that category instead.
In practice, there exist multiple Attribute authorities (AAs) each governing a different subset of role attributes. For
instance, hospital staffs shall have a different authorities from pharmacy specialists. This is reflected by (1) in Figure 1. In
addition, the authorities distribute write keys that permit contributors in their PUD to write to some patients’ PHR ((2)).

www.ijmer.com

2696 | Page
www.ijmer.com

International Journal of Modern Engineering Research (IJMER)
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697
ISSN: 2249-6645

Figure 2: The attribute hierarchy of files
C. PHR Encryption and Access
The owners upload ABE-encrypted record files to the server ((3)). Each owner’s record file is encrypted both under
a certain fine- grained and role-based access policy for users from the PUD to access, and under a selected set of data
attributes that allows access from users in the PSD. The data contributors will be granted write access to someone’s records,
if they present proper write keys ((4)). The data readers download record files from the server, and they can decrypt the files
only if they have suitable attributebased keys ((5)).
D. Break Glass
When an emergency occurs, the regular access policies may no longer be applicable. To handle this situation, a
method called break- glass access is needed to access the victim’s PHR. In our framework, each owner’s records access right
is also delegated to an emergency department (ED, (6)). To prevent from abuse of break- glass option, the emergency staff
needs to contact the department to verify her identity and the emergency situation, and obtain temporary read keys ((7)).
E. User Revocation
Here we consider revocation of a data reader or his attributes or access privileges. There are several possible cases:
1) revocation of one or more role attributes of a public domain user; 2) revocation of a public domain user which is
equivalent to revoking that entire user’s attributes. These operations are done by the attribute authority that the user belongs
to, where the actual computations can be delegated to the server to improve efficiency ((8)). 3) Revocation of a personal
domain user’s access privileges; 4) revocation of a personal domain user.

IV.

CONCLUSIONS

The personal health record (PHR) systems needs security against attackers and hackers. Scalable and Secure sharing
includes basic securities to protect the confidential information from unauthorized access and loss. This paper proposed the
new approach for existing PHR system for providing more security and privacy using attribute based encryption which plays
an important role because these are unique and not easily hackable. We are reducing key management problem and also we
enhance the privacy guarantee.

REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]

Cong Wang and Kui Ren, Jin Li, “Toward Publicly Auditable Secure Cloud Data Storage Services”, IEEE Network ,pp. 19-24,
July/August 2010.
M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data
access control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp. 89–106.
Zhiguo Wan, Jun‟ e Liu, and Robert H. Deng, “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access
Control in Cloud Computing”, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, Pp. 743-754, April 2012.
A. Vetro, H. Sun, P. DaGraca, and T. Poon, “Minimum drift architectures for three-layer scalable DTV decoding,” IEEE Trans.
Consumer Electron., vol. 44, no. 3, pp. 527-536, Aug. 1998.
S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: management of access control
evolution on outsourced data,” in VLDB ’07, 2007, pp. 123–134.
J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in
CCSW ’09, 2009, pp. 103–114.
S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving ehr system using attribute-based infrastructure,” ser. CCSW ’10,
2010, pp. 47–52.
L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible
delegation and revocation of user attributes,” 2009.
A. Akinyele, C.U. Lehmann, M.D. Green, M.W. Pagano, Z.N.J. Peterson, and A.D. Rubin. Self-protecting electronic medical
records using attribute-based encryption on mobile device. Technical report, Cryptology ePrint Archive, Report 2010/565, 2010.

www.ijmer.com

2697 | Page

More Related Content

What's hot

Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
YogeshIJTSRD
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
IJSRED
 
Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)
Vellore Institute of Technology
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...
Duraiyarasan S
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
kpit ppt
kpit pptkpit ppt
kpit ppt
Manoj Kumar K.M
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
ijtsrd
 
Paper MIE2016 from Proceedings pags 122-126
Paper MIE2016 from Proceedings pags 122-126Paper MIE2016 from Proceedings pags 122-126
Paper MIE2016 from Proceedings pags 122-126
vilaltajo
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
Shakas Technologies
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
IRJET Journal
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Naveena N
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
IEEEFINALYEARPROJECTS
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
Naveena N
 

