Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e-Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts.
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
Poster presented at the XIII Brazilian Congress of Health Informatics -2012.
See: http://www.mlhim.org http://gplus.to/MLHIM and http://gplus.to/MLHIMComm for more information about semantic interoperability in healthcare.
#mlhim #semantic_interoperability #health_informatics
An innovative IoT service for medical diagnosis IJECEIAES
Due to the misdiagnose of diseases that increased recently in a scarily manner, many researchers devoted their efforts and deployed technologies to improve the medical diagnosis process and reducing the resulted risk. Accordingly, this paper proposed architecture of a cyber-medicine service for medical diagnosis, based internet of things (IoT) and cloud infrastructure (IaaS). This service offers a shared environment for medical data, and extracted knowledge and findings between patients and doctors in an interactive, secured, elastic and reliable way. It predicts the medical diagnosis and provides an appropriate treatment for the given symptoms and medical conditions based on multiple classifiers to assure high accuracy. Moreover, it entails different functionalities such as on-demand searching for scientific papers and diseases description for unrecognized combination of symptoms using web crawler to enrich the results. Where such searching results from crawler, are processed, analyzed and added to the resident knowledge base (KB) to achieve adaptability and subsidize the service predictive ability.
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
several tending organizations area unit mistreatment electronic health record EHRS area unit period, patient centered records that create data accessible instantly and firmly to approved users. so information storage becomes associate evoking interest for developing EHRS systems. this can not price an excellent deal however it additionally provides the adjustable giant space mobile access more and more required within the gift world, however, before cloud based EHRSs system will become associate beingness, problems with information security, personal details of patients and overall performance should be shown. As normal cryptography techniques for EHRSs cause hyperbolic access management and performance overhead, this paper proposes the employment of Cipher text Policy Attribute Based cryptography CPABE to encrypted information is unbroken confidential although the storage server is untrusted EHRSs supported health care suppliers credentials to decipher EHRSs it ought to contain these several attributes required for correct access . the planning and usage of cloud related EHRS system supported CP ABE area unit galvanized and bestowed, beside introductory experiments to research the flexibleness and measurability of the planned approach. Mohan Prakash | Nachappa S "Cloud Compliance with Encrypted Data – Health Records" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30773.pdf Paper Url :https://www.ijtsrd.com/computer-science/computer-security/30773/cloud-compliance-with-encrypted-data-%E2%80%93-health-records/mohan-prakash
Poster presented at the XIII Brazilian Congress of Health Informatics -2012.
See: http://www.mlhim.org http://gplus.to/MLHIM and http://gplus.to/MLHIMComm for more information about semantic interoperability in healthcare.
#mlhim #semantic_interoperability #health_informatics
An innovative IoT service for medical diagnosis IJECEIAES
Due to the misdiagnose of diseases that increased recently in a scarily manner, many researchers devoted their efforts and deployed technologies to improve the medical diagnosis process and reducing the resulted risk. Accordingly, this paper proposed architecture of a cyber-medicine service for medical diagnosis, based internet of things (IoT) and cloud infrastructure (IaaS). This service offers a shared environment for medical data, and extracted knowledge and findings between patients and doctors in an interactive, secured, elastic and reliable way. It predicts the medical diagnosis and provides an appropriate treatment for the given symptoms and medical conditions based on multiple classifiers to assure high accuracy. Moreover, it entails different functionalities such as on-demand searching for scientific papers and diseases description for unrecognized combination of symptoms using web crawler to enrich the results. Where such searching results from crawler, are processed, analyzed and added to the resident knowledge base (KB) to achieve adaptability and subsidize the service predictive ability.
Along with improvement of clouds, cloudlet and wearable devices, it becomes necessary to provide better medical information sharing over the internet. As we know, sharing medical information is very critical and challenging issue because medical information contains patient’s delicate information. The medical information sharing mainly includes collection, storage and sharing of medical information over the internet. In existing healthcare framework, patient asks health query/question which is being answered by multiple doctors. The user is provided with correct answer with the help of truth discovery method. The medical information and history of patient is directly delivered to the remote cloud. The paper proposes system to provide confidentiality of medical information and protect healthcare system from intrusion. In this proposed system, during the medical information collection stage, the Number Theory Research Unit (NTRU) algorithm is used to encrypt user’s vital signs collected various sensors. Then to protect medical information stored at remote cloud against the malicious attacks, a Collaborative Intrusion Detection System (CIDS) built on cloudlet mesh is proposed. Medical Knowledge Extraction (MKE) System is proposed to provide most reliable answer to the user’s health related query. MKE extract the medical knowledge from noisy query-answers pairs and estimate the trustworthiness degree and doctor expertise using truth discovery method.
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONijdpsjournal
There is a need of data integration in cloud – based system, we propose an Information Integration and Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health Record System need to be smart and connected, so we use informatica for the connection of data
from different database. Traditional Electronic Health Record Systems are based on different technologies, languages and Electronic Health Record Standards. Electronic Health Record System stores data based on interaction between patient and provider. There are scalable cloud infrastructures, distributed and heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This advance healthcare application will improve the integration of required data and helps in fast interaction between the patient and the service providers. Thus there is the development of smart
and connected data in healthcare application of cloud. The proposed system is developed by using cloud platform Aneka.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
Emerging Threats and Countermeasures - Digital health is the convergence of digital technology in healthcare. The emerging technology and the use of innovations are needed in healthcare for advancements and better outcomes. With the use of innovations, new threats and challenges are emerging in the industry which needs to be managed for efficient operations.
Healthcare information exchange using blockchain technologyIJECEIAES
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.
A study on significance of adopting cloud computing paradigm in healthcare se...cloud100
This is a very nice IEEE paper to get latest information on cloud computing security and privacy practices, challenges and the solution. This paper mainly discusses the significances of adopting cloud computing in healthcare sector and describes that how cloud computing can be adopted by the healthcare organization and what are the challenged for it.
Cloud Computing Stats - Cloud for HealthcareRapidScale
Security concerns are especially prevalent in the healthcare industry, and understandably so, due to its sensitive, private patient data. In the past, the industry has let innovation pass it by due to these worries, but today, the cloud is ready! As cloud security strengthens, healthcare can finally take advantage of the efficiency and cost savings of the cloud.
Here are some statistics about how cloud is affecting healthcare today.
