SlideShare a Scribd company logo
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 292
Personal Health Record over
Encrypted Data Using Cloud Service
Dinesh Soni1, Dr. Lakshmi JVN2
1Master of Computer Application, 2Associate Professor,
1,2Jain University, Bengaluru, Karnataka, India
ABSTRACT
CBPHR- Cloud Based Personal Health Recordsystemsare usedforstorageand
management of patient records. Cloud computing provides real time health
care data in a convenient and cost effective manner. Due to the lack of
visibility in cloud platform, the users are always concerned with data privacy
and security. This is the main obstacle in widely adopting CBPHR systems in
health care sector. The paper is discussing a cloud based patienthealthrecord
management scheme which is highly secured. In this approach, indexes are
encrypted under differentsymmetrickeysandalsotheencrypteddata indexes
from various data providers can be mergebycloudwithoutknowingtheindex
content. It also provides efficient and privacy preserving query processing
using a single data query submitted by the data user. Encrypted data will be
processed by cloud from all related data providers without knowing its query
content.
KEYWORDS: CBPHR, Access Controls, Encryption, Trapdoor Key, File Key
How to cite this paper: Dinesh Soni | Dr.
Lakshmi JVN "Personal Health Record
over Encrypted Data Using Cloud Service"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-5 |
Issue-4, June 2021,
pp.292-294, URL:
www.ijtsrd.com/papers/ijtsrd41230.pdf
Copyright © 2021 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by/4.0)
I. INTRODUCTION
There has been a massive adoptionofcloudcomputingin the
generation, storage, manipulation and sharing of data. The
same happens in healthcare sector. Cloud computing has
benefits for both healthcare professionals and patients.
Usage of cloud solutions can cut down operational expenses
and is also very convenient for the users because of the
accessibility. [6] Cloud Based Personal Health Record
systems should be designed in such a way where the health
records should be stored and processed in a highly secured
manner. Patient care should be given utter importance and
should be improved with time. Cloud computing provides
personalized care for the patients as they are provided with
personal spaces to view and understand their healthreports
any time and from anywhere. Security and privacy of
healthcaredocuments whicharealwaysconsideredsensitive
is the problem in adopting cloud computing for the storage
and processing of such data. [1]
Healthcare data management system involves consultation
and prescription files, diagnosis reports and other digital
media like x-ray and scanning reports. All these data can be
uploaded and accessed by the users of the cloud platform.
This multi user environment can be vulnerable with an
increase in usage and popularity. In this paper, a Cloud
Based Personal Health Record (CBPHR) system is proposed
that uses encryption technique to protect the privacy of the
uploaded data. In this approach, authentication and
authorization of cloud users are given great importance. In
section II, existing system andinsectionIII,proposedsystem
is discussed. In section IV, the architecture diagram is
presented. In section V, the paper is concluded with future
recommendations.
II. Existing System
A Cloud Based Patient Health Record (CBPHR) system
should always be designed in such a way so that it can
perform the expected operations in a relevant and feasible
manner to all the users.[4] The users of healthcare system
comprises of hospital staff members like doctors,nurses,lab
technicians, microbiologists and even the receptionists. All
these people can be categorized as data owners who are the
sources of clinical data. Other than healthcare professionals,
patients are the most important part of a healthcare
management system as they are the primary data users.
While the security and privacy of the data users are of great
importance, still most of the healthcare management
systems are not sufficiently secured. [5]
Some of the Personal Health Record (PHR) systems are
deployed on cloud while others makes use of traditional
approach. [2] Encryption is a technique through which we
can hide the true sense of our information is somewhat
common in CBPHR systems. But still manyofthoseusers can
download the files without proper authentication. Storing a
data securely is not sufficient for a secure system but also
the access to the data should be restricted. This may cause a
disagreement among the users because the process is tiring
and time consuming. Most CBPHR systems are openly
accessible to people and anybody can create a user
IJTSRD41230
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 293
account.[7] This is a disadvantage because anybody with a
little knowledge about a patient can easily create a fake
account and access that person’s personal data.
Creating an ideal CBPHR system requires processes like
access control and encryption. Here, the access control
strategy should not be limited to data uploading or
downloading but also in the creation of user accounts. [3]
III. Proposed System
The proposed system is a Cloud Based Personal Health
Record (CBPHR) system that integrates the concepts of
access control and encryption. In this approach, the entire
