CFP last date
22 April 2024
Reseach Article

MediCloud: Cloud Computing Services to Health Sector

by Amit S. Pawade, Rajan S. Jamgekar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 179 - Number 23
Year of Publication: 2018
Authors: Amit S. Pawade, Rajan S. Jamgekar
10.5120/ijca2018916417

Amit S. Pawade, Rajan S. Jamgekar . MediCloud: Cloud Computing Services to Health Sector. International Journal of Computer Applications. 179, 23 ( Feb 2018), 9-13. DOI=10.5120/ijca2018916417

@article{ 10.5120/ijca2018916417,
author = { Amit S. Pawade, Rajan S. Jamgekar },
title = { MediCloud: Cloud Computing Services to Health Sector },
journal = { International Journal of Computer Applications },
issue_date = { Feb 2018 },
volume = { 179 },
number = { 23 },
month = { Feb },
year = { 2018 },
issn = { 0975-8887 },
pages = { 9-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume179/number23/29006-2018916417/ },
doi = { 10.5120/ijca2018916417 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:56:12.913786+05:30
%A Amit S. Pawade
%A Rajan S. Jamgekar
%T MediCloud: Cloud Computing Services to Health Sector
%J International Journal of Computer Applications
%@ 0975-8887
%V 179
%N 23
%P 9-13
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Fast access to health data enables better healthcare service provisioning, improves quality of life, and helps saving life by assisting timely treatment in medical emergencies. Anywhere-anytime-accessible electronic healthcare systems play a vital role in our daily life. Services supported by mobile devices, such as home care and remote monitoring, enable patients to retain their living style and cause minimal interruption to their daily activities. In addition, it significantly reduces the hospital occupancy, allowing patients with higher need of in-hospital treatment to be admitted. E-healthcare systems are increasingly popular, a large amount of personal data for medical purpose are involved, and people start to realize that they would completely lose control over their personal information once it enters the cyberspace. According to the government website, around 8 million patients’ health information was leaked in the past two years. There are good reasons for keeping medical data private and limiting the access. An employer may decide not to hire someone with certain diseases. An insurance company may refuse to provide life insurance knowing the disease history of a patient. Despite the paramount importance, privacy issues are not addressed adequately at the technical level and efforts to keep health data secure have often fallen short. This is because protecting privacy in the cyberspace is significantly more challenging. Thus, there is an urgent need for the development of viable protocols, architectures, and systems assuring privacy and security to safeguard sensitive and personal digital information.