Harnessing and securing cloud in patient health monitoringAshok Rangaswamy
Presented in International conference on Computer communications and Informatics (January 9-11, 2012) and got the paper indexed in IEEE Xplore.(link: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6158924&contentType=Conference+Publications&queryText%3DOpenCloudCare)
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
Cisco recently proposed a new computing environment called fog computing to support latencysensitive
and real time applications. It is a connection of billions of devices nearest to the
network edge. This computing will be appropriate for Electronic Medical Record (EMR)
systems that are latency-sensitive in nature. In this paper, we aim to achieve two goals: (1)
Managing and sharing Electronic Health Records (EHRs) between multiple fog nodes and
cloud, (2) Focusing on security of EHR, which contains highly confidential information. So, we
will secure access into EHR on Fog computing without effecting the performance of fog nodes.
We will cater different users based on their attributes and thus providing Attribute Based Access
Control ABAC into the EHR in fog to prevent unauthorized access. We focus on reducing the
storing and processes in fog nodes to support low capabilities of storage and computing of fog
nodes and improve its performance.
This paper aims to provide an understanding of the model and exploring options available for complementing the technology and infrastructure needs of Healthcare organizations.
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environmentneirew J
Cisco recently proposed a new computing environment called fog computing to support latency-sensitive
and real time applications. It is a connection of billions of devices nearest to the network edge. This
computing will be appropriate for Electronic Medical Record (EMR) systems that are latency-sensitive in
nature. In this paper, we aim to achieve two goals: (1) Managing and sharing Electronic Health Records
(EHRs) between multiple fog nodes and cloud, (2) Focusing on security of EHR, which contains highly
confidential information. So, we will secure access into EHR on Fog computing without effecting the
performance of fog nodes. We will cater different users based on their attributes and thus providing
Attribute Based Access Control ABAC into the EHR in fog to prevent unauthorized access. We focus on
reducing the storing and processes in fog nodes to support low capabilities of storage and computing of fog
nodes and improve its performance.
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENThiij
Cisco recently proposed a new computing environment called fog computing to support latency-sensitive
and real time applications. It is a connection of billions of devices nearest to the network edge. This
computing will be appropriate for Electronic Medical Record (EMR) systems that are latency-sensitive in
nature. In this paper, we aim to achieve two goals: (1) Managing and sharing Electronic Health Records
(EHRs) between multiple fog nodes and cloud, (2) Focusing on security of EHR, which contains highly
confidential information. So, we will secure access into EHR on Fog computing without effecting the
performance of fog nodes. We will cater different users based on their attributes and thus providing
Attribute Based Access Control ABAC into the EHR in fog to prevent unauthorized access. We focus on
reducing the storing and processes in fog nodes to support low capabilities of storage and computing of fog
nodes and improve its performance.
Along with improvement of clouds, cloudlet and wearable devices, it becomes necessary to provide better medical information sharing over the internet. As we know, sharing medical information is very critical and challenging issue because medical information contains patient’s delicate information. The medical information sharing mainly includes collection, storage and sharing of medical information over the internet. In existing healthcare framework, patient asks health query/question which is being answered by multiple doctors. The user is provided with correct answer with the help of truth discovery method. The medical information and history of patient is directly delivered to the remote cloud. The paper proposes system to provide confidentiality of medical information and protect healthcare system from intrusion. In this proposed system, during the medical information collection stage, the Number Theory Research Unit (NTRU) algorithm is used to encrypt user’s vital signs collected various sensors. Then to protect medical information stored at remote cloud against the malicious attacks, a Collaborative Intrusion Detection System (CIDS) built on cloudlet mesh is proposed. Medical Knowledge Extraction (MKE) System is proposed to provide most reliable answer to the user’s health related query. MKE extract the medical knowledge from noisy query-answers pairs and estimate the trustworthiness degree and doctor expertise using truth discovery method.
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATIONijdpsjournal
There is a need of data integration in cloud – based system, we propose an Information Integration and Informatics framework for cloud – based healthcare application. The data collected by the Electronic Health Record System need to be smart and connected, so we use informatica for the connection of data
from different database. Traditional Electronic Health Record Systems are based on different technologies, languages and Electronic Health Record Standards. Electronic Health Record System stores data based on interaction between patient and provider. There are scalable cloud infrastructures, distributed and heterogeneous healthcare systems and there is a need to develop advanced healthcare application. This advance healthcare application will improve the integration of required data and helps in fast interaction between the patient and the service providers. Thus there is the development of smart
and connected data in healthcare application of cloud. The proposed system is developed by using cloud platform Aneka.
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS ijscai
Pervasive Healthcare Monitoring System (PHMS)’ is one of the important pervasive computing
applications aimed at providing healthcare services to all the people through mobile communication
devices. Pervasive computing devices are resource constrained devices such as battery power, memory,
processing power and bandwidth. In pervasive environment data privacy is a key issue. In this
application a secured frame work is developed for receiving the patient’s medical data periodically,
updates automatically in Patient Record Database and generates a Checkup Reminder. In the present
work a light weight asymmetric algorithm proposed by the authors [26] is used for encrypting the data to
ensure data confidentiality for its users. Challenge response onetime password mechanism is applied for
authentication process
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
Emerging Threats and Countermeasures - Digital health is the convergence of digital technology in healthcare. The emerging technology and the use of innovations are needed in healthcare for advancements and better outcomes. With the use of innovations, new threats and challenges are emerging in the industry which needs to be managed for efficient operations.
Healthcare information exchange using blockchain technologyIJECEIAES
Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.
A study on significance of adopting cloud computing paradigm in healthcare se...cloud100
This is a very nice IEEE paper to get latest information on cloud computing security and privacy practices, challenges and the solution. This paper mainly discusses the significances of adopting cloud computing in healthcare sector and describes that how cloud computing can be adopted by the healthcare organization and what are the challenged for it.
Cloud Computing Stats - Cloud for HealthcareRapidScale
Security concerns are especially prevalent in the healthcare industry, and understandably so, due to its sensitive, private patient data. In the past, the industry has let innovation pass it by due to these worries, but today, the cloud is ready! As cloud security strengthens, healthcare can finally take advantage of the efficiency and cost savings of the cloud.
Here are some statistics about how cloud is affecting healthcare today.
Harnessing and securing cloud in patient health monitoringAshok Rangaswamy
Presented in International conference on Computer communications and Informatics (January 9-11, 2012) and got the paper indexed in IEEE Xplore.(link: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6158924&contentType=Conference+Publications&queryText%3DOpenCloudCare)
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETScsandit
Cisco recently proposed a new computing environment called fog computing to support latencysensitive
and real time applications. It is a connection of billions of devices nearest to the
network edge. This computing will be appropriate for Electronic Medical Record (EMR)
systems that are latency-sensitive in nature. In this paper, we aim to achieve two goals: (1)
Managing and sharing Electronic Health Records (EHRs) between multiple fog nodes and
cloud, (2) Focusing on security of EHR, which contains highly confidential information. So, we
will secure access into EHR on Fog computing without effecting the performance of fog nodes.