patient documents are uploaded in encrypted format. A
trapdoor key is used by the data provider to upload the
documents. The same way the data users can access the
reports and other documents through the platform using a
file key. Here, trapdoor key acts as the encryption key and
file key acts as the decryption key. The proposed method
gives great importance to access control. The data providers
and data users require permission from cloud server to
access the cloud platform.
The system involves 4 modules namely, Data Owner, Data
User, Authority, Attributor and Cloud Server. Data Owner
can be a doctor or hospital staff who creates data. Once a
doctor registers an account,thecloudserverhastoauthorize
the particular person to login. The data owner can upload
patient files to the system using a trapdoor key provided by
the admin or authority module. A data owner can view and
edit their patient details accordingly.Thesame way,thedata
user can search for their own reports and canalsodownload
it using a file key provided by the attributor module. The
data user account creation happensthesame wayasthedata
owner. They should also be authenticated by the cloud
server before accessing the data. If the data user enters the
wrong file key, the application suspects this user to be an
attacker. The main goal of the approach is to secure the
system against chosen-keyword attack. Based on the search
file, they can be able to request the key from the attributor.
Once they received the key from the attributor, thedata user
can download the file. Cloud server is theauthorizedmodule
to grant permission, monitor all the patient details, Clinical
report details, attacker details and result analysis of a
particular system. The system is really much secured
because it is completely encrypted and the privileges are
being taken care of. [8]
IV. System Architecture
The below figure [fig 1] is showing the system architecture.
It is a pictorial representation of the entire cloud based
patient health record system. In this, all the modules and
their interdependencies are demonstrated. The encryption,
decryption and authorizationprocessesarealsodisplayedin
detail.
Fig 1: System Architecture
V. Conclusion and Future Enhancements
The paper proposes an efficient and privacy preserving
technique where data and data indexes are encrypted using
different symmetric keys and also the encrypted data from
multiple providers can merge in the cloud without knowing
its content. This is a cloud based patient health record
system with secured data storageandmanipulationfeatures.
This is a system that is helpful to the patients because of its
usability and simplicity. The proposed approach is also
giving importance to the authorization and authentication
processes.
As a future enhancement, we can transformclinical data into
knowledge for better patient care. Supervised Learning
concept in Machine learning and Artificial Intelligence
technology can be used for analyzingandtrainingthesystem
based on existing records like clinical data, genetical data
and medical history. This is helpful for predicting any
possible disease. This kind of systems can also monitor the
patient in real time. Here, wireless patient monitoring
devices like heart rate monitor, pulse oximeter,
sphygmomanometeretc.canbeconnectedtothedatabaseor
server to store and monitor the patient’s body changes. This
can benefit both the technology and healthcare industry to
save the human life.
VI. References
[1] M. P. Radhini, P Ananthaprabha, P. Parthasarathi,
Secure Sharing of Medical Records Using
Cryptographic Methods in Cloud, International
Journal of Computer Science and Mobile Computing,
Vol. 3, Issue. 4, April 2014, pg. 514 – 521
[2] Ismail Keshta, Ammar Odeh, , Security and privacy of
electronic health records: Concerns and challenges,
Egyptian Informatics Journal, 2020, ISSN 1110-8665
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 294
[3] Fernández-Alemán JL, Señor IC, Lozoya PÁ, Toval A.
Security and privacy in electronic health records: a
systematic literature review. J Biomed Inform. 2013
Jun; 46(3): 541-62. doi: 10. 1016/j. jbi. 2012. 12. 003.
Epub 2013 Jan 8. PMID: 23305810.
[4] Pradeep Deshmukh, , Design of cloud security in the
EHR for Indian healthcare services,
Journal of King Saud University - Computer and
Information Sciences, Volume 29, Issue 3,
2017, Pages 281-287, ISSN 1319-1578
[5] Samuel, Victoria & Adewumi, Adewole & Dada,
Benjamin &Omoregbe, Nicholas & Misra, Sanjay
&Odusami, Modupe. (2019).DesignandDevelopment
of a Cloud-Based Electronic Medical Records (EMR)
System. 10. 1007/978-981-13-6351-1_3.
[6] Adebayo, Abayomi-Alli &Ikuomola, Aderonke &
Robert, Ifeoluwa & Abayomi-Alli, Olusola. (2014). An
Enterprise Cloud-Based Electronic Health Records
System. 2. 21-36.
[7] Pradeep Deshmukh, Design of cloud security in the
EHR for Indian healthcare services, Journal of King
Saud University-Computer andInformationSciences,
Volume 29, Issue 3, 2017, Pages 281-287, ISSN 1319-
1578.
[8] Jesús Romero, Pablo López, José Luis Vázquez
Noguera, Cristian Cappo, Diego P. Pinto-Roa and
Cynthia Villalba , INTEGRATED, RELIABLE AND
CLOUD-BASED PERSONAL HEALTH RECORD: A
SCOPING REVIEW, Health Informatics - An
International Journal (HIIJ) Vol. 5, No. 2/3, August
2016.

