Вы находитесь на странице: 1из 6

A Review on the Cloud Computing Approach for Secured Health

Maintenance Record of Patients Using Attribute Vector Algorithm


Manasa k chigateri,i Arun kumar G*.

Abstract
This paper is to report the healthcare scheme is designed to safeguard the privacy of the user and their data. Nowadays,
security is more important in order to maintain and control various applications by using username and coded form of
password thereby hackers avoided. Healthcare system uses cryptographic and non-cryptographic tools to record patients
data. Moreover, it lowers the cost by implementing in small scale re-habitation centers. Some techniques such as
anonymization, IBE and MDRQ methods are used to provide secrecy in healthcare scheme. Cloud can act as medicinal
room center and also reduces resources and maintenance cost. Wireless technology plays a vital role in telemedicine and
healthcare system. DNA samples i.e. collection of human genome data which will applied to solve the problem requested
by particular patients. This survey enables the healthcare supervisory techniques.
Keywords
Data safety, Maintenance record, IBE, Provider, User, STA.

1. Introduction
In early 20s, medical care was delivered by direct visits by physicians at patients home. Later, healthcare
systems changed radically with the introduction of cloud computing. The quality and cost metrics in the cloud
healthcare systems changed the healthcare systems from professional-centric systems to distributed network and
mobile healthcare systems. This advanced technology is however a complement to the existing traditional methods
and does not replace it. People at rural areas have higher poverty rates, and large percentage of elderly people tend to
be in poor health. At such places getting to health services, doctors or hospitals is far more difficult. Hence, one of the
challenges of this system is providing the healthcare services to people meanwhile preserving their privacy.
The cloud assisted real-time health monitoring proved to be more economical and scalable for people who require
frequent health check-ups. Health data of patients are collected and stored in cloud which will be analyzed using
software's hosted in cloud. But the privacy of the patients can be breached in such cases. Here we address the privacy
problems in cloud assisted real-time health monitoring systems by providing privacy to the client data with the
introduction of a third party called the semi trusted authority. The semi- trusted is a traitor or a management agent for
a company providing healthcare services.
Some of the researches are illustrated the DNA samples by grouping the genetic profiles for certain diseases.
Heavy-scale method is employed GWAS (genome-wide association study) techniques to collect the samples of DNA.
A different frequency uses collected DNA samples through genome information. Arrangement executive
responsibilities are provided by the cloud storage resources to enhance the improvement in health system. This can be
done by private, public or both the combination of private and public i.e. hybrid. Electronic health services are
implemented to diagnosis and enforce the mandatory necessities of patients. Bio-medical field applications uses
privacy protecting approaches cloud model to build the challenges evaluated by outside space. Secrecy is one of the
most important parameter and must be authenticated.
Wireless technology now exists as a reality for measuring various diseases and controlling through different
instruments. Physical information of patients such as Blood pressure, Diabetic(sugar), TB, Jaundice etc, are analyzed
by the testing and evaluating through regular check-ups. Global health checking system uses different diseases related
resources for telehealth. 93% peoples on earth are using mobile phone to transmit and receive the information for
particular services providers.
Anonymization techniques uses the databases which are stored in main server upon reception of individual user
then only it gives the specific keys to the patients so that data are kept confidentially without loss of patients data.

Multidimensional architectures are employed for identify and recognize the data records. Large amount of databases
causes somewhat difficulties to manipulate the sensitive information so other techniques are used to implement.

2. Literature Review
Healthcare statistics to some quantity of patient governing is developing near a wireless digital nature for further
process. The alternatives are mainly concentrated fully to recover the present status of tablet using innovative
technologies, stock-and-petition economics, and finally by the effectiveness of wireless procedures. Wired equipment
would be awkward for patient observing and could be restricting the activities of the monitored users, announcing
objects [1].
Indonesia has stirred the employment of e-KTP to advance demography facts for the
resolution of removing the data compensation and inexactness data of people, which was
prepared by Ministry of Home Affairs. It is predictable to improve the excellence of the fact to
provision management rule and decision-assembly. In line up with this employment, there is a
trend to discover gadget e-Voting for succeeding vote since it suggests enormous advantage
to the culture particularly favors speed, accurateness and cost reserves [2].

The aim of information anonymization permits the freedom of systematically useful


information that retains the secrecy of its issues. This desire in excess of simply eliminating
remote identifiers since the information cans an aggressor even though still uses supporting
material to conclude dedicated separate data [3].