We will cater different users based on their attributes and thus providing Attribute Based Access
Control ABAC into the EHR in fog to prevent unauthorized access. We focus on reducing the
storing and processes in fog nodes to support low capabilities of storage and computing of fog
nodes and improve its performance.
This paper aims to provide an understanding of the model and exploring options available for complementing the technology and infrastructure needs of Healthcare organizations.
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environmentneirew J
Cisco recently proposed a new computing environment called fog computing to support latency-sensitive
and real time applications. It is a connection of billions of devices nearest to the network edge. This
computing will be appropriate for Electronic Medical Record (EMR) systems that are latency-sensitive in
nature. In this paper, we aim to achieve two goals: (1) Managing and sharing Electronic Health Records
(EHRs) between multiple fog nodes and cloud, (2) Focusing on security of EHR, which contains highly
confidential information. So, we will secure access into EHR on Fog computing without effecting the
performance of fog nodes. We will cater different users based on their attributes and thus providing
Attribute Based Access Control ABAC into the EHR in fog to prevent unauthorized access. We focus on
reducing the storing and processes in fog nodes to support low capabilities of storage and computing of fog
nodes and improve its performance.
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENThiij
Cisco recently proposed a new computing environment called fog computing to support latency-sensitive
and real time applications. It is a connection of billions of devices nearest to the network edge. This
computing will be appropriate for Electronic Medical Record (EMR) systems that are latency-sensitive in
nature. In this paper, we aim to achieve two goals: (1) Managing and sharing Electronic Health Records
(EHRs) between multiple fog nodes and cloud, (2) Focusing on security of EHR, which contains highly
confidential information. So, we will secure access into EHR on Fog computing without effecting the
performance of fog nodes. We will cater different users based on their attributes and thus providing
Attribute Based Access Control ABAC into the EHR in fog to prevent unauthorized access. We focus on
reducing the storing and processes in fog nodes to support low capabilities of storage and computing of fog
nodes and improve its performance.
Improving the Role of Universities in Conserving the Architectural HeritageIJERA Editor
Universities are known by their significant role in forming the cognitive and educational minds. This paper focused on improving the role of the universities in conserving the architectural heritage through developing an effectivefertile research system that plays a major role in building the necessary programs planned for the architectural heritage conservation. In this paper, a methodology was proposed including archeological survey a documentation of the registered and unregistered historical buildings and archeological sites planned by the local universities in order to come up yet with a reliable source for the status of those historical buildings and sites and improve the universities role in conserving the architectural heritage especially on the research and documentation part of the conservation process.
Knowledge Discovery Applied to a Database of Errors of Systems DevelopmentIJERA Editor
This paper presents the knowledge discovery process in a database related to the development of computer systems through the Apriori algorithm. This method of data mining was succesfull in discovering of patterns of relationships between kinds of non-conformities found during the software development and relationships of noncompliance with the kinds of tasks to be performed as an association between two variables "Simple" and "Average" in more than fifty percent of the cases whit tasks labeled as "Improvement". The discovered rules may assist in the decision making by development systems managers in order to reduce non-conformities related to the development of computational systems.
Application ofBoost Inverter to Multi Input PV systemIJERA Editor
With the shortage of the energy and ever increasing of the oil price, research on the renewable and green energy
sources, especially the solar arrays and the fuel cells, becomes more and more important. How to achieve high
step- up and high efficiency DC/DC converters is the major consideration in the renewable power applications
due to the low voltage of PV arrays and fuel cells. The conventional boost converters increase the harmonics
rate and add an extra stage of power conversion. This paper proposes a boost dc-ac inverter that can invert and
boost the output voltage in a single stage. In this paper the proposed boost dc-ac inverter is applied to the solar
power panels and is simulated using Simulink. The output results of the boost inverter are worthy promising.
An Overview of Workflow Management on Mobile Agent TechnologyIJERA Editor
Mobile agent workflow management/plugins is quite appropriate to handle control flows in open distributed system; basically it is the emerging technology which can bring the process oriented tasks to run as a single unit from diverse frameworks. This workflow technology offers organizations the opportunity to reshape business processes beyond the boundaries of their own organizations so that instead of static models, modern era incurring dynamic workflows which can respond the changes during its execution, provide necessary security measures, great degree of adaptivity, troubleshoot the running processes and recovery of lost states through fault tolerance. The prototype that we are planning to design makes sure to hold reliability, security, robustness, scalability without being forced to make tradeoffs the performance. This paper is concerned with design, implementation and evaluation of performance on the improved methods of proposed prototype models based on current research in this domain.
Energy Wastage Estimation of a Cold StorageIJERA Editor
Energy consumption of a cold storage was measured for different storage temperatures. Suction temperature and
pressure temperature of the compressor and working time of the compressor were determined to reach
evaporator setup temperatures. An axial fan located back of the evaporator was used to distribute the cooled air
into the cold store. An electrical heater was used to defrost. The compressor suction temperature of ammonia
vapour variedbetween273K–271Kand 305K–308K respectively. Compressor suction pressure(p1)=3.5 Kg/cm
2
and discharge pressure (p2)=10.5Kg/cm2
Permeability Evaluation in Pilaspi (M. Eocene - U. Eocene) FormationIJERA Editor
Studying the permeability in a particular formation will be our address in this paper, through collection of a set of data in relates to the past real core analyses by the oil operators and correlating them to our lab works on the samples of the same formation from Pilaspi formation (M.EOCENE - U.EOCENE) outcrop on Haibat Sultan Mountain near Taq Taq oil Field. Lab works were done in Koya University using most of reservoir lab equipments for getting and determining the most important properties like porosity and permeability on plug samples of that formation. The key study in this paper is oil well TT-02 in Taq Taq oil field. In this paper we will try to nominate and recognize the more active porosity type through measuring air and liquid permeability in our reservoir lab and show the effects of increasing flowing pressure on the permeability using saturated and dry core plug. Water and air were used as flowing fluids and two methods were used to measure the permeability; steady-state method, measures the permeability of a saturated Core plug under constant flow rate conditions and air permeability with (N2) for dry core plug.
A Mathematical Model to Solve Nonlinear Initial and Boundary Value Problems b...IJERA Editor
In this paper, a novel method called Laplace-differential transform method (LDTM) is used to obtain an
approximate analytical solution for strong nonlinear initial and boundary value problems associated in
engineering phenomena. It is determined that the method works very well for the wide range of parameters and
an excellent agreement is demonstrated and discussed between the approximate solution and the exact one in
three examples. The most significant features of this method are its capability of handling non-linear boundary
value problems.