References
  1. Sherman S. M. Chow and Pan Li, Member, IEEE ,“Cloud-Assisted Mobile-Access of Health Data with Privacy and Audit ability”, IEEE, Journal of Biomedical and Health Informatics, VOL. 18, NO. 2, March 2014
  2. P.Rayand, J.Wimalasiri,“The need for technical solutions for maintaining the privacy of EHR,” in Proc. IEEE 28thAnnu.Int.Conf.,NewYorkCity, NY, USA, Sep. 2006, pp. 4686–4689
  3. J. Sun, C. Zhang, Y. Zhang, and Y. Fang, “An identity-based security sys-tem for user privacy in vehicular ad hoc networks,” IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227–1239, Sep. 2010.
  4. J. Sun, X. Zhu, and Y. Fang, “Preserving privacy in emergency response based on wireless body sensor networks,” in Proc. IEEE Global Telecom- mun. Conf., Dec. 2010, pp.
  5. J. Sun, X. Zhu, and Y. Fang, “Privacy and emergency response in e- healthcare leveraging wireless body sensor networks,” IEEE Wireless Commun., vol. 17, no. 1, pp. 66–73, Feb. 2010.
  6. J.Sun,X.Zhu,C.Zhang,andY.Fang,“HCPP:Cryptography based secure HER system for patient privacy and emergency healthcare,” inProc.IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 373–382.
  7. L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: Privacy-preserving attribute-based authentication system for eHealth networks,” in Proc. IEEE Intl. Conf. Distrib. Comput. Syst., Jun. 2012, pp. 224–233.
  8. C. Wang, K. Ren, S. Yu, and K. Urs, “Achieving usable and privacy- assured similarity search over outsourced cloud data,” in Proc. IEEE Conf. Comput. Commun., Mar. 2012, pp. 451–459.
  9. M.Li, S.Yu,Y. Zheng, K.Ren and W.Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,”IEEE Trans. Parallel Distrib. Syst.,vol.24,no.1,pp.131–143, Jan. 2013.
  10. N.Cao, Z.Yang,C.Wang,K.Ren,and W.Lou,“Privacy-preserving query over encrypted graph-structured data in cloud computing,” in Proc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 393–402.
  11. D.Song, D.Wagner,andA.Perrig,“Practical techniques for searching on encrypted data,” in Proc. IEEE Symp. Security Privacy, 2000, pp. 44–55.
  12. A.Pingley, W.Yu,N.Zhang, X.Fu and W.Zhao, “CAP:Acontext-aware privacy protection system for location-based services,” in Proc. IEEE Int. Conf. Distrib. Comput. Syst., 2009, pp. 49–57.
  13. C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key- aggregate cryptosystem for scalable data sharing in cloud storage,” IEEE Trans. Parallel Distrib. Syst., vol. 99, no. PrePrints, p. 1, 2013.
  14. L. Zhang, G. J. Ahn, and B. T. Chu, “A role-based delegation framework for healthcare information systems,” in 7th ACM Symp. Access Control Models Technol., Monterey, CA, USA, 2002, pp. 125–134.
  15. L. Zhang, G. J. Ahn, and B. T. Chu, “A rule-based framework for role- based delegation and revocation,” ACM Trans. Inf. Syst. Security, vol. 6, no. 3, pp. 404–441, 2003.
  16. V. Goyal, O. Pandey, A. Sahai, and B. Waters, “Attributed-based encryp- tionforfine-grained access control of encrypted data,”inProc.ACMConf. Comput. Commun. Security, 2006, pp. 89–98.
  17. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption:Ensuring privacy o felectronic medical records,”inProc.ACM Workshop Cloud Comput. Security, 2009, pp. 103–114.
  18. M. Chase and S. S. M. Chow, “Improving privacy and security in multi- authority attribute-based encryption,” in Proc. ACM Conf. Comput. Com- mun. Security, 2009, pp. 121–130.
  19. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing. Extended abstract in CRYPTO 2001,” SIAM J. Comput., vol. 32, no. 3, pp. 586–615, 2003.
  20. G. Ateniese, R. Curtmola, B. de Medeiros, and D. Davis, “Medical information privacy assurance: Cryptographic and system aspects,” presented at the 3rd Conf. Security Commun. Netw., Amalfi, Italy, Sep. 2002
  21. J. Sun, C. Zhang, Y. Zhang, and Y. Fang, “An identity-based security system for user privacy in vehicular ad hoc networks, ”IEEE Trans. Parallel Distrib. Syst., vol. 21, no. 9, pp. 1227–1239, Sep. 2010
  22. L. Guo, C. Zhang, J. Sun, and Y. Fang, “PAAS: Privacy-preserving attribute-based authentication system for eHealth networks,” in Proc. IEEE Intl. Conf. Distrib. Comput. Syst., Jun. 2012, pp. 224–233
  23. J. Sun, X. Zhu, C. Zhang, and Y. Fang, “HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare,” inProc. IEEE Int. Conf. Distrib. Comput. Syst., Jun. 2011, pp. 373–382
  24. Ravi S. Sandhu{, Edward J. Coynek, Hal L. Feinsteink and Charles E. Youmank “Role-Based Access Control Models” IEEE Computer, Volume 29, Number 2, February 1996, pages 38-47.
  25. LONGHUA ZHANG, GAIL-JOON AHN, and BEI-TSENG CHU “A Rule-Based Framework for Role-Based
  26. Delegation and Revocation” ACM Transactions on Information and System Security, Vol. 6, No. 3, August 2003, Pages 404–441.
  27. Weigang Wang, “Team-and-Role-Based Organizational Context and Access Control for Cooperative Hypermedia Environments”
Index Terms

Computer Science
Information Sciences

Keywords

Access control auditability eHealth privacy cloud computing.