More Related Content

What's hot

IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET Journal
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
eSAT Journals
 
Survey of open source health information systems
Survey of open source health information systemsSurvey of open source health information systems
Survey of open source health information systems
hiij
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
ijscai
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Editor IJCATR
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
Akshay Mittal
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET Journal
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
 
Ibrahem
IbrahemIbrahem
Ibrahem
BarojReal
 
An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis
IJECEIAES
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography
IJECEIAES
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
Editor IJCATR
 

What's hot (18)

IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
 
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
Survey of open source health information systems
Survey of open source health information systemsSurvey of open source health information systems
Survey of open source health information systems
 
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS SECURED FRAMEWORK FOR PERVASIVE  HEALTHCARE MONITORING SYSTEMS
SECURED FRAMEWORK FOR PERVASIVE HEALTHCARE MONITORING SYSTEMS
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 
Ibrahem
IbrahemIbrahem
Ibrahem
 
An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis An innovative IoT service for medical diagnosis
An innovative IoT service for medical diagnosis
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography IoT based on secure personal healthcare using RFID technology and steganography
IoT based on secure personal healthcare using RFID technology and steganography
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 

Similar to Personal Health Record over Encrypted Data Using Cloud Service

Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
ijtsrd
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
IRJET Journal
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
IRJET Journal
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
ijtsrd
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
IEEEFINALSEMSTUDENTPROJECTS
 
A Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationA Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronization
IJAEMSJORNAL
 
Blockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare recordsBlockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare records
IRJET Journal
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
NAUMAN MUSHTAQ (KHOKHAR)
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
KSAravindSrivastava
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
IRJET Journal
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
IJERA Editor
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
ijcisjournal
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
ijcisjournal
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
IRJET Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
IRJET Journal
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
IJSRED
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET Journal
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
VishalSoni95234
 

Similar to Personal Health Record over Encrypted Data Using Cloud Service (20)

Role of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare SystemsRole of Cloud Computing in Healthcare Systems
Role of Cloud Computing in Healthcare Systems
 
MEDBLOCK
MEDBLOCKMEDBLOCK
MEDBLOCK
 
IRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical RecordsIRJET- MedBlock System for Securing Medical Records
IRJET- MedBlock System for Securing Medical Records
 
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Cloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the HospitalsCloud Based Services and their Security Evaluation in the Hospitals
Cloud Based Services and their Security Evaluation in the Hospitals
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A review on the state of-the-art priva...
 
A Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronizationA Survey on Decentralized e-health record with health insurance synchronization
A Survey on Decentralized e-health record with health insurance synchronization
 
Blockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare recordsBlockchain based system to store and retrieve healthcare records
Blockchain based system to store and retrieve healthcare records
 
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
Access and Secure Storage Based Block Chain Scheme with IPFS Implemented in E...
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
A Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor dataA Survey on provide security to wireless medical sensor data
A Survey on provide security to wireless medical sensor data
 
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
An Effective Security Mechanism for M-Commerce Applications Exploiting Ontolo...
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENTCOMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
COMBINING BLOCKCHAIN AND IOT FOR DECENTRALIZED HEALTHCARE DATA MANAGEMENT
 
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
IRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using BlockchainIRJET - Healthcare Data Storage using Blockchain
IRJET - Healthcare Data Storage using Blockchain
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Medical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdfMedical data sharing using Blockchain.pdf
Medical data sharing using Blockchain.pdf
 

More from YogeshIJTSRD

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
YogeshIJTSRD
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
YogeshIJTSRD
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
YogeshIJTSRD
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
YogeshIJTSRD
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
YogeshIJTSRD
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
YogeshIJTSRD
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
YogeshIJTSRD
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
YogeshIJTSRD
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
YogeshIJTSRD
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
YogeshIJTSRD
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
YogeshIJTSRD
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
YogeshIJTSRD
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
YogeshIJTSRD
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
YogeshIJTSRD
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
YogeshIJTSRD
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
YogeshIJTSRD
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
YogeshIJTSRD
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
YogeshIJTSRD
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
YogeshIJTSRD
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
YogeshIJTSRD
 

More from YogeshIJTSRD (20)

Cosmetic Science An Overview
Cosmetic Science An OverviewCosmetic Science An Overview
Cosmetic Science An Overview
 
Standardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis ProceraStandardization and Formulations of Calotropis Procera
Standardization and Formulations of Calotropis Procera
 
Review of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of ParalysisReview of the Diagnosis and Treatment of Paralysis
Review of the Diagnosis and Treatment of Paralysis
 
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
Comparative Analysis of Forced Draft Cooling Tower Using Two Design Methods A...
 
Criminology Educators Triumphs and Struggles
Criminology Educators Triumphs and StrugglesCriminology Educators Triumphs and Struggles
Criminology Educators Triumphs and Struggles
 
A Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin DisorderA Review Herbal Drugs Used in Skin Disorder
A Review Herbal Drugs Used in Skin Disorder
 
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
Automatic Query Expansion Using Word Embedding Based on Fuzzy Graph Connectiv...
 
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
A New Proposal for Smartphone Based Drowsiness Detection and Warning System f...
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus NiruriAntimicrobial and Phytochemical Screening of Phyllantus Niruri
Antimicrobial and Phytochemical Screening of Phyllantus Niruri
 
Heat Sink for Underground Pipe Line
Heat Sink for Underground Pipe LineHeat Sink for Underground Pipe Line
Heat Sink for Underground Pipe Line
 
Newly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable CoreNewly Proposed Multi Channel Fiber Optic Cable Core
Newly Proposed Multi Channel Fiber Optic Cable Core
 
Security Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and PoliceSecurity Sector Reform toward Professionalism of Military and Police
Security Sector Reform toward Professionalism of Military and Police
 
Stress An Undetachable Condition of Life
Stress An Undetachable Condition of LifeStress An Undetachable Condition of Life
Stress An Undetachable Condition of Life
 
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
Comparative Studies of Diabetes in Adult Nigerians Lipid Profile and Antioxid...
 
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
To Assess the Severity and Mortality among Covid 19 Patients after Having Vac...
 
Novel Drug Delivery System An Overview
Novel Drug Delivery System An OverviewNovel Drug Delivery System An Overview
Novel Drug Delivery System An Overview
 
Security Issues Related to Biometrics
Security Issues Related to BiometricsSecurity Issues Related to Biometrics
Security Issues Related to Biometrics
 
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...Comparative Analysis of Different Numerical Methods for the Solution of Initi...
Comparative Analysis of Different Numerical Methods for the Solution of Initi...
 