Cloud computing is an on demand service in which shared resources, information, software and other devices are provided to the end user as per their requirement at a specific time. A cloud consists of several elements such as clients, datacenters and distributed servers. There are n number of clients and end users involved in cloud environment. These clients may make requests to the cloud system simultaneously, making it difficult for the cloud to manage the entire load at a time. The load can be CPU load, memory load, delay or network load. This might cause inconvenience to the clients as there may be delay in the response time or it might affect the performance and efficiency of the cloud environment. So, the concept of load balancing is very important in cloud computing to improve the efficiency of the cloud. Good load balancing makes cloud computing more efficient and improves user satisfaction. This paper gives an approach to balance the incoming load in cloud environment by making partitions of the public cloud.
Feature Selection Method For Single Target Tracking Based On Object Interacti...IJERA Editor
For single-target tracking problem Kernel-based method has been proved to be effective. A tracker which takes advantage of contextual information to incorporate general constraints on the shape and motion of objects will usually perform better when compare to the one that does not exploit this information. This is due to the reason that a tracker designed to give the best average performance in a variety of scenarios can be less accurate for a particular scene than a tracker that is attuned (by exploiting context) to the characteristics of that scene. The use of a particular feature set for tracking will also greatly affect the performance. Generally, the features that best discriminate between multiple objects and, between the object and background are also best for tracking the object.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A Study on Mechanical Properties of Vinylester Based BioComposite Material wi...IJERA Editor
In composites a conglomeration produces material properties which are unavailable from individual constituent
materials. The use of petroleum based products as constituents in polymer matrix composite has raised concerns
regarding environmental issue and non-renewability of the resource. Therefore in this work an attempt has been
made to develop a biocomposite material using untreated dupion silk fiber as reinforcement material and vinyl
ester as matrix material with Potato Starch used as filler material by hand layup technique.
The biocomposites were prepared in varying percentage of filler addition (0%, 10%, 20%, and 30%) and
different mechanical tests (tensile, flexure and hardness) were conducted on the samples prepared to the ASTM
standards.
From the results of the experiments conducted on the specimen it can be concluded that the performance of 10%
Starch filler content Biocomposite is satisfactory in all aspects compared to 0%, 20%, and 30% Starch filler
content Biocomposites.
A Survey on Decentralized e-health record with health insurance synchronizationIJAEMSJORNAL
In the medical field, electronic health records (EHR) serve a critical function that benefits both healthcare providers and patients. Many cloud-based solutions for medical record exchange have been offered, but the credibility of a third-party cloud service is questioned due to the centralized approach. As a result, a decentralized blockchain system for sharing electronic health records has been established that does not rely on third-party services. Existing services, on the other hand, exclusively collect data from medical tests. They are ineffective at sharing data streams that are continuously created by various sorts of devices. The information gathered is shared with laboratories and medical institutions for future research. Furthermore, current techniques are too rigid to accommodate metadata modification effectively. Decenrod proposes a medical data-sharing scheme that combines blockchain, electronic health records, and a structured peer-to-peer network based on InterPlanetary File System (IPFS) techniques to address the above efficiency issues in existing medical data-sharing and storage services. A session-based healthcare data-sharing strategy has been designed, according to Decenrod, which allows for more flexibility in data sharing. According to the evaluation results, Decenrod can improve efficiency and meet security criteria in data exchange by implementing Decentralized EHR. The information gathered is shared with laboratories and medical institutions for future research.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
The International Journal of Pharmacetical Sciences Letters (IJPSL) is an international online journal in English published everyday. The aim of this is to publish peer reviewed research and review articles without delay in the developing field of engineering and science Research.
This is particularly the case on e Health monitoring applications for chronic patients, Where Patients
monitoring refers to a continuous observation of patient’s condition (physiological and physical) traditionally
performed by one or several body sensors. The architecture for this system is based on medical sensors which
measure patients’ physical parameters by using wireless sensor networks (WSNs). These sensors transfer data
from patients’ bodies over the wireless network to the cloud environment. The system is aimed to prevent delays
in the arrival of patients’ medical information to the healthcare providers, Therefore, patients will have a high
quality services because the e heath smart system supports medical staff by providing real-time data gathering,
eliminating manual data collection, enabling the monitoring of huge numbers of patients. We underline the
necessity of the analysis of data quality on e-Health applications, especially concerning remote monitoring and
assistance of patients with chronic diseases.
An Data Center Solution Architecture Architecture For Advanced Healthcare Mon...ijceronline
Electronic Health Record (EHR) is a digital record shared across different healthcare settings, by network-connected enterprise-wide information systems called EHR systems. Cloud computing paradigm is one of the popular Health Information Technology infrastructures for facilitating Electronic Health Record (EHR) sharing and EHR integration. Healthcare clouds offer new possibilities, such as easy and ubiquitous access to medical data, and opportunities for new business models. However, they also bear new risks and raise challenges with respect to security and privacy aspects. The global economic crisis has affected the health sector. The costs of healthcare services rise and healthcare professionals are becoming scarce and hard to find, it is imminent that healthcare organizations consider adopting health information technology (HIT) systems. Healthcare professionals must have all the information they require to make prompt patient-care decisions. The growing of mobility connections, people can access all the resources hosted in the cloud any time using any device. The adoption of Cloud Computing in healthcare system for delivering health information and services, driven by the fact that healthcare services in Jordan are almost provided manually from tools to technologies, the growth of inhabitants and refugees crisis, healthcare stakeholders ICT consciousness, and the technical challenges and delays faces the implementation e-Healthcare system. The different problems concerning the managerial, administrative and management aspects, to the concern of physician or researcher, that necessities the infrastructure to process, store, manage patient data, analysis, diagnosis, and so on. Cloud computing is a significant alternative to solve many of these problems providing several advantages in terms of resource management and computational capabilities. In this paper we propose a national cloud computing data centers architecture solution to host healthcare system services computing resources components, proposing building a national e-health cloud environment to overcome many of the challenges confronting the success of Hakeem the core of the National e-Health System (NHS) for the provision of e-Health as a Service.