What's hot (17)

Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)Set paper winter sem 15 16 (final)
Set paper winter sem 15 16 (final)
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Scalable and secure sharing of personal health records in cloud computing us...
Scalable and secure sharing of personal health
records in cloud computing us...Scalable and secure sharing of personal health
records in cloud computing us...
Scalable and secure sharing of personal health records in cloud computing us...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
kpit ppt
kpit pptkpit ppt
kpit ppt
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
 
Paper MIE2016 from Proceedings pags 122-126
Paper MIE2016 from Proceedings pags 122-126Paper MIE2016 from Proceedings pags 122-126
Paper MIE2016 from Proceedings pags 122-126
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
Efficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computingEfficient sharing of personal health records using encryption in cloud computing
Efficient sharing of personal health records using encryption in cloud computing
 

Viewers also liked

Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
IJMER
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
Prof. Dr. K. Adisesha
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Security
 
Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Introduction of boeing Autosaved)
Introduction of boeing Autosaved)
Mostafa ElGhamrawy
 
Utilization of intestines as animal casings
Utilization of intestines as animal casingsUtilization of intestines as animal casings
Utilization of intestines as animal casings
Dr. IRSHAD A
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?
Thales e-Security
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
Aleem Mohammed
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Arwa
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
Simeon Oriko
 
Mobile Payments Framework
Mobile Payments FrameworkMobile Payments Framework
Mobile Payments Framework
Lakshmana Kattula
 
Mobile Payments - How is it done?
Mobile Payments - How is it done?Mobile Payments - How is it done?
Mobile Payments - How is it done?
Parag Arjunwadkar
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
Vikas Kottari
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
John Paul Prassanna
 
Survey Research Methodology
Survey Research Methodology Survey Research Methodology
Survey Research Methodology
irshad narejo
 
Ppt 1
Ppt 1Ppt 1
Factors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattleFactors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattle
Dr. IRSHAD A
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
Sanjoy Suthar
 
IGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity pptIGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity ppt
Irshad Tunio
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
North Bridge
 
Survey research
Survey researchSurvey research
Survey research
Punjab University Lahore
 

Viewers also liked (20)

Towards Secure and Dependable Storage Services in Cloud Computing
Towards Secure and Dependable Storage Services in Cloud  Computing Towards Secure and Dependable Storage Services in Cloud  Computing
Towards Secure and Dependable Storage Services in Cloud Computing
 
Security issues in_mobile_payment
Security issues in_mobile_paymentSecurity issues in_mobile_payment
Security issues in_mobile_payment
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Introduction of boeing Autosaved)
Introduction of boeing Autosaved)Introduction of boeing Autosaved)
Introduction of boeing Autosaved)
 
Utilization of intestines as animal casings
Utilization of intestines as animal casingsUtilization of intestines as animal casings
Utilization of intestines as animal casings
 
Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?Cloud based payments: the future of mobile payments?
Cloud based payments: the future of mobile payments?
 
Cloud computing-security-issues
Cloud computing-security-issuesCloud computing-security-issues
Cloud computing-security-issues
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Payments Framework
Mobile Payments FrameworkMobile Payments Framework
Mobile Payments Framework
 
Mobile Payments - How is it done?
Mobile Payments - How is it done?Mobile Payments - How is it done?
Mobile Payments - How is it done?
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Mobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and SecurityMobile Cloud Computing Challenges and Security
Mobile Cloud Computing Challenges and Security
 
Survey Research Methodology
Survey Research Methodology Survey Research Methodology
Survey Research Methodology
 
Ppt 1
Ppt 1Ppt 1
Ppt 1
 
Factors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattleFactors affecting quality and quantity of milk in dairy cattle
Factors affecting quality and quantity of milk in dairy cattle
 
Mobile Banking
Mobile BankingMobile Banking
Mobile Banking
 
IGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity pptIGCSE Business Studeies Unit 1 understanding business activity ppt
IGCSE Business Studeies Unit 1 understanding business activity ppt
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
 