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing ContentEvaluation of Different Paving Mixes Using Optimum Stabilizing Content
Evaluation of Different Paving Mixes Using Optimum Stabilizing Content
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

Personal Health Record over Encrypted Data Using Cloud Service

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 5 Issue 4, May-June 2021 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 292 Personal Health Record over Encrypted Data Using Cloud Service Dinesh Soni1, Dr. Lakshmi JVN2 1Master of Computer Application, 2Associate Professor, 1,2Jain University, Bengaluru, Karnataka, India ABSTRACT CBPHR- Cloud Based Personal Health Recordsystemsare usedforstorageand management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patienthealthrecord management scheme which is highly secured. In this approach, indexes are encrypted under differentsymmetrickeysandalsotheencrypteddata indexes from various data providers can be mergebycloudwithoutknowingtheindex content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. KEYWORDS: CBPHR, Access Controls, Encryption, Trapdoor Key, File Key How to cite this paper: Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-5 | Issue-4, June 2021, pp.292-294, URL: www.ijtsrd.com/papers/ijtsrd41230.pdf Copyright © 2021 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by/4.0) I. INTRODUCTION There has been a massive adoptionofcloudcomputingin the generation, storage, manipulation and sharing of data. The same happens in healthcare sector. Cloud computing has benefits for both healthcare professionals and patients. Usage of cloud solutions can cut down operational expenses and is also very convenient for the users because of the accessibility. [6] Cloud Based Personal Health Record systems should be designed in such a way where the health records should be stored and processed in a highly secured manner. Patient care should be given utter importance and should be improved with time. Cloud computing provides personalized care for the patients as they are provided with personal spaces to view and understand their healthreports any time and from anywhere. Security and privacy of healthcaredocuments whicharealwaysconsideredsensitive is the problem in adopting cloud computing for the storage and processing of such data. [1] Healthcare data management system involves consultation and prescription files, diagnosis reports and other digital media like x-ray and scanning reports. All these data can be uploaded and accessed by the users of the cloud platform. This multi user environment can be vulnerable with an increase in usage and popularity. In this paper, a Cloud Based Personal Health Record (CBPHR) system is proposed that uses encryption technique to protect the privacy of the uploaded data. In this approach, authentication and authorization of cloud users are given great importance. In section II, existing system andinsectionIII,proposedsystem is discussed. In section IV, the architecture diagram is presented. In section V, the paper is concluded with future recommendations. II. Existing System A Cloud Based Patient Health Record (CBPHR) system should always be designed in such a way so that it can perform the expected operations in a relevant and feasible manner to all the users.[4] The users of healthcare system comprises of hospital staff members like doctors,nurses,lab technicians, microbiologists and even the receptionists. All these people can be categorized as data owners who are the sources of clinical data. Other than healthcare professionals, patients are the most important part of a healthcare management system as they are the primary data users. While the security and privacy of the data users are of great importance, still most of the healthcare management systems are not sufficiently secured. [5] Some of the Personal Health Record (PHR) systems are deployed on cloud while others makes use of traditional approach. [2] Encryption is a technique through which we can hide the true sense of our information is somewhat common in CBPHR systems. But still manyofthoseusers can download the files without proper authentication. Storing a data securely is not sufficient for a secure system but also the access to the data should be restricted. This may cause a disagreement among the users because the process is tiring and time consuming. Most CBPHR systems are openly accessible to people and anybody can create a user IJTSRD41230
