Submit Search
Upload
Survey Paper on Cloud-Based Secured Healthcare System
•
0 likes
•
4 views
IRJET Journal
Follow
https://www.irjet.net/archives/V11/i1/IRJET-V11I1106.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
VannaSchrader3
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
E-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
Recommended
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
BRAIN. Broad Research in Artificial Intelligence and Neuroscie
VannaSchrader3
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
IRJET Journal
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
E-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
IRJET Journal
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
IRJET Journal
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
IRJET Journal
Digital Lost and Found Item Portal
Digital Lost and Found Item Portal
IRJET Journal
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET Journal
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET Journal
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
ijtsrd
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
vivatechijri
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET Journal
Electronics health records and business analytics a cloud based approach
Electronics health records and business analytics a cloud based approach
IAEME Publication
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to Survey Paper on Cloud-Based Secured Healthcare System
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
IRJET Journal
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
ijtsrd
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
IRJET Journal
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
IRJET Journal
Digital Lost and Found Item Portal
Digital Lost and Found Item Portal
IRJET Journal
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
IRJET Journal
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET Journal
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
ijtsrd
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
vivatechijri
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET Journal
Electronics health records and business analytics a cloud based approach
Electronics health records and business analytics a cloud based approach
IAEME Publication
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
Similar to Survey Paper on Cloud-Based Secured Healthcare System
(20)
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
Big Data: Privacy and Security Aspects
Big Data: Privacy and Security Aspects
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
Dynamic Fine-grained Access Control and Multi-Field Keyword Search in Cloud B...
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
Digital Lost and Found Item Portal
Digital Lost and Found Item Portal
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
A PARALLEL AND FORWARD PRIVATE SEARCHABLE PUBLIC KEY ENCRYPTION FOR CLOUD BAS...
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
Survey on Cloud Based Services and its Security Analysis in the Healthcare Se...
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
Smart Portal: A Platform for Student's Profile Creation, Evaluation and Clust...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
Electronics health records and business analytics a cloud based approach
Electronics health records and business analytics a cloud based approach
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant Coefficients
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Solving Linear Differential Equations with Constant Coefficients
Solving Linear Differential Equations with Constant Coefficients
Recently uploaded
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
computer application and construction management
computer application and construction management
MariconPadriquez1
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
121011101441
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
ssuser2ae721
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
sdickerson1
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
ShivangiSharma879191
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Recently uploaded
(20)
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
computer application and construction management
computer application and construction management
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Survey Paper on Cloud-Based Secured Healthcare System
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 646 Survey Paper on Cloud-Based Secured Healthcare System Siddhi Gorde1, Rutuja Gurav 2, Susmit Walekar 3, Dhrumil More4, Vrushali Bahurupi5 1,2,3,4Student, Dept. of Computer Engineering, Pillai College of Engineering, New Panvel, India 5Professor, Dept. of Computer Engineering, Pillai College of Engineering, New Panvel, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - India and the healthcare system are facing many threats due to the pandemic, so we encouraged hospitals to switch from paper patient records to electronic health information. Additionally, as the population grows, tracking, documenting and evaluating patients as they move through the multiple channels of the healthcare system becomes more complex. A model must be created to collect patient data from different locations where care is provided in emergencies such as organ transplants. However, the model requires more storage space to store all patient data. Thus, Google Cloud enables healthcare companies to quickly generate insights using industry-specific data, visualization and privacy standards while consuming large amounts of clinical data. After user authentication, cloud services using encryption methods are used to centrally process user data. security of data transferred between the user and the cloud. The idea behind facial recognition technology is to use a smart card to obtain patient-specific medical information by combining and identifying facial features. It also provides users with medication reminders, which are now quite useful, and a chat that helps users understand the basic functions of the software. It aims to provide consumers with basic drug information and help them manage local hospital information. Keywords: electronic healthcare, electronic health records (EHR), data security, facial recognition technology, chat. Key Words: E-healthcare, Electronic Health Records (EHR), Data Security, Facial Recognition Technology, Chatbot 1. INTRODUCTION The digital revolution in the healthcare sector is being propelled by the utilization of electronic health records and data-driven decision-making. It