Survey research
Survey researchSurvey research
Survey research
 

Similar to A Novel Framework for Securing Medical Records in Cloud Computing

Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
IJERA Editor
 
Full paper
Full paperFull paper
Full paper
Harilal Punalur
 
Full paper
Full paperFull paper
Full paper
Harilal Punalur
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
IEEEGLOBALSOFTTECHNOLOGIES
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET Journal
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
ZTech Proje
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Harilal Punalur
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
IMPULSE_TECHNOLOGY
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
Editor IJCATR
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
JPINFOTECH JAYAPRAKASH
 
7
77
7
77
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecway2004
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecwayt
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
Ecwayt
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecwaytech
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
Ecwaytechnoz
 

Similar to A Novel Framework for Securing Medical Records in Cloud Computing (18)

Kg3617691773
Kg3617691773Kg3617691773
Kg3617691773
 
Full paper
Full paperFull paper
Full paper
 
Full paper
Full paperFull paper
Full paper
 
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of personal...
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...Psdot 4 scalable and secure sharing of personal health records in cloud compu...
Psdot 4 scalable and secure sharing of personal health records in cloud compu...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Scalable and secure sharing of personal health
Scalable and secure sharing of personal healthScalable and secure sharing of personal health
Scalable and secure sharing of personal health
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
7
77
7
 
7
77
7
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...Scalable and secure sharing of personal health records in cloud computing usi...
Scalable and secure sharing of personal health records in cloud computing usi...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 
Android scalable and secure sharing of personal health records in cloud comp...
Android  scalable and secure sharing of personal health records in cloud comp...Android  scalable and secure sharing of personal health records in cloud comp...
Android scalable and secure sharing of personal health records in cloud comp...
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Recently uploaded