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A framework for secure healthcare systems based on big data analytics in mobi...ijasa
In this paper we introduce a framework for Healthcare Information Systems (HISs) based on big data
analytics in mobile cloud computing environments. This framework provides a high level of integration,
interoperability, availability and sharing of healthcare data among healthcare providers, patients, and
practitioners. Electronic Medical Records (EMRs) of patients dispersed among different Care Delivery
Organizations (CDOs) are integrated and stored in the Cloud storage area, this creates an Electronic
Health Records (EHRs) for each patient. Mobile Cloud allows fast Internet access and provision of EHRs
from anywhere and at any time via different platforms. Due to the massive size of healthcare data, the
exponential increase in the speed in which this data is generated and the complexity of healthcare data
type, the proposed framework employs big data analytics to find useful insights that help practitioners take
critical decisions in the right time. In addition, our proposed framework applies a set of security
constraints and access control that guarantee integrity, confidentiality, and privacy of medical information.
We believe that the proposed framework paves the way for a new generation of lower cost, more efficient
healthcare systems.
Role of Cloud Computing in Healthcare Systemsijtsrd
The healthcare industry is complex because it is so vast in terms of the processes involved and the amount of private and sensitive information it needs to deal with. The industry’s complexity often leads to two major challenges - increased operational cost including data storage cost and difficulty in building a self sufficient health ecosystem. Technology has always been the savior that workaround for overcoming major healthcare industry challenges. One such technology is cloud computing. It has been in use in the healthcare industry for several years and continuously evolving with industry changes. Cloud computing is transforming the healthcare industry at different levels with features like collaboration, scalability, reach ability, efficiency, and security.The on demand computing feature of the cloud adds value, especially when healthcare institutes and care providers need to deploy, access and handle network information at the drop of a hat. With the rise in demand for data based security, there needs to be a shift in the creation, usage, better storage, collaboration, and sharing of healthcare data techniques. It is where cloud computing leaves no stone unturned Healthcare is one such sector that has been at the forefront of adopting cloud technology. Healthcare providers are coming to realize the true potential of cloud solutions across the globe.According to the BBC research report, estimated global spending by stakeholders in the industry on cloud computing is expected to be around 35 billion dollars by 2022. It is anticipated that the CAGR of cloud services and solutions will maintain a trajectory of 15 rise and the size of the Cloud powered healthcare market is to be around 55 billion dollars by the year 2025. Nidhi Prasad | Mahima Chaurasia "Role of Cloud Computing in Healthcare Systems" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49488.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/49488/role-of-cloud-computing-in-healthcare-systems/nidhi-prasad
Cloud computing in healthcare industry.pdfMobibizIndia1
Electronic Medical Records or EMR is a mandate that leverages businesses to welcome cloud-based solutions for securing and storing a high volume of patient data. The good part is that cloud solutions cannot don't need to replace the existing data to incorporate new data into the cell.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
block diagram and signal flow graph representation
A Proposed Security Architecture for Establishing Privacy Domains in Systems of E-Health Cloud
1. Al-Khanjari, Z et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.66-72
www.ijera.com 66 | P a g e
A Proposed Security Architecture for Establishing Privacy Domains in Systems of E-Health Cloud Al-Khanjari, Z., Al-Ani, A., Al-Hermizy, S. Department of Computer Science, College of Science, Sultan Qaboos University, Sultanate of Oman ABSTRACT Information and communication technology (ICT) are becoming a natural part in healthcare. Instead of keeping patient information inside a written file, you can find all information stored in an organized database as well defined files using a specific system in almost every hospital. But those files sometimes got lost or information was split up in files in different hospitals or different departments so no one could see the whole picture from this point we come up with our idea. One of this paper targets is to keep that information available on the cloud so doctors and nurses can have an access to patient record everywhere, so patient history will be clear which helps doctors in giving the right decision. We present security architecture for establishing privacy domains in e- Health bases. In this case, we will improve the availability of medical data and provide the ability for patients to moderate their medical data. Moreover, e-Health system in cloud computing has more than one component to be attacked. The other target of this paper is to distinguish between different kinds of attackers and we point out several shortcomings of current e-Health solutions and standards, particularly they do not address the client platform security, which is a crucial aspect for the overall security of systems in cloud. To fill this gap, we present security architecture for establishing privacy domains in e-Health infrastructures. Our solution provides client platform security and appropriately combines this with network security concepts. Keywords- ICT; Healthcare; e-Health; Database; Cloud Computing; Security; Curious Person;
I. INTRODUCTION
In the past, information about patients, the illnesses they have had, when they had operations and what medicines they took was written down and kept in files inside hospitals where they have been treated. The problem was that files got lost in different hospitals and doctors cannot get a clear picture about patient’s history.
Information systems are now being updated to help to improve healthcare services for all patients. This is to make sure that doctors, nurses and other health professionals have the information that is important to help them to make the best decisions about the patient, their illness and their treatment [7]. Hans and colleagues [1] explored the point out several shortcomings of current e-Health solutions and standards; particularly they do not address the client platform security, which is a crucial aspect for the overall security of e-Health systems. The solution provides client platform security and appropriately combines this with network security concepts. Moreover, Hans and colleagues further discuss open problems and research challenges on security, privacy and usability of e-Health Cloud systems. Henry and colleagues [2] described the presentation of a patient assessment tool compliant with European standards (CEN EN13606, TS14796), and using terminologies describing patient outcomes (C- HOBIC) and nursing practices (ICNP). The demonstration includes the capture of data from assessment forms, and the generation of data views specific to the interests of health service providers and the patient. Barua and Liang [3] proposed an Efficient and a Secure Patient-centric Access Control (ESPAC) scheme which allows data requesters to have different access privileges based on their roles, and then assigns different attribute sets to them. Extensive security and performance analyses demonstrate that the ESPAC scheme is able to achieve desired security requirements with acceptable communication delay. Gunter and Terry [4] designed a system to represent data that accurately captures the state of the patient at all times. It allows for an entire patient history to be viewed without the need to track down the patient’s previous medical record volume and assists in ensuring data is accurate, appropriate and legal. It reduces the chances of data replication as there is only one modifiable file, which means that the file is constantly up to date when viewed at a later date and eliminates the issue of lost forms or paperwork. Due to all the information being in a single file, it makes it much more effective when extracting medical data for the examination of possible trends and long term changes in the patient. Marcio and colleagues [9] presented ClinMalDB, a database system that integrates clinical histories of malaria patients, samples obtained from them, and sequence information of coding genes and includes the technical description of the database, the parameters used to evaluate clinical data of patients, a
RESEARCH ARTICLE OPEN ACCESS
2. Al-Khanjari, Z et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.66-72
www.ijera.com 67 | P a g e
pre-annotation sequence analysis pipeline service of virulent subtelomeric genes, cube views of the current database, a web-based structure for access and update and an interactive page to illustrate sequence search based on clinical data. The proposed architecture is based on the project of modularization, which divide the whole database into four system levels. Zhang and colleagues [10] identified a set of security requirements for e-Health application Clouds and proposed a novel security model. This model is mainly designed for the sharing of Electronic Health Records (EHR), while the DACAR platform aims to support the development, integration and large scale deployment of a wider range of e-Health services. Kilic and colleagues [11] proposed to share EHRs among multiple e-Health communities over a peer-to- peer network. A super-peer is used to represent an e- Health community, which is responsible for routing messages and adapting different meta data vocabularies used by different communities. This super-peer design is similar to a Single Point of Contact (SPoC) of the DACAR platform, yet a SPoC provides more authentication and authorisation functionalities. For a patient-centric e-Health platform it is crucial to obtain various patients’ consents in an electronic way. This paper proposes a security architecture for establishing privacy domains in e-Health infrastructures. The paper will discuss security aspects that need to be taken into consideration in the context of e-Health system in cloud computing and provide a rigorous security analysis. Moreover, the paper discusses new methods that can be applied to e- Health systems to counteract the identified threats and thus to establish a very high level of security. The proposal of personal health system is a digital collection of all pertinent medical data of a person that is under control of the subject of care an individual. These data is either entered by the individual or contributed by other information systems. The system proposal could be used to improve the availability of medical data and to provide a comfortable possibility for patients to moderate their medical data. Moderation comprises not only the management of medical data but also the task of granting access to medical data to other parties.