An immediate development of humanoid genome reviews hints to a robust request of


communal humanoid DNA data (e.g., allele rates, trial data, etc.), whose communal
broadcasting could be inhibited by confidentiality alarms. Earlier study displays that the
situation is likely to classify the occurrence of certain applicants in training after data, some
situation uniform completely improve the DNA series [4].
Traditionally, the subcontracting decoding system and secret key substitution encryption
were adapted to move the computational mass of the included events to the cloud minus
cooperating clients silence and facility providers intelligent matter. To guard the clients
confidentiality, secret BonehFranklin identity-based encryption (IBE) method is used in
medicinal analytical branching tree. In order to provide security, CAM is used as an
application point of view to provide solutions to particular healthcare systems [5].
Cloud computing is evolving as an innovative programming pattern in the healthcare
segment moreover extra commercial areas. Huge amounts of authority societies are in
progress changing the automatic health info to the cloud atmosphere. Announcing the cloud
facilities in the health segment but also enables the conversation of electric medicinal
accounts between the clinics and health center [6].

3. Proposed Method
3.1 Basic Healthcare monitoring system
The basic fundamental block diagram as shown below it includes client, server, STA and company and their functions
are explained briefly below.
a) Company: It is healthcare centre otherwise hospital. It stores the secret information and also all medical records
of user whenever it is necessary, a client sends a query to main server. Store is transferred between company and
server.

b) Server: Server presenting as a cloud which maintains all the activities of requested information from the client.
Therefore it is called medical storage resources. Query is established among the client and server.
c) STA: Secret keys are distributed around clients and obtaining medical fee services from client by using some
model (e.g. pay per use). Token are generated by using these token it is possible to access the data record. TokenGen
is obtained in between client and STA.
d) Client: Clients gets the stored information from server through company and convert those into attribute vectors.
Cipher texts are returned to client and initial setup made between STA and company.

Fig.1. Block Diagram of healthcare system

3.2 Tools requirement:


Hardware requirement:
System : Pentium IV 2.4 GHz
Hard Disk
: 40 GB.
Ram
: 512 MB
Software Requirement:

Operating System : Windows XP.


Coding Language : Java.
Database
: Oracle 10g.

4. Expected Output

Fig.2. User details data.

Fig.3.Outcome of Patients record.


Fig(2,3) shows the key generation and sending scheme method for entered data to check out
appropriate disease.Moreover, key is kept secret so no matter of leaking of information thus
safe the data. Token is generated and used for removing data. It also displays the
qurey,date,time.

5. Conclusion
Cloud Computing ability provides human advantages such as cheap cost reduction and actual resource
management. Here we design a cloud-assisted secure healthcare monitoring system, which could be efficiently secure
the confidentiality of users and the rational material properties of Healthcare facility sources. Between the numerous
encryption approaches IBE encryption is significant and more powerful associate to other approaches. Java workspace
guarantees the best workstation for valuation and analysis of any practical concerns. Finally progresses in the health
care preservation record of user are accomplished through secrecy.

Acknowledgement
I greatly acknowledge my project guide, Mr. Arun Kumar G, Associate Professor, Department of Electronics and
Communication Engineering, Sri Taralabalu Jagadguru Institute of Technology, Ranebennur and for providing the
required impetus and helping me for carrying out this survey work successfully.

References
[1] Gari D. Clifford and David Clifton, Wireless Technology in Disease Management and Medicine Ann. Rev. Medicine,
vol. 63, pp. 479492, 2012.
[2] Muharman Lubis, Mira Kartiwi and Sonny Zulhud, An overview of legal framework for personal data protection.
[3] Thomas A Lasko, Staal A Vinterbo, Spectral Anonymization of Data IEEE Trans Knowl Data Eng. 2010 March 1;
22(3): 437446. doi:10.1109/TKDE.2009.88.
[4] X. Zhou, B. Peng, Y. Li, Y. Chen, H. Tang, and X. Wang, To Release or Not to Release: Evaluating Information Leaks in
Aggregate Human-Genome Data,Computer Security-ESORICS 2011, pp. 607627, 2011.
[5] H. Lin, J. Shao, C. Zhang, and Y. Fang, CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring, IEEE
2013.
[6] Assad Abbas, Samee U. Khan,A Review on the State-of-the-Art Privacy Preserving Approaches in the e-Health Clouds.

Manasa k chigateri has completed her B.E in E&CE discipline from Visvesvaraya Technological
University at UBDTCE. She has completed her M.Tech in Digital Communication and Networking from
Visvesvaraya Technological University at STJIT.

Arun kumar G has completed his B.E in ECE discipline at Visvesvaraya University and M.Tech in Digital
Communication & Networking at kuvempu University. He is also pursuing his Ph.D. from VTU, Belagavi, Karnataka,
India. He was working as Associate Professor in Dept. of ECE at STJIT, Ranebennur, Haveri, Karnataka, India. He is
currently working as a faculty member in Electrical & Electronics Engineering Department, IBRI College of
Technology, IBRI, OMAN.

Вам также может понравиться