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

A Novel Framework for Securing Medical Records in Cloud Computing

  • 1. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697 ISSN: 2249-6645 A Novel Framework for Securing Medical Records in Cloud Computing Md. Irfan1, Sayeed Yasin2 1 M. Tech, Nimra College of Engineering & Technology, Vijayawada, A.P., India. Asst. Professor, Dept.of CSE, Nimra College of Engineering & Technology, Vijayawada, A.P., India. 2 ABSTRACT: The patient health records are maintained in a data server under the cloud computing environment. A novel framework of secure sharing of personal health records (PHRs) under distributed environment in the cloud computing has been proposed in this paper .Public and personal access models are designed with privacy and security enabled mechanism. This framework addresses the unique challenges brought by multiple medical records owners and users, in that the complexity of key management is greatly reduced while guaranteeing the privacy compared with previous works. The attribute-based encryption (ABE) model is enhanced to support distributed ABE operations with MA-ABE. The system is improved to support the dynamic policy management model. Thus, PHRs are maintained with security and privacy. It is a server choice based security model and possess the central key management with attribute authorities. Keywords: Cloud computing, Data privacy, Encryption, PHR. I. INTRODUCTION Cloud computing is an emerging computing technology where applications and all the services are provided through Internet. It is a model for enabling on-demand network access to various pool resources. Cloud computing can be considered as a computing framework with greater flexibility and availability at lower cost [1]. Because of these characteristics, cloud environment has been receiving a great nowadays. Cloud computing environment services benefit from economies of scale achieved through versatile use of resources, specialization, and other efficiencies. The Internet has grown into a world of its own, and its large space now offers capabilities that could support Physicians in their duties in numerous ways. Nowadays software functions have moved from the individual user’s local hardware to a central server that operates from a remote location. In recent years, is an emerging trend and medical records is a patient-centric model of health information exchange and management. A health record is an electronic record of an individual user’s health information by which the individual controls access to the information and may have the ability to manage, track, and participate in her own health care. Generally, medical record service allows a user to create, manage, and control her personal health data in one place through the web, which has made the storage, retrieval, and sharing of the medical information more efficient. The general principles of the security rule include that a covered entity must maintain both “reasonable and appropriate” administrative, technical, and physical safeguards to protect Electronic Personal Health Information, e-PHI [2], which include requirements to ensure integrity, confidentiality and availability of information; anticipation and protection against possible vulnerabilities to the privacy of the information or against inappropriate use; and compliance by the entity’s workforce. Generally information is recorded on secured systems, hard drives, backups, flash drives, shared folders, professional networks etc. As health care professionals, physicians know that ensuring the accuracy of secret information involves more technical approaches, to avoid the security pitfalls. Privacy laws that speak to the protection of patients secrecy are complex and often difficult to understand in the context of an ever-growing cloud-based technology[3]. Due to the high cost of building and maintaining specialized data centers, many medical record services are outsourced to or provided by third-party service providers, for example, Samedi, Microsoft HealthVault and Medicine Brain. While it is exciting to have convenient medical record services for everyone, there are many security and privacy risks which could impede its wide adoption[4]. II. RELATED WORK For access control of the outsourced data, partially trusted servers are often assumed. With cryptographic methods, the aim is trying to enforce who has (read) access to which parts of a patient’s PHR documents in a fine-grained way. Symmetric key methods are a class of algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext. The keys may be identical to each other or there may be a simple transformation to go between the two keys. The keys, in practice, represent a shared secret key between two or more parties that can be used to maintain a private information link. In [5], the authors proposed a solution for securing outsourced data on semi-trusted servers based on symmetric key derivation methods, which can achieve fine-grained access control. Unfortunately, the complexities of file creation and user grant or revocation operations are linear to the number of authorized users, which is less scalable. Public key cryptosystems(PKC) based solutions were proposed due to its ability to separate write and read privileges. To realize fine-grained access control, the traditional public key encryption (PKE) based methods proposed by the authors in [6] in their work “Patient controlled encryption: ensuring privacy of electronic medical records, they purpose the solution scenario and shows how both public and symmetric based encryption used. The disadvantage of their solution is either incurs high key management overhead, or require encrypting multiple copies of a file using different users’ keys. www.ijmer.com 2695 | Page