is crucial to ensure the integrity and security of healthcare data in the digital era. The technologies that are enhancing the security of medical data now include smart cards and fingerprint authentication as vital parts. Moreover, integrating these technologies with cloud-based systems that are centralized offers a complete approach to patient data security.The essential ideas underlying improved healthcare data security are thoroughly examined in this survey research. We examine the vital roles that facial identification, centralized cloud-based systems, smart cards, and their interconnections play in the context of healthcare data protection. The primary objective of this study is to examine and elucidate the algorithms and methodologies employed in research articles and studies, shedding light on their utility and real-world implementations. In the following sections, we scrutinize each of these elements in detail and offer comprehensive justifications for their significance. We highlight the strategies and tools that academics are employing to address the pressing issues with healthcare data privacy, without naming any specific initiative. Our objective is to summarize the corpus of current literature, identify areas that warrant further investigation, and draw attention to recurring problems to provide a comprehensive resource for academics and business professionals. Robust data security protocols are crucial as the healthcare industry continues to adopt digitalization. This survey contributes to the ongoing discussion on healthcare data security by providing a thorough evaluation of these technologies' present condition and potential for future advancements. By releasing this survey research, we hope to further equip the medical community with knowledge and insights that help fortify data security in an ever-evolving healthcare landscape. 1.2. LITERATURE SURVEY [1] This study examines several symmetric key cryptography-related topics, emphasizing the role that information security plays in the development of new technologies. The study explores the topic of secure data independence and the role of cryptography, particularly symmetric key cryptography, in data authentication at the execution level. It focuses on encryption and decryption, which are the core processes of safe data transmission. The Advanced Encryption Standard is one of the symmetric key encryption algorithms that the authors review and compare. The study covers research on symmetric cryptography, including the usage of cryptographic microprocessors in virtual cards, self- testing cryptographic devices, and VLSI implementations like VINCI. It also examines public key certification and revocation techniques, oblivious transmission, and security protocols based on quantum wave functions. The paper looks at the properties, advantages, disadvantages, and applications of several cryptographic systems. Secure multiparty computations are ensured via oblivious transfer, while autonomous data transmission is made possible by a chip/card-based authentication system.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 647 Procedures for public key certification and revocation deal with the validity of public keys. They also discuss protocols for mobile ad hoc network security, including the role of mobility in peer-to-peer security and self- organized key management systems. [2] This research paper focuses on the development of an application that helps users find nearby places by utilizing the Google Places API and the Google Maps API. The article underlines the importance of their application, "Find Near Me," as a navigation aid that assists users in new places by rapidly recognizing their location and delivering information about local services. It describes how to use the Google Maps Android API. Maps and their functionality can be customized using this API. Obtaining an API key is a necessary step in integrating Google Places API and Google Maps API into the application. The manifest file connects the API key to the app. Within the application, a fragment is used to display the Google Map. The paper describes the process of obtaining the user's current position by utilizing a callback system. Requesting location updates from the LocationManager class and establishing a LocationListener interface are both required. The comprehensive processes of leveraging the Google Places API to retrieve information regarding the user's current location are involved. HTTP GET requests include arguments for latitude, longitude, and location type. When a request is successful, Google servers return JSON-formatted data containing information on the establishments, such as names, vicinities, ratings, and locations. [3] The research delves into the importance of cloud computing, emphasizing Amazon Web Services (AWS) as a prominent supplier. It highlights the advantages of cloud computing, such as security, reliability, and ease of use, and how it affects enterprises and day-to-day operations. The research does point out that one major drawback of AWS is that it is susceptible to denial of service assaults. This is especially problematic for businesses whose operations heavily rely on the platform. The paper highlights how cloud computing, and specifically AWS, may help Small and Medium-sized Enterprises (SMEs) take advantage of new opportunities, become more competitive, and provide effective and affordable services. Owing to its affordability and market domination, AWS is a well-liked substitute for start-ups and growing companies. Notwithstanding the benefits, worries over the security of stored data persist. Small companies think that AWS offers better security, leveling the playing field for emerging companies. Lastly, the report attests to the vital importance of cloud computing—more specifically, AWS— in helping SMEs and modernizing business processes. Amazon Web Services (AWS) offers scalability, efficiency, and cost-effectiveness, yet security issues still exist. [4] The study focuses on creating an English discussion chatbot with speech recognition and artificial intelligence technologies, with the Dialog Flow platform serving as the AI engine. The goal is to solve issues in English language acquisition, particularly in speaking skills, and to use technology to improve the learning experience. The report outlines concerns such as students being silent, apprehensive, and unable to express themselves in English. Traditional teaching methods and materials have also been chastised for being text-book-centric and uninteresting to students. The process entails researching current applications, developing