SlideShare a Scribd company logo
“SeSPHR: A Methodology for Secure
Sharing of Personal Health Records
in the Cloud Using IOT”
Presented by:
1. Pratiksha katre
2. Vishwajeet
Tiwadkar
3. Varun jain
Guided By:
Dr. Kotadi Chinnaiah
Company Name : Phoenixzone Technologies Pvt Ltd.
Project Name : Personal Health Record on Cloud.
Start Date : Dec 15 2020
Language : java , HTML
Type : Desktop Application
Project Overview
Topics Covered
⚫ Introduction
⚫ Problem Statement
⚫ Scope
⚫ Motivation
⚫ Objectives
⚫ Proposed System
⚫ System Architecture
⚫ Modules
⚫ Software Requirements
⚫ Hardware Requirements
⚫ Conclusion
⚫ References
Introduction
⚫ The broad acknowledgment of cloud based services in the
healthcare sector has brought about practical and helpful trade
of Personal Health Records (PHRs) among a few taking part
elements of the e-Health systems.
⚫ We propose an approach called SeSPHR for secure sharing of
the PHRs in the cloud.
⚫ The SeSPHR scheme ensures patient-centric control on the
PHRs and preserves the classification of the PHRs.
⚫ SeSPHR strategy can possibly be utilized for safely sharing the
PHRs in the cloud.
Problem Statement
⚫ To solve the problem of data exchange between medical units,
We propose system which helps to improve patient safety and
quality care, but also reduce time and resources.
Scope
⚫ The proposed scheme is able to resist internal and external
attacks.
⚫ The generation of keys and the algorithms are simple.
⚫ The proposed scheme overcomes the dynamic access control
problems.
Motivation
⚫ The area of healthcare is involved with handling of patient
sensitive data. Security and privacy of these data is very
important. While doing online transfer of these secret data over
the public network, it can be viewed and/or modified by the
attackers.
⚫ Hence the motivation behind this work is to propose a system
which share patient’s Health Records over the cloud
confidentially and Securely.
Objectives
⚫ To develop an application that will provide interface to both
physicians and patients.
⚫ To develop an healthcare application that will provide secure,
trustful and reliable communication for different communities
in healthcare area.
⚫ The main objective of SesPHR to support the maintenance of
integrated, efficient and quality health.
⚫ To develop an SesPHR for Doctors need, in critical moments,
patients health information in real time, this is because right
information at the right time saves lives.
Proposed System
⚫ In the proposed system, a sensor node has attached on patient
body to collect all the signals from the wireless sensors and
sends them to the cloud.
⚫ The attached sensors on patient’s body form a wireless body
sensor network (WBSN) and they are able to sense the pulse
rate, body temperature and so on.
⚫ Also to monitor the saline level we are using ultrasonic sensor.
⚫ This system can detect the abnormal conditions, issue an alarm
to the Patient and send a SMS/E-mail to the physician.
Continue…
⚫ We have developed this system in multi-patient architecture for
hospital healthcare and compared it with the other existing
networks based on multi-hop relay node in terms of coverage,
energy consumption and speed.
System Architecture
Modules
⚫Module 1: Data Owner(Patient)
• Patient module involves tiny wireless sensors that are
embedded inside or surface-mounted on the body of a patient.
• These sensors continuously monitor the vital physiology
parameters of the patient such as body temperature, pulse rate
and also monitor the saline level.
• Collected personal health data are aggregated and transmitted
via wireless interface to the cloud.
Continue Modules…
⚫Module 2: Data User
⚫ Doctors, nursing staff, pharmacies, clinical laboratory personnel,
insurance providers, and the service providers is the data users
in Health network.
⚫ In SeSPHR, a data uses resource-limited terminals to generate
secret keys and conduct the information retrieval operation.
⚫ The secret keys are sent to the public cloud via wireless channel
and the retrieved PHR files are returned. Then, the data user
decrypts the PHR files and verifies the correctness of
decryption.
⚫Module 3: Public cloud
• The public cloud has almost unlimited storage and computing
power to undertake the PHR remote storage task and respond
on data retrieval requests.
• Lightweight test algorithm is designed in our proposed system
to improve performance.
Continue Modules…
⚫Module 4: Key Generation Center(KGC)
• KGC generates public parameters for the entire system and
distributes secret keys to data users. A data users set of
attributes is embedded in his secret key to realize access
control.
• If a traitor sells his secret key for financial gain, the KGC is able
to trace the identity of the malicious user and revoke his secret
key.
Continue Modules…
Continue Modules…
⚫Module 5: IOT
• IOT Module contains Temperature Sensor, Pulse Rate Sensor,
Micro-controller and saline level Monitoring.
• Temperature Sensor and Pulse Rate Sensor are embedded
surface-mounted on the body of a patient continuously monitor
the vital physiological parameters of the patient such as body
temperature, pulse rate.
• Microcontroller is used to monitor the saline level.
⚫ The values collected from different sensors stored in text or
pdf file and share in cloud.
Continue Modules…
Software Requirements
• Operating System : Windows 7 or above
• Technology Used : Java
• Platform : JDK 1.8
• Front End : HTML
• Development IDE : Netbeans/Android Studio
Hardware Requirements
• Hard disk : 80GB
• RAM : 1 GB
• Processor : Intel Pentium 4 and above
• Temperature Sensor
• Pulse Rate Sensor
• Microcontroller
Conclusion
⚫ We proposed a procedure to safely store and transmission of
the PHRs to the authorized elements in the cloud.
⚫ The strategy preserves the security of the PHRs and authorizes
a patient-driven access control to various segments of the PHRs
on the access provided by the patients.
⚫ The PHR owners store the encrypted information on the cloud
and just the approved users having valid re-encryption keys
issued by a semi-trusted authority can decrypt the PHRs.
⚫ The job of the semi-trusted authority is to produce and store the
public/private key sets for the clients in the system.
References
[1] K. Gai, M. Qiu, Z. Xiong, and M. Liu, “Privacy-preserving multi-channel
communication in Edge-of-Things”, Future Generation Computer Systems, 2018.
[2] K. Gai, M. Qiu, and X. Sun, “A survey on FinTech”, Journal of Network and
Computer Applications, 2017.
[3] M. H. Au, T. H. Yuen, J. K. Liu, W. Susilo, X. Huang, Y. Xiang, and Z. L. Jiang, “A
general framework for secure sharing of personal health records in cloud system”,
Journal of Computer and System Sciences, 2017.
[4] A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, “A cloud based health insurance plan
recommendation system: A user centered approach, Future Generation Computer
Systems, 2015.
[5] Assad Abbas, Samee U. Khan, Senior Member, “A Review on the State-of-the-Art
Privacy Preserving Approaches in the e-Health Clouds”, IEEE 2014.
THANK
YOU