  • 2. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697 ISSN: 2249-6645 A number of works used ABE to realize fine-grained access control for the outsourced data, especially, there has been an increasing interest in applying ABE to secure electronic healthcare records (EHRs). In [7], the authors proposed an attribute-based infrastructure for EHR systems, where each patient’s EHR files are encrypted using a broadcast variant of Cipher Text-ABE (CP-ABE). However, the encrypted text length grows linearly with the number of unrevoked users. In [8], the authors applied ciphertext policy ABE (CP-ABE) to manage the sharing of PHRs, and introduced the concept of social/professional domains but they do not use multi-authority ABE . In [9], the authors investigated using ABE to generate self-protecting EMRs, which can either be stored on cloud servers or mobile phones so that EMR could be accessed when the health provider is offline. III. PROPOSED WORK A. Patient Centric Framework The main aim of our framework (Figure 1) is to provide secure patient-centric medical record access and efficient key management at the same time. The key idea is to divide the system into several security domains (namely, public domains (PUDs) and personal domains (PSDs)) according to the different users’ data access requirements. The PUDs consist of users who make access based on their professional roles, such as nurses, doctors and medical researchers. In practice, a PUD can be mapped to an independent sector in the society, such as the government, health care or insurance sector. For each PSD, its users are personally associated with the data owner (such as family members or close friends), and they make accesses to medical records based on access rights assigned by the owner. In both types of the security domains, we utilize ABE to realize cryptographically enforced, patient-centric PHR access. Each data owner or patient is a trusted authority of her own PSD, who uses a KP-ABE system to manage the secret keys and access rights of users in her PSD. In our framework, there are multiple owners, multiple SDs, multiple AAs, and multiple users. In addition, two ABE systems are involved: for each PSD the YWRL’s revocable KP-ABE scheme is adopted; for each PUD, our proposed revocable MA-ABE scheme is used. Figure 1: Proposed Framework B. System setup and Key Distribution The system first defines a common universe of data attributes shared by every domain, such as “basic profile”, “medical history”, “allergies”, and “prescriptions”. An emergency attribute is also defined for the break glass access. There are two ways for distributing shared secret keys. First, when first using the health record service, a PHR owner can specify the access privilege of a data reader in her PSD, and let her application generate and distribute corresponding key to the latter, in a way resembling invitations in GoogleDoc. Second, a reader in domain could obtain the secret key by sending a request (indicating which types of files she wants to access) to the record owner via HSN, and the owner will grant her a subset of requested data types. In addition, the data attributes can be organized in a hierarchical manner for efficient policy generation as shown in figure 2. When the user is granted all the file types under a category, his/ her access privilege will be represented by that category instead. In practice, there exist multiple Attribute authorities (AAs) each governing a different subset of role attributes. For instance, hospital staffs shall have a different authorities from pharmacy specialists. This is reflected by (1) in Figure 1. In addition, the authorities distribute write keys that permit contributors in their PUD to write to some patients’ PHR ((2)). www.ijmer.com 2696 | Page
  • 3. www.ijmer.com International Journal of Modern Engineering Research (IJMER) Vol. 3, Issue. 5, Sep - Oct. 2013 pp-2695-2697 ISSN: 2249-6645 Figure 2: The attribute hierarchy of files C. PHR Encryption and Access The owners upload ABE-encrypted record files to the server ((3)). Each owner’s record file is encrypted both under a certain fine- grained and role-based access policy for users from the PUD to access, and under a selected set of data attributes that allows access from users in the PSD. The data contributors will be granted write access to someone’s records, if they present proper write keys ((4)). The data readers download record files from the server, and they can decrypt the files only if they have suitable attributebased keys ((5)). D. Break Glass When an emergency occurs, the regular access policies may no longer be applicable. To handle this situation, a method called break- glass access is needed to access the victim’s PHR. In our framework, each owner’s records access right is also delegated to an emergency department (ED, (6)). To prevent from abuse of break- glass option, the emergency staff needs to contact the department to verify her identity and the emergency situation, and obtain temporary read keys ((7)). E. User Revocation Here we consider revocation of a data reader or his attributes or access privileges. There are several possible cases: 1) revocation of one or more role attributes of a public domain user; 2) revocation of a public domain user which is equivalent to revoking that entire user’s attributes. These operations are done by the attribute authority that the user belongs to, where the actual computations can be delegated to the server to improve efficiency ((8)). 3) Revocation of a personal domain user’s access privileges; 4) revocation of a personal domain user. IV. CONCLUSIONS The personal health record (PHR) systems needs security against attackers and hackers. Scalable and Secure sharing includes basic securities to protect the confidential information from unauthorized access and loss. This paper proposed the new approach for existing PHR system for providing more security and privacy using attribute based encryption which plays an important role because these are unique and not easily hackable. We are reducing key management problem and also we enhance the privacy guarantee. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] Cong Wang and Kui Ren, Jin Li, “Toward Publicly Auditable Secure Cloud Data Storage Services”, IEEE Network ,pp. 19-24, July/August 2010. M. Li, S. Yu, K. Ren, and W. Lou, “Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings,” in SecureComm’10, Sept. 2010, pp. 89–106. Zhiguo Wan, Jun‟ e Liu, and Robert H. Deng, “HASBE: A Hierarchical Attribute-Based Solution for Flexible and Scalable Access Control in Cloud Computing”, IEEE Transactions on Information Forensics and Security, Vol. 7, No. 2, Pp. 743-754, April 2012. A. Vetro, H. Sun, P. DaGraca, and T. Poon, “Minimum drift architectures for three-layer scalable DTV decoding,” IEEE Trans. Consumer Electron., vol. 44, no. 3, pp. 527-536, Aug. 1998. S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati, “Over-encryption: management of access control evolution on outsourced data,” in VLDB ’07, 2007, pp. 123–134. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in CCSW ’09, 2009, pp. 103–114. S. Narayan, M. Gagn´e, and R. Safavi-Naini, “Privacy preserving ehr system using attribute-based infrastructure,” ser. CCSW ’10, 2010, pp. 47–52. L. Ibraimi, M. Petkovic, S. Nikova, P. Hartel, and W. Jonker, “Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes,” 2009. A. Akinyele, C.U. Lehmann, M.D. Green, M.W. Pagano, Z.N.J. Peterson, and A.D. Rubin. Self-protecting electronic medical records using attribute-based encryption on mobile device. Technical report, Cryptology ePrint Archive, Report 2010/565, 2010. www.ijmer.com 2697 | Page