a conversation storyline, implementing a branching storyline, and developing agents, intents, and entities using Dialog Flow. The writers also perform expert assessments to evaluate the chatbot's content's success in language learning metrics. According to the data, the chatbot efficiently supports users in developing their English conversation abilities. Finally, the study indicates the feasibility and usefulness of utilizing a chatbot for English language learning, with a particular emphasis on speaking abilities. Speech recognition and AI integration, paired with a well-crafted dialog storyline, lead to a more interactive and engaging learning experience. The research opens the door to further development and improvement in the creation of digital language learning aids. [5] This article used a homomorphic encryption approach to protect data stored in the cloud. The employment of a homomorphic encryption method is one tactic for cloud computing data security that is employed in several publications. It guarantees the security of information transferred between the user and the cloud. Additionally, it guarantees that the data in the Another issue facing today's Healthcare Management Systems is security in the Internet of Things. The primary concern is safeguarding the patient's private information that will be shared and kept on the internet. Security precautions must be taken when IoT devices are linked to networks to guarantee their security. The information is kept on the server as a stego file, which is an audio file. Consequently, even if someone manages to get access to the server, their access will be limited to the audio files. They won't know that these audio files include patient information that is sensitive to medicine. Even when the data is being transmitted, the audio files will still be sent. The process of decryption will take place when the data is required, at which point it may be extracted. This guarantees the security of the data. Factors like the processing overhead of the encryption and decryption procedures and the difficulty of the necessary homomorphic calculations must be taken into account when using homomorphic encryption for cloud storage security. To guarantee total security, other security measures like access control and authentication can be needed.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 648 [6] This study prepares a chatbot using a combination of AI and NLP. In chatbot implementation, the combination of Artificial Intelligence (AI) and Natural Language Processing (NLP) is critical. AI refers to a computer system's ability to execute tasks that normally require human intellect, such as interpreting natural language. NLP, on the other hand, refers to a computer system's ability to perceive, interpret, and generate human language. Chatbots are computer programs that use natural language discussions to connect with humans. They use AI and NLP to comprehend the user's intent and respond appropriately. Chatbots can handle complex discussions and provide personalized advice to users thanks to the combination of AI and NLP. A chatbot that answers common patient questions uses natural language processing (NLP) techniques to recognize and interpret the patient's questions. The chatbot analyzes the patient's input and extracts pertinent information using NLP techniques. The NLP algorithms process the input to determine the question's intent and context. The appropriate data is retrieved by the chatbot from the knowledge base or database. The chatbot employs NLP algorithms and data retrieval techniques to understand and respond to the patient's general questions. Chatbots are getting more intelligent and sophisticated as AI and machine learning advances, and they can give individualized healthcare solutions to patients. [7] To address the issue with existing healthcare systems, this paper integrates collaborative and decentralized artificial intelligence to create a collaborative virtual healthcare system. With the cooperation of the patients, a decentralized data storage module stores the transaction ID of each patient record in the cloud. Differential privacy has been employed in the data privacy module to safeguard the stored data. It creates national medical survey reports and trains several kinds of diagnostic machine-learning models using a collaborative AI module. One well-known statistic that is often used to evaluate a show's execution based on predicted course labels is its accuracy. This involves sending all of the securely stored medical data to the collaborative AI module while removing patient-identifying information. Algorithms and methods like machine learning and deep learning are used by these AI systems. AI systems are supplied with data using statistical methods and machine learning algorithms. In this case, the suggested AI model is assessed using five distinct methods. We obtain an accuracy of 69% for SVM, 73% for KNN, 82% for the decision tree, 80% for the random forest, and 72% for logistic regression prior to adding scale to the dataset. Upon scaling the data set, we obtain a 69% accuracy rate. We obtain an accuracy of 69% for SVM, 74% for KNN, 89% for decision trees, 88% for random forests, and 70% for logistic regression after scaling the data set. The suggested solution increases the effectiveness of data exchange in the healthcare sector and addresses the drawbacks of the conventional centralized healthcare system. 3. DATA & SURVEY RESULTS We performed a comprehensive survey of healthcare professionals, primarily doctors, to acquire useful information into the integration of e-health services within the medical community. Our study sought to elicit clinicians' viewpoints on the efficacy and implications of e- health services in comparison to traditional healthcare practices. We gathered opinions on a variety of topics, including digitalization in the healthcare industry, online medical treatment, problems encountered, and general satisfaction with electronic health services, using a properly crafted questionnaire. Following are the set of questions taken as a survey:- Do you feel there is a need for digitization in the health and care sector? Fig.1 Need for digitalization The above chart shows the need for digitalization in the health and care sector, with 100% of the responses indicating yes. Is there any need for a system that will give patients data in a single instance? Fig.2 Need for proposed system Fig.2 shows that 95% of the respondents believe there is a need for a system that provides patients' data at a single instance. Which method would you prefer for treatment?