The rest of the paper is organized as follows: Section 2 explains the model of the e-Health Cloud and its relation to medicine, healthcare and information technology and what types of the cloud Service Models and the deployment model for a cloud computing and what the characteristics of e- Health. Section 3 discusses about the Electronic Health Record (EHR) and the difference between the terms EHR, EPR (Electronic Patient Record) and EMR (Electronic Medical Record) and the Benefits of EHR in cloud computing and what the barriers and challenges of e-Health Cloud and the stages of e- Health Cloud. Section 4 describes the purpose of the development of e-Health system in cloud computing and also explains the different types of attacks in cloud computing and the Enhanced Security Properties of e-Health Cloud and the privacy domains for e-Health. Section 5 provides concluding remarks of the work.
II. MODEL OF THE E-HEALTH CLOUD
Everyone is talking about cloud computing today, but not everyone mean the same thing when they do. While there is this general idea behind the cloud – that applications or other business functions exist somewhere away from the business itself – there are many iterations that companies are looking for in order to actually use the technology. Cloud computing offers a variety of ways for businesses to increase their IT capacity or functionality without having to add infrastructure, personnel, and software in their business. Also, cloud computing is available 24/7, which allows people to work when they want to, not restricting them to office hours only [15]. 2.1 SERVICE MODELS According to the different types of services offered, cloud computing can be considered to consist of three layers [12]:
CLOUD SOFTWARE-AS-A-SERVICE (SAAS): This provides the use of applications running on the cloud provider’s infrastructure. These services can be accessed from any heterogeneous system or any interface. These services may be defined with exception of limited user specific usage.
PRODUCT-AS-A-SERVICE (PAAS): This provides development platform for the user to develop applications using the tools provided by the PaaS provider.
CLOUD INFRASTRUCTURE-AS-A-SERVICE (IAAS): This provides the consumer the capability to provision processing, storage, networks, and other fundamental computing resources. This way enables the consumer to deploy and run arbitrary software, which can include operating systems and applications [13, 14].
2.2 DEPLOYMENT MODELS Each company chooses a deployment model for azcloud computing solution based on their specific business, operational, and technical requirements. There are four primary cloud deployment models listed as follows:
Public Cloud: This is the deployment model that is most commonly described as cloud computing. In this model, all of the physical
3. Al-Khanjari, Z et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.66-72
www.ijera.com 68 | P a g e
resources are owned and operated by a third party cloud computing provider.
Private Cloud: This model describes computer services that are delivered to a single organization.
Community Cloud: This model contains features of both the public and the private cloud models.
Hybrid Cloud: This model employs aspects of all other cloud models and it is the most commonly found cloud deployment model used within large organizations [16].
2.3 E-HEALTH CHARACTERISTICS E-Health Cloud computing exhibits the following key characteristics [17]:
Improves users' ability to re-provision technological infrastructure resources.
Offers Application Programming Interface (API) accessibility to software that enables machines to interact with cloud software in the same way as the user interface facilitates interaction between humans and computers.
Claims the reduction of the computing cost, since in a public cloud delivery model capital expenditure is converted to operational expenditure.
Provides device and location independence. This enables users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone).
Uses virtualization technology that allows servers and storage devices to be shared and utilization to be increased. Applications can easily be migrated from one physical server to another.
2.4 E-HEALTH SERVICES This term parenthesizes range of services or a system that has relation to medicine, healthcare and information technology, including [5]:
Electronic Health Records: enable the communication of patient data between different healthcare professionals (GPs, specialists etc.);
E-Prescribing: enable access to prescribing options, printing prescriptions to patients and sometimes electronic transmission of prescriptions from doctors to pharmacists;
Telemedicine: provide physical and psychological treatments at a distance, including telemonitoring of patients functions;
Consumer health Informatics: use of electronic resources on medical topics by healthy individuals or patients;
Health knowledge Management: access to knowledge, information, experience and best practice in health and social care, overview of
latest medical journals, best practice guidelines or epidemiological tracking;
Virtual Healthcare Teams: consist of healthcare professionals who collaborate and share information on patients through digital equipment;
M-Health: include the use of mobile devices in collecting aggregate and patient level health data, providing healthcare information to practitioners, researchers, and patients, real-time monitoring of patient vitals, and direct provision of care (via mobile telemedicine);
Medical Research Using Grids: provide powerful computing and data management capabilities to handle large amounts of heterogeneous data;
Healthcare Information Systems: offer software solutions for appointment scheduling, patient data management, work schedule management and other administrative tasks surrounding health.
III. ELECTRONIC HEALTH RECORD (EHR)
An electronic health record (EHR) is a digital version of a patient’s paper chart. EHRs are real- time, patient-centered records that make information available instantly and securely to authorized users. Digitized health information systems are expected to improve efficiency and quality of care and, ultimately, reduce costs. The EHR typically includes:
Contact information.
Information about visits to health care professionals.
Allergies.
Insurance information.
Family history.
Immunization status.
Information about any conditions or diseases.
A list of medications.
Records of hospitalization.
Information about any surgeries or procedures performed.
3.1 BENEFITS OF EHR
The ability to automatically share and update information among different offices and organizations.
More efficient storage and retrieval.
The ability to share multimedia information, such as medical imaging results, among locations.
The ability to link records to sources of relevant and current research.
Easier standardization of services and patient care.