More Related Content

Similar to PHR PPT (1).pptx

Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
Iaetsd Iaetsd
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535
IJRAT
 

Similar to PHR PPT (1).pptx (20)

Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoTIntegration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
Integration of 5G and Block-Chain Technologies in Smart Telemedicine Using IoT
 
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
A Secure and Efficient Cloud centric Internet of Medical Things-Enabled Smart...
 
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technologyHealthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technology
 
IRJET - A Survey on Blockchain Technology for Electronic Health Record
IRJET -  	  A Survey on Blockchain Technology for Electronic Health RecordIRJET -  	  A Survey on Blockchain Technology for Electronic Health Record
IRJET - A Survey on Blockchain Technology for Electronic Health Record
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
 
0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt0th PPT - BLOCKCHAIN-CBE (1).ppt
0th PPT - BLOCKCHAIN-CBE (1).ppt
 
Blockchain E-Health Supplychain Presentation I.pptx
Blockchain E-Health Supplychain Presentation I.pptxBlockchain E-Health Supplychain Presentation I.pptx
Blockchain E-Health Supplychain Presentation I.pptx
 
journal papers.pdf
journal papers.pdfjournal papers.pdf
journal papers.pdf
 
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
 
Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies Practical Applications of Block Chain Technologies
Practical Applications of Block Chain Technologies
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud assisted mobile-access of healt...
 