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 01 | Jan 2024 www.irjet.net p-ISSN: 2395-0072 © 2024, IRJET | Impact Factor value: 8.226 | ISO 9001:2008 Certified Journal | Page 649 Fig.3 Prefered treatment Fig.3 shows that 95% of the respondents prefer a centralized system where patient data will be stored in digital format for treatment over paper-based medical records. During an emergency, what are the chances of getting organs or blood on time? Fig.4 Chances of getting organ/blood on time The above bar graph shows "Chances of Getting Organ or Blood on Time". The graph depicts the percentage of people who believe they will be able to get organs or blood in an emergency, with 10% representing a high likelihood, 35% suggesting a moderate possibility, and 55% indicating a poor chance. 4. CONCLUSION Our study paper investigated the relationship between technology and healthcare, highlighting its transformational potential. We are witnessing the promise of more efficient care delivery and improved patient outcomes as technology such as smart cards, fingerprint verification, and centralized cloud systems merge with healthcare. However, in this digital healthcare context, data security is critical. To protect patient information, strong encryption and ethical data procedures are required. Ethical concerns are paramount, and we must ensure ethical AI use and transparent data governance. Recent global health crises highlight the necessity of international collaboration and equitable access to healthcare resources. Finally, as we negotiate this digital healthcare frontier, let us pledge to provide safe, patient- centered, and morally sound treatment. By doing so, we pave the way for a future in which healthcare serves as a beacon of hope and comprehensive well-being for all. REFERENCES [1] S. Chandra, S. Bhattacharyya, S. Paira and S. S. Alam, "A study and analysis on symmetric cryptography," 2014 International Conference on Science Engineering and Management Research (ICSEMR), Chennai, India, 2014, pp. 1-8, doi: 10.1109/ICSEMR.2014.7043664. [2] Rajat Sharam Bhawna Sharma and Sheetal Gandotra R. Sharma, “Finding nearby places (Using Google Places API and Maps API in Android),” Aug. 01, 2016. https://ijsrd.com/Article.php?manuscript=IJSRD V4I 50324 [3] Amazon Web Services Avinash Bandaru Bandaru, A. (2020, December 18). AMAZON WEB SERVICES. ResearchGate. https://www.researchgate.net/publication/3474429 16_AMAZON_WEB_SERVICES [4] A. F. Muhammad, D. Susanto, A. Alimudin, F. Adila, M. H. Assidiqi and S. Nabhan, "Developing English Conversation Chatbot Using Dialog Flow," 2020 International Electronics Symposium (IES), Surabaya, Indonesia, 2020, pp. 468-475, doi: 10.1109/IES50839.2020.9231659. [5] H, R. M., Udupa, S., Bhagavath, S. A., S., & Rao, V. K. (2020, December 3). Centralized and Automated Healthcare Systems : A Essential Smart Application Post Covid-19. https://doi.org/10.1109/iciss49785.2020.9316103 [6] S. Meshram, N. Naik, M. VR, T. More and S. Kharche, "Conversational AI: Chatbots," 2021 International Conference on Intelligent Technologies (CONIT), Hubli, India,2021, pp. 1-6, doi: 10.1109/CONIT51480.2021.9498508. [7] N. Jahan, I. B. Rashid, O. Al Numan, A. S. M. T. Hasan and N. Begum, "Collaborative AI in Smart Healthcare System," 2021 International Conference on Automation, Control and Mechatronics for Industry 4.0 (ACMI), Rajshahi, Bangladesh, 2021, pp. 1-5, doi: 10.1109/ACMI53878.2021.9528125.
Download now