Provision of decision support systems (DSS) for healthcare professionals.
4. Al-Khanjari, Z et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.66-72
www.ijera.com 69 | P a g e
Less redundancy of effort.
Lower cost to the medical system once implementation is complete.
Although differences between the terms EHR, EPR and EMR can be defined, they are often used interchangeably. The EMR can, for example, be defined as the patient record created in hospitals and ambulatory environments. It can serve as a data source for the EHR. It is important to note that an EHR is generated and maintained within an institution. These institutions could be a hospital, integrated delivery network, clinic, or physician office. They are used to give patients, physicians and other health care providers, employers, and payers the ability to access patient's medical records across facilities. In modern parlance, a personal health record (PHR) is generally defined as an EHR that the individual patient controls [6]. Health data are very sensitive and need to be protected against misuse by unauthorized persons. Additionally, services which provide online access to health data are even more attractive to attackers. An electronic health record (EHR) is an evolving concept defined as a systematic collection of electronic health information about individual patients or populations. It is a record in digital format that is theoretically capable of being shared across different health care settings. In some cases this sharing can be afforded by network- connect enterprise-wide information systems and other information networks or exchanges. EHRs may include a range of data, including demographics, medical history, medication and allergies, immunization status, laboratory test results, radiology images, vital signs, personal statistics like age and weight, and billing information [4]. 3.2 BARRIERS AND CHALLENGES OF E- HEALTH CLOUD According to case studies from different countries, there are many challenges and issues that need to be addressed for a successful implementation of e-Health Cloud. Security and privacy of information are other serious technical challenges. Challenges are identified as follows [18]: • IT Infrastructural weakness plus Lack of qualified personnel and training courses. • Lack of knowledge about the e-Health program. • Lack of security and privacy of information plus Lack of strategic plans. • Lack of policy and regulation for e-usage and Lack of partnership and collaboration. • Resistance to change to e-Health Cloud Systems as well as the shortage of financial resources. 3.3 STAGES OF E-HEALTH CLOUD
In order to accomplish e-Health Cloud initiatives, there must be a phased approach applied to the infrastructure Development which transforms an initial e-Health Cloud initiative into final desired service. The following are the four stages of e-Health Cloud, which in most cases follow each other [19]. • Present the work on the Web: The first stage on any e-Health Cloud is marked by its presence on the web which acts as a common place for distributing information to the public. It is the most basic part of any e-Health Cloud system and has limited capabilities. • Interact with Citizen and Governments: The second stage is marked by the presence of an interactive web interface where some kinds of communication occur between government and its citizens through the web. • Complete Transaction over Web: The stage involves transaction between a citizen and government being completed over the internet. • Integrate Services: This is the highest level of any e-Health Cloud where technology is utilized to its full potential [20].
IV. E-HEALTH SYSTEM IN CLOUD COMPUTING
First of all we will discuss the components of the e-Health system in cloud computing that can be attacked such as the e-Health Cloud system, the communication channel and the patient’s client (see Fig. 1).
figure 1 attackers in context of e-health cloud system We distinguish between three different kinds of attackers: 1. Internal attackers: who have authorized access to network resources [8], e.g. operators of the system or medical staff, conduct attacks mainly against the e-Health system; these attacks are solely prevented by means of organizational measures when designing security concepts of e- Health systems in cloud computing.
2. External adversaries: they are usually considered when discussing security in context of e-Health systems. These adversaries can either behave
5. Al-Khanjari, Z et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.66-72
www.ijera.com 70 | P a g e
actively, e.g. hackers, or passively, e.g. eavesdroppers. In contrast, to passive adversaries, who are only wiretapping the communication channel, active adversaries also manipulate transferred and stored data. It must be pointed out that, in general, it is easier for an insider to get unauthorized access to medical data than for an external adversary. Consequently, in order to establish a reliable security concept for an e-Health system in cloud computing, insider attacks need to be taken into consideration as carefully as external attacks. 3. Curious Person: this is introduced as a third kind of adversaries which has not been considered in architectures for e-Health system in cloud computing until now. These attackers will be denoted as “curious persons” in this paper. A person who is trying to attack the e-Health system in cloud computing is an “attacker” who tries to obtain medical information about a person by influencing this person to present the medical data on their own. The relevance of attacks conducted by curious persons cannot be evaluated seriously. However, in our opinion this attack needs to be taken into consideration, since it cannot be excluded. This attack can be achieved by means of more or less sophisticated methods. The former methods mainly comprise methods from social engineering, e.g. a curious person may convince a patient to hand out his login credentials to him. These attacks can only be prevented by raising awareness during security trainings. It must be noted that technical measures cannot be used to counter these attacks, since the attacked person does not perceive the situation as an attack. Having identified security threats in e-Health system based on the security analysis in cloud computing, it is possible to define security properties which counter these threats. Thereby, we distinguish between basic and enhanced security properties. The basic security properties are those which are well known from standard security books on information systems and computer security. These comprise authentication and authorization, availability, confidentiality and integrity of data and are absolutely necessary in context of e-Health systems. However, it must be emphasized that these properties mainly protected against external adversaries but marginally against internal ones and not at all against curious persons. Therefore, it is inevitable to define enhanced properties to increase the level of security regarding the latter two groups of adversaries. 4.1 ENHANCED SECURITY PROPERTIES OF E-HEALTH CLOUD These comprise anonymity, deniability and unlink ability. We will briefly discuss these properties.
