CFP last date
20 December 2024
Reseach Article

A Secured Cloud based Health Care Data Management System

by Md. Fakhrul Alam Onik, Khairul Anam, Syed Sabir Salman - Al - Musawi, Nafiul Rashid
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 49 - Number 12
Year of Publication: 2012
Authors: Md. Fakhrul Alam Onik, Khairul Anam, Syed Sabir Salman - Al - Musawi, Nafiul Rashid
10.5120/7680-0983

Md. Fakhrul Alam Onik, Khairul Anam, Syed Sabir Salman - Al - Musawi, Nafiul Rashid . A Secured Cloud based Health Care Data Management System. International Journal of Computer Applications. 49, 12 ( July 2012), 24-30. DOI=10.5120/7680-0983

@article{ 10.5120/7680-0983,
author = { Md. Fakhrul Alam Onik, Khairul Anam, Syed Sabir Salman - Al - Musawi, Nafiul Rashid },
title = { A Secured Cloud based Health Care Data Management System },
journal = { International Journal of Computer Applications },
issue_date = { July 2012 },
volume = { 49 },
number = { 12 },
month = { July },
year = { 2012 },
issn = { 0975-8887 },
pages = { 24-30 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume49/number12/7680-0983/ },
doi = { 10.5120/7680-0983 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:46:06.882418+05:30
%A Md. Fakhrul Alam Onik
%A Khairul Anam
%A Syed Sabir Salman - Al - Musawi
%A Nafiul Rashid
%T A Secured Cloud based Health Care Data Management System
%J International Journal of Computer Applications
%@ 0975-8887
%V 49
%N 12
%P 24-30
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the advent of Information Technology many research works are going on medical data collection. But most of the works are facing shortcomings in management of data. A huge amount of data that is generated by different sensors and uploaded into the server through Wireless Sensor Network (WSN) faces a several types of security, privacy, flexibility, scalability and confidentiality challenges. Existing architectures for patient's health data collection lack of different types of security issues. In this paper, we have proposed a secured Health cloud architecture for patient's health data collection. Our work is based on WSN integrated with Cloud computing technology. We have proposed to have Cypher text Policy-ABE within our cloud infrastructure to guarantee data security, privacy and fine grained access control of data. We have also give constraint on attributes of different types of patients to reduce unnecessary data storage. Thus our proposal makes the whole data collection and management technique unique.

References
  1. http://www. cloudbook. net/downloads/index. php?file=cloudbook-magazine-aug- 2010. pdf
  2. http://www. dynamicglobalstaffing. com/news
  3. Milan Petkovi´c, "Rights Management Technologies: A Good Choice for Securing Electronic Health Records?". In ISSE/SECURE 2007: securing electronic business processes: highlights of the Information Security Solutions Europe/SECURE 2007 Conference, page 178. Springer, 2007
  4. Ng, J. , Lo, B. , Wells, O. , and Sloman, M. (2004). Ubiquitous Monitoring Environment for Wearable and Implantable Sensors (UbiMon). In Proceedings of the International Conference on Ubiquitous Computing (Ubicomp).
  5. Singh, G. , O'Donoghue, J. , and Soon, C. K. (2002), "Telemedicine: Issues and Implications". Technology Health Care,10(1):1–10.
  6. D. Konstantas et al. , "Mobile Patient Monitoring: The MobiHealth System". Proc. Int'l. Cong. Med. and Care Compunetics, Hague, The Netherlands, 2–4 June 2004.
  7. E. Jovanov et al. , "A Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation". J. NeuroEng. and Rehab. , vol. 2, no. 11, Mar. 2005, p. 6.
  8. Mrinmoy Barua*, Xiaohui Liang, Rongxing Lu and Xuemin Shen. "ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud Computing", International Journal of Security and Networks, 2011.
  9. X. Liang, R. Lu, X. Lin, and X. Shen. "Patient self-controllable access policy on phi in healthcare systems", AHIC 2010, Kitchener, Ontario, Canada, pp. 1–5.
  10. S. Yu, C. Wang, K. Ren and W. Lou, (2010), "Achieving secure, scalable, And fine-grained data access control in cloud computing", INFOCOM, 2010 Proceedings IEEE, San Diego, CA, USA, pp. 1–9.
  11. IBM, Staying aloft in tough times, 2009
  12. C. D. Plummer, T. J. Bittman, T. Austin, D. W. Cearley and D. M. Smith. Cloud Computing: Defining and Describing an Emerging. Phenomenon, 2008
  13. Staten, J. , Is Cloud Computing Ready For The Enterprise? 2008.
  14. Mell, P. and GRANCE, T. 2009. Draft NIST Working Definition of Cloud Computing.
  15. L. Wang, G. von Laszewski, A. Younge, X. He, M. Kunze, and J. Tao. Cloud computing: a perspective study. New Generation Computing, to appear in 2010.
  16. G. von Laszewski, A. Younge, X. He, K. Mahinthakumar, and L. Wang. "Experiment and Workflow Management Using Cyberaide Shell", 4th International Workshop on Workflow Systems in e-Science (WSES 09) in conjunction with 9th IEEE International Symposium on Cluster Computing and the Grid. IEEE, 2009.
  17. G. von Laszewski, F. Wang, A. Younge, X. He, Z. Guo, and M. Pierce, "Cyberaide JavaScript: A JavaScript Commodity Grid Kit". GCE08 at SC'08. Austin, TX: IEEE, Nov. 16 2008.
  18. http://csrc. nist. gov/ publications/drafts/800-145/Draft-SP-800-145_cloud- definition. pdf
  19. L. Vinh, X. H. Le, S. Lee. "Semi Markov Conditional Random Fields for Accelerometer Based Activity Recognition (submitted)".
  20. M. Hassan, E. Huh, " A Framework of Sensor-Cloud Integration: Opportunities and Challenges". International Conference on Ubiquitous , Information Management and Communication.
  21. H. Jameel, R. A. Shaikh, H. Lee and S. Lee. Human Identification through Image Evaluation Using Secret Predicates. Topics in Cryptology - CT-RSA 07, LNCS 4377 (2007) 67–84.
  22. Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah and Yacine Challal "Secure and Scalable Cloud-based Architecture for e-Health Wireless sensor networks"
  23. M. C. Mont, S. Pearson, and P. Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In Database and Expert Systems Applications, 2003. Proceedings. 14th International Workshop on, pages 377–382. IEEE, 2003.
  24. A. Sahai and B. Waters, "Fuzzy Identity-Based encryption," in Lecture Notes in Computer Science, vol. 3494, 2005, pp. 457–473.
  25. Hassan Takabi and James B. D. Joshi, Gail-Joon Ahn", Security and Privacy Challenges in Cloud Computing Environments", IEEE computer society,
  26. CP-ABE toolkit : http://acsc. cs. utexas. edu/cpabe/
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing Wireless Sensor Network H-cloud CP-ABE Data Encryption Decryption