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
IEEE 2014 JAVA MOBILE COMPUTING PROJECTS Cloud assisted mobile-access of heal...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Cloud assisted mobile-access of health...
 
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
2014 IEEE JAVA MOBILE COMPUTING PROJECT Cloud assisted mobile-access of healt...
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
Paper id 37201535
Paper id 37201535Paper id 37201535
Paper id 37201535
 

Recently uploaded

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
Kamal Acharya
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
ssuser9bd3ba
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Natalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in KrakówNatalia Rutkowska - BIM School Course in Kraków
Natalia Rutkowska - BIM School Course in Kraków
 
Event Management System Vb Net Project Report.pdf
Event Management System Vb Net  Project Report.pdfEvent Management System Vb Net  Project Report.pdf
Event Management System Vb Net Project Report.pdf
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Laundry management system project report.pdf
Laundry management system project report.pdfLaundry management system project report.pdf
Laundry management system project report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docxThe Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
The Ultimate Guide to External Floating Roofs for Oil Storage Tanks.docx
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
LIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.pptLIGA(E)11111111111111111111111111111111111111111.ppt
LIGA(E)11111111111111111111111111111111111111111.ppt
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Explosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdfExplosives Industry manufacturing process.pdf
Explosives Industry manufacturing process.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
shape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptxshape functions of 1D and 2 D rectangular elements.pptx
shape functions of 1D and 2 D rectangular elements.pptx
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 