1. Anonymity: Frequently referred to as "buffer overruns," .This type of attack seeks to connect anonymously to a service and then elevate the attacker's privileges on the system to that of a valid user or an administrator. This type of attack exploits a weakness in the server code allowing attackers to execute arbitrary code that they've sent to the service. The code elevates their privileges and allows them to gain direct access [21]. Anonymity is often referred to as the property of being not identified with respect to a set of actions inside a group of people, the so called anonymity set. Intuitively the degree of anonymity is the higher, the larger the anonymity set is and the more uniformly the actions are distributed within this set. Considering an e-Health Cloud system we can define anonymity at three different levels. 1.1 Anonymous communication: This type is guaranteed, if an observer is not able to determine a communication relationship between two communicating parties by means of information revealed by the communication channel. 1.2 Sender-receiver anonymity: A communication relationship between a sender and receiver provides sender-anonymity, if the receiver is not able to identify the sender by means of received messages. 1.3 Data anonymity: A system provides data anonymity, if data stored in the system of the receiver and related to a specific sender cannot be linked to the sender by the receiver and any other person. 2. Deniability: In context of medical data the term deniability means that an adversary is not able to prove the existence of medical data related to a specific person. This means that a patient can plausibly deny the existence of any medical data of his PHR and even internal adversaries are not able to figure out the existence of patient’s data. For instance, a patient can hide highly compromising information from a curious person who conducts a disclosure attack [22]. 3. Unlinkability: Unlinkability of items of interest means that relations between items, where a priori exist, cannot be identified through pure observation of the system. A system containing n users provides perfect unlink ability, if the relation of an object and a user exists with probability p =1/n for all objects. Hence, an insider of the system cannot gain any information on links between users and objects by means of solely observing the system [22]. 4.2 PRIVACY DOMAINS FOR E-HEALTH
In the context of e-Health, privacy protection of the patients' data is a primary concern. Technological solutions should be employed to support legal and contractual regulations. We propose to construct
6. Al-Khanjari, Z et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.66-72
www.ijera.com 71 | P a g e
privacy domains for the patients' medical data as a technical measure to support the enforcement of privacy and data protection policies: Systems (e.g., a client PC) must be able to partition execution environments for applications into separate domains that are isolated from each other. Data is kept within a privacy domain, and the domain infrastructure ensures that only authorized entities can join this domain. Moreover, data leakage from the domain is prevented by the security architecture and the domain infrastructure. Therefore, the same system can be used for different work flows that are strictly isolated. Fig. 2, illustrates the privacy domains applied to our e-Health Cloud model.
figure 2: Privacy Domains in the E-Health Cloud
V. CONCLUSION
The traditional healthcare model is changing significantly driven by an aging population, funding constraints, greater demand for care and a greater awareness of medical errors. The industry will increasingly turn to ICT to meet these challenges. By using the cloud computing technology in a healthcare the industry may considerably improve the access to information, which can be done faster and easier. The scalability, that is the key of the cloud computing, can offer more resources needed for certain operation at any time. The collaboration between healthcare units is an opportunity offered by cloud computing for healthcare staff. This technology can be used to check the availability of a physician, a medical specialist, a product or a service at different times and in different cases. In this paper, we have provided a security analysis of e-Health systems in cloud computing. We have introduced enhanced security properties for e-Health systems.They could enable the e-Health care services provider to reduce maintenance cost by moving data to cloud storage which provides anytime, anywhere access to patient information. We discussed methods to realize them. In our opinion these enhanced properties are of enormous relevance when realizing a reliable e- Health Cloud system. Currently, we are investigating how to efficiently integrate the proposed methods into existing approaches and we are developing more efficient solutions for anonymous authentication and unlinkability. REFERENCES [1] Hans, L., Sadeghi, A., & Winandy, M. Securing the E-Health Cloud. 1st ACM International Health Informatics Symposium. 2010. [2] Camous, F., Duignan, F., & Henry, P. An Ehrcom-Compliant Assessment tool for Community Nursing in Ireland. IADIS International Conference e-Health, 2009. [3] Barua, M., Liang, X. Enabling Security and Patient-centric Access Control for eHealth in cloud computing. Int. J. Security and Networks, Vol.1 IEEE INFOCOM’11- SCNC, 2011. [4] Gunter, D., & Terry, Nicolas P. The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions. Journal of Medical Internet Research 7 (1), 2005. [5] Fingberg, J. & Hansen, M. Integrating Data Custodians in eHealth Grids – Security and Privacy Aspects, 2006. [6] Habib, J. L. EHRs, meaningful use, and a model EMR. Drug Benefit Trends 22 (4): 99–101, 2010. [7] ICT for Health, Information Communication Technology, Newsletter June 2012. [8] Al-Khanjari, Z., Alanee, A., Kraiem, N. & Jamoussi, Y. Proposing a Real Time Internal Intrusion Detection System towards a Secured Development of E-Government Web Site. European Scientific Journal Vol.3, 2013. [9] Marcio, K., Emilio, F., Merino, C. , & Gerhard, W. A clinical field research oriented relational database to study of human malaria, IADIS International Conference e-Health, Algarve, Portugal, 2009. [10] Zhang, R. & Liu, L. Security Models and Requirements for Healthcare Application Clouds, IEEE, pp. 268–275, 2010. [11] Kilic, O., Dogac, A. & Eichelberg, M. Providing Interoperability of eHealth Communities Through Peer-to-Peer Networks, IEEE TITB, 14(3), pp. 846– 853,2010.
[12] Goce, G. & Vladimir, T. Security and Privacy Issues and Requirements for Healthcare Cloud Computing, ICT
7. Al-Khanjari, Z et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.66-72
www.ijera.com 72 | P a g e
Innovations 2012 Web Proceedings ISSN 1857-7288, 2013. [13] Ravij, K., Nishant, S. & Sutaria, K. Ameliorate Security Policy Using Mediated RSA and Identity Based Cryptography in Cloud Computing , Journal of information, knowledge and research in computer engineering, 2, ISSN: 0975 – 6760, pp. 389, October, 2013. [14] Singh, H. & Bansal, B. Analysis of security issues and performance enhancement in cloud Computing, International Journal of Information Technology and Knowledge Management, 2(2), pp. 345-349, December, 2010. [15] Malpani, G. Cloud Computing: Key to Business Fitness, Paripex - Indian Journal of Research, 3(4), ISSN - 2250-1991, May, 2013. [16] Khaja, S., Khamruddin, M. & Krishna, K. An Overview of Data Security in Cloud Computing, International Journal of Advances in Computer, Electrical and Electronics Engineering, 2, ISSN: 2248- 9584, December, 2012. [17] Steve, G. Cloud Computing, Oxford University, England, International journal of Innovative Research in Engineering and Science, 1(1), ISSN 2319-5665, July, 2013. [18] Nugi Nkwe, E-Government: Challenges and Opportunities in Botswana Department of Accounting and Finance University of Botswana Gaborone, Botswana International Journal of Humanities and Social Science 2(17); September 2012. [19] Beji, S., Jamoussi, Y. & El Kadhi, N. : Towards context-awareness security for mobile applications, The International Conference on Service, Security and its Data management technologies in Ubi-com, IEEE, China, October 2010. [20] Sami M. Alhomod and Mohd Mudasir Shafi: Best Practices in E government: A review of Some Innovative Models Proposed in Different Countries International Journal of Electrical & Computer Sciences 12(1), 2012. [21] Al-Ani, A. Real Time Internal Intrusion Detection in Web Site, Congress of Scientific Research Outlook in the Arab World “Scientific Innovation and Sustained Development, 2008. [22] Slamanig, D. & Stingl, S., Sophisticated Methods To Prevent Insider Attacks Against Phr Systems, Iadis International Conference e-Health, 2009.