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 293 account.[7] This is a disadvantage because anybody with a little knowledge about a patient can easily create a fake account and access that person’s personal data. Creating an ideal CBPHR system requires processes like access control and encryption. Here, the access control strategy should not be limited to data uploading or downloading but also in the creation of user accounts. [3] III. Proposed System The proposed system is a Cloud Based Personal Health Record (CBPHR) system that integrates the concepts of access control and encryption. In this approach, the entire patient documents are uploaded in encrypted format. A trapdoor key is used by the data provider to upload the documents. The same way the data users can access the reports and other documents through the platform using a file key. Here, trapdoor key acts as the encryption key and file key acts as the decryption key. The proposed method gives great importance to access control. The data providers and data users require permission from cloud server to access the cloud platform. The system involves 4 modules namely, Data Owner, Data User, Authority, Attributor and Cloud Server. Data Owner can be a doctor or hospital staff who creates data. Once a doctor registers an account,thecloudserverhastoauthorize the particular person to login. The data owner can upload patient files to the system using a trapdoor key provided by the admin or authority module. A data owner can view and edit their patient details accordingly.Thesame way,thedata user can search for their own reports and canalsodownload it using a file key provided by the attributor module. The data user account creation happensthesame wayasthedata owner. They should also be authenticated by the cloud server before accessing the data. If the data user enters the wrong file key, the application suspects this user to be an attacker. The main goal of the approach is to secure the system against chosen-keyword attack. Based on the search file, they can be able to request the key from the attributor. Once they received the key from the attributor, thedata user can download the file. Cloud server is theauthorizedmodule to grant permission, monitor all the patient details, Clinical report details, attacker details and result analysis of a particular system. The system is really much secured because it is completely encrypted and the privileges are being taken care of. [8] IV. System Architecture The below figure [fig 1] is showing the system architecture. It is a pictorial representation of the entire cloud based patient health record system. In this, all the modules and their interdependencies are demonstrated. The encryption, decryption and authorizationprocessesarealsodisplayedin detail. Fig 1: System Architecture V. Conclusion and Future Enhancements The paper proposes an efficient and privacy preserving technique where data and data indexes are encrypted using different symmetric keys and also the encrypted data from multiple providers can merge in the cloud without knowing its content. This is a cloud based patient health record system with secured data storageandmanipulationfeatures. This is a system that is helpful to the patients because of its usability and simplicity. The proposed approach is also giving importance to the authorization and authentication processes. As a future enhancement, we can transformclinical data into knowledge for better patient care. Supervised Learning concept in Machine learning and Artificial Intelligence technology can be used for analyzingandtrainingthesystem based on existing records like clinical data, genetical data and medical history. This is helpful for predicting any possible disease. This kind of systems can also monitor the patient in real time. Here, wireless patient monitoring devices like heart rate monitor, pulse oximeter, sphygmomanometeretc.canbeconnectedtothedatabaseor server to store and monitor the patient’s body changes. This can benefit both the technology and healthcare industry to save the human life. VI. References [1] M. P. Radhini, P Ananthaprabha, P. Parthasarathi, Secure Sharing of Medical Records Using Cryptographic Methods in Cloud, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 4, April 2014, pg. 514 – 521 [2] Ismail Keshta, Ammar Odeh, , Security and privacy of electronic health records: Concerns and challenges, Egyptian Informatics Journal, 2020, ISSN 1110-8665
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD41230 | Volume – 5 | Issue – 4 | May-June 2021 Page 294 [3] Fernández-Alemán JL, Señor IC, Lozoya PÁ, Toval A. Security and privacy in electronic health records: a systematic literature review. J Biomed Inform. 2013 Jun; 46(3): 541-62. doi: 10. 1016/j. jbi. 2012. 12. 003. Epub 2013 Jan 8. PMID: 23305810. [4] Pradeep Deshmukh, , Design of cloud security in the EHR for Indian healthcare services, Journal of King Saud University - Computer and Information Sciences, Volume 29, Issue 3, 2017, Pages 281-287, ISSN 1319-1578 [5] Samuel, Victoria & Adewumi, Adewole & Dada, Benjamin &Omoregbe, Nicholas & Misra, Sanjay &Odusami, Modupe. (2019).DesignandDevelopment of a Cloud-Based Electronic Medical Records (EMR) System. 10. 1007/978-981-13-6351-1_3. [6] Adebayo, Abayomi-Alli &Ikuomola, Aderonke & Robert, Ifeoluwa & Abayomi-Alli, Olusola. (2014). An Enterprise Cloud-Based Electronic Health Records System. 2. 21-36. [7] Pradeep Deshmukh, Design of cloud security in the EHR for Indian healthcare services, Journal of King Saud University-Computer andInformationSciences, Volume 29, Issue 3, 2017, Pages 281-287, ISSN 1319- 1578. [8] Jesús Romero, Pablo López, José Luis Vázquez Noguera, Cristian Cappo, Diego P. Pinto-Roa and Cynthia Villalba , INTEGRATED, RELIABLE AND CLOUD-BASED PERSONAL HEALTH RECORD: A SCOPING REVIEW, Health Informatics - An International Journal (HIIJ) Vol. 5, No. 2/3, August 2016.