PHR PPT (1).pptx

  • 1. “SeSPHR: A Methodology for Secure Sharing of Personal Health Records in the Cloud Using IOT” Presented by: 1. Pratiksha katre 2. Vishwajeet Tiwadkar 3. Varun jain Guided By: Dr. Kotadi Chinnaiah
  • 2. Company Name : Phoenixzone Technologies Pvt Ltd. Project Name : Personal Health Record on Cloud. Start Date : Dec 15 2020 Language : java , HTML Type : Desktop Application Project Overview
  • 3. Topics Covered ⚫ Introduction ⚫ Problem Statement ⚫ Scope ⚫ Motivation ⚫ Objectives ⚫ Proposed System ⚫ System Architecture ⚫ Modules ⚫ Software Requirements ⚫ Hardware Requirements ⚫ Conclusion ⚫ References
  • 4. Introduction ⚫ The broad acknowledgment of cloud based services in the healthcare sector has brought about practical and helpful trade of Personal Health Records (PHRs) among a few taking part elements of the e-Health systems. ⚫ We propose an approach called SeSPHR for secure sharing of the PHRs in the cloud. ⚫ The SeSPHR scheme ensures patient-centric control on the PHRs and preserves the classification of the PHRs. ⚫ SeSPHR strategy can possibly be utilized for safely sharing the PHRs in the cloud.
  • 5. Problem Statement ⚫ To solve the problem of data exchange between medical units, We propose system which helps to improve patient safety and quality care, but also reduce time and resources.
  • 6. Scope ⚫ The proposed scheme is able to resist internal and external attacks. ⚫ The generation of keys and the algorithms are simple. ⚫ The proposed scheme overcomes the dynamic access control problems.
  • 7. Motivation ⚫ The area of healthcare is involved with handling of patient sensitive data. Security and privacy of these data is very important. While doing online transfer of these secret data over the public network, it can be viewed and/or modified by the attackers. ⚫ Hence the motivation behind this work is to propose a system which share patient’s Health Records over the cloud confidentially and Securely.
  • 8. Objectives ⚫ To develop an application that will provide interface to both physicians and patients. ⚫ To develop an healthcare application that will provide secure, trustful and reliable communication for different communities in healthcare area. ⚫ The main objective of SesPHR to support the maintenance of integrated, efficient and quality health. ⚫ To develop an SesPHR for Doctors need, in critical moments, patients health information in real time, this is because right information at the right time saves lives.
  • 9. Proposed System ⚫ In the proposed system, a sensor node has attached on patient body to collect all the signals from the wireless sensors and sends them to the cloud. ⚫ The attached sensors on patient’s body form a wireless body sensor network (WBSN) and they are able to sense the pulse rate, body temperature and so on. ⚫ Also to monitor the saline level we are using ultrasonic sensor. ⚫ This system can detect the abnormal conditions, issue an alarm to the Patient and send a SMS/E-mail to the physician.
  • 10. Continue… ⚫ We have developed this system in multi-patient architecture for hospital healthcare and compared it with the other existing networks based on multi-hop relay node in terms of coverage, energy consumption and speed.
  • 12. Modules ⚫Module 1: Data Owner(Patient) • Patient module involves tiny wireless sensors that are embedded inside or surface-mounted on the body of a patient. • These sensors continuously monitor the vital physiology parameters of the patient such as body temperature, pulse rate and also monitor the saline level. • Collected personal health data are aggregated and transmitted via wireless interface to the cloud.
  • 13. Continue Modules… ⚫Module 2: Data User ⚫ Doctors, nursing staff, pharmacies, clinical laboratory personnel, insurance providers, and the service providers is the data users in Health network. ⚫ In SeSPHR, a data uses resource-limited terminals to generate secret keys and conduct the information retrieval operation. ⚫ The secret keys are sent to the public cloud via wireless channel and the retrieved PHR files are returned. Then, the data user decrypts the PHR files and verifies the correctness of decryption.
  • 14. ⚫Module 3: Public cloud • The public cloud has almost unlimited storage and computing power to undertake the PHR remote storage task and respond on data retrieval requests. • Lightweight test algorithm is designed in our proposed system to improve performance. Continue Modules…
  • 15. ⚫Module 4: Key Generation Center(KGC) • KGC generates public parameters for the entire system and distributes secret keys to data users. A data users set of attributes is embedded in his secret key to realize access control. • If a traitor sells his secret key for financial gain, the KGC is able to trace the identity of the malicious user and revoke his secret key. Continue Modules…
  • 16. Continue Modules… ⚫Module 5: IOT • IOT Module contains Temperature Sensor, Pulse Rate Sensor, Micro-controller and saline level Monitoring. • Temperature Sensor and Pulse Rate Sensor are embedded surface-mounted on the body of a patient continuously monitor the vital physiological parameters of the patient such as body temperature, pulse rate. • Microcontroller is used to monitor the saline level.
  • 17. ⚫ The values collected from different sensors stored in text or pdf file and share in cloud. Continue Modules…
  • 18. Software Requirements • Operating System : Windows 7 or above • Technology Used : Java • Platform : JDK 1.8 • Front End : HTML • Development IDE : Netbeans/Android Studio
  • 19. Hardware Requirements • Hard disk : 80GB • RAM : 1 GB • Processor : Intel Pentium 4 and above • Temperature Sensor • Pulse Rate Sensor • Microcontroller
  • 20. Conclusion ⚫ We proposed a procedure to safely store and transmission of the PHRs to the authorized elements in the cloud. ⚫ The strategy preserves the security of the PHRs and authorizes a patient-driven access control to various segments of the PHRs on the access provided by the patients. ⚫ The PHR owners store the encrypted information on the cloud and just the approved users having valid re-encryption keys issued by a semi-trusted authority can decrypt the PHRs. ⚫ The job of the semi-trusted authority is to produce and store the public/private key sets for the clients in the system.
  • 21. References [1] K. Gai, M. Qiu, Z. Xiong, and M. Liu, “Privacy-preserving multi-channel communication in Edge-of-Things”, Future Generation Computer Systems, 2018. [2] K. Gai, M. Qiu, and X. Sun, “A survey on FinTech”, Journal of Network and Computer Applications, 2017. [3] M. H. Au, T. H. Yuen, J. K. Liu, W. Susilo, X. Huang, Y. Xiang, and Z. L. Jiang, “A general framework for secure sharing of personal health records in cloud system”, Journal of Computer and System Sciences, 2017. [4] A. Abbas, K. Bilal, L. Zhang, and S. U. Khan, “A cloud based health insurance plan recommendation system: A user centered approach, Future Generation Computer Systems, 2015. [5] Assad Abbas, Samee U. Khan, Senior Member, “A Review on the State-of-the-Art Privacy Preserving Approaches in the e-Health Clouds”, IEEE 2014.