Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

NHIS - An Approach to Privacy Preservation of Health Care Records in Cloud Computing Environment

Print
PDF
IJCA Proceedings on International Conference on Information and Communication Technologies
© 2014 by IJCA Journal
ICICT - Number 6
Year of Publication: 2014
Authors:
Arjun U
Vinay S

Arjun U and Vinay S. Article: NHIS - An Approach to Privacy Preservation of Health Care Records in Cloud Computing Environment. IJCA Proceedings on International Conference on Information and Communication Technologies ICICT(6):34-37, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Arjun U and Vinay S},
	title = {Article: NHIS - An Approach to Privacy Preservation of Health Care Records in Cloud Computing Environment},
	journal = {IJCA Proceedings on International Conference on Information and Communication Technologies},
	year = {2014},
	volume = {ICICT},
	number = {6},
	pages = {34-37},
	month = {October},
	note = {Full text available}
}

Abstract

Cloud computing is known for its elastic and on-demand services. Cloud users can enjoy all the resources being provided by the cloud for a certain charge. Cloud users will be charged on the basis of pay-as-you-go model. Data storage is the mostly needed service nowadays. The cloud users submit their data to the cloud and remain relaxed as there will not be any problem in data maintenance. However, privacy is the major concern here. National Healthcare Info System (NHIS) has got terabytes of health care data and has to be managed effectively. Thus, the merit of cloud computing is enjoyed and the shortcomings are needed to be overcome. All the health care data is submitted to the cloud and users or patients can access it only when the One Time Password (OTP) is provided. This OTP is a 6 or 8 digit randomly generated number by RSA. Thus, privacy is ensured and also the identity of the client is provided by the modification of IP address, which is the task of intermediary layer. This proposed system comprises of three layers namely client, intermediary and privacy preservation layer.

References

  • Rolim CO, Koch FL, Westphall CB, Werner J, Fracalossi A, Salvador GS. A cloud computing solution for patient's data collection in health care institutions. In: Proceedings of the 2nd International Conference on eHealth, Telemedicine, and Social Medicine; February 10-16, 2010; New York, NY: IEEE. 2010. Feb 10
  • Nkosi MT, Mekuria F. Cloud computing for enhanced mobile health applications. Proceedings of the 2010 IEEE 2nd International Conference on Cloud Computing Technology and Science (CloudCom); The 2nd IEEE International Conference on Cloud Computing Technology and Science; Nov 30- Dec 3, 2010; Indianapolis, USA. New York, NY: IEEE; 2010.
  • Rao GSVRK. Sundararaman K, Parthasarathi J. Dhatri: a pervasive cloud initiative for primary healthcare services. Proceedings of the 2010 14th International Conference on Intelligence in Next Generation Networks (ICIN); The 14th IEEE International Conference on Intelligence in Next Generation Networks (ICIN); October 11-14, 2010; Berlin, Germany. New York, NY: IEEE; 2010. Koufi V, Malamateniou F, Vassilacopoulos G. Ubiquitous access to cloud emergency medical services. Proceedings of the 2010 10th IEEE International Conference on Information Technology and Applications in Biomedicine (ITAB); The 10th IEEE International Conference on Information Technology and Applications in Biomedicine (ITAB); November 3-5, 2010; Corfu, Greece. New York, NY: IEEE; 2010.
  • Wang X, Tan Y. Application of cloud computing in the health information system. Proceedings of the 2010 International Conference on Computer Application and System Modeling (ICCASM); International Conference on Computer Application and System Modeling; October 22-24, 2010; Taiyuan, China. New York, NY: IEEE; 2010.
  • He C, Jin X, Zhao Z, Xiang T. A cloud computing solution for hospital information system. Proceedings of the 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS); IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010); October 29-31, 2010; Xiamen, China. New York, NY: IEEE; 2010.
  • Yang CT, Chen LT, Chou WL, Wang KC. Implementation of a medical image file accessing system on cloud computing. Proceedings of the 2010 IEEE 13th International Conference on Computational Science and Engineering (CSE); The 13th IEEE International Conference on Computational Science and Engineering; December 11-13, 2010; Hong Kong, China. New York, NY: IEEE; 2010.
  • Guo L, Chen F, Chen L, Tang X. The building of cloud computing environment for e-health. Proceedings of the 2010 International Conference on E-Health Networking, Digital Ecosystems and Technologies (EDT); The IEEE International Conference on E-Health Networking; July 1-3, 2010; Lyon, France. New York, NY: IEEE; 2010.
  • Zhang R, Liu L. Security models and requirements for healthcare application clouds. Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD); The 3rd IEEE International Conference on Cloud; July 5-10, 2010; Miami, FL, USA. New York, NY: IEEE; 2010.
  • Kudtarkar P, Deluca TF, Fusaro VA, Tonellato PJ, Wall DP. Cost-effective cloud computing: a case study using the comparative genomics tool, roundup. Evol Bioinform Online. 2010;6:197–203. doi: 10. 4137/EBO. S6259.
  • Vaquero LM, Rodero-Merino L, Caceres J, Lindner M. A break in the clouds: towards a cloud definition. ACM SIGCOMM Comput Commun Rev. 2008 Jan;39(1):50–55. doi: 10. 1145/1496091. 1496100.
  • Sittig DF, Singh H. Eight rights of safe electronic health record use. JAMA. 2009 Sep 9;302(10):1111–3. doi: 10. 1001/jama. 2009. 1311. 302/10/1111
  • Zhang R, Liu L. Security models and requirements for healthcare application clouds. Proceedings of the 2010 IEEE 3rd International Conference on Cloud Computing (CLOUD); The 3rd IEEE International Conference on Cloud; July 5-10, 2010; Miami, FL, USA. New York, NY: IEEE; 2010.
  • Microscoft Corp. 2010. Nov, [2011-09-07]. webcite Privacy in the Cloud: A Microsoft Perspective http://www. microsoft. com/privacy/cloudcomputing. aspx.
  • Wang J, Zhao Y et al. (2009). Providing Privacy Preserving 1. in cloud computing, International Conference on Test and Measurement, vol 2, 213–216.