An Efficient Approach for Secured E-Health Cloud System Using Identity Based Cryptography Techniques in Cloud Computing Environment

被引:0
|
作者
Mittal, Shikha [1 ]
Singh, Paramjeet [2 ]
Malhotra, Rahul [3 ]
机构
[1] IKGPTU, Dept CSE, Kapurthala, India
[2] GZSCCET, Dept CSE, Bathinda, India
[3] SDDIET, Barwala, India
关键词
Cloud computing; EHR; Data Privacy; Key Management;
D O I
10.26782/jmcms.2019.06.00010
中图分类号
O3 [力学];
学科分类号
08 ; 0801 ;
摘要
Nowadays, cloud computing is an interesting research area among the researchers. It is an internet-based pool of heterogeneous resources. Cloud environment is very much reliable to make availability of resources when required to online users. Reliable computing services can be handled without any own infrastructures, so it would be considered as an alternate cost effective technique. Most of the organizations utilized the technique of cloud computing to host their applications. The service of the health care unit is the most essential service for the people. There is a necessity to store the sensitive information related to the patient's medical history in a secure way. Therefore, the research and development in the Personal Health records and Electronic Health records is negligible area. Thus the most robust encryption and decryption should be encountered. One among the advanced technology in cloud computing is the maintenance of Electronic Health Records (EHR). The main objective of this paper is to propose and implement a methodology to exchange the health information about a particular person in a secured cloud environment. The medical information about a patient from distributed manner is also maintained in EHR by cloud environment. The stored information of the user provides the facility of collecting, sharing, exchanging and organizing that information through users. Therefore, an efficient approach for securing e-health cloud system using identity based cryptography techniques is presented in this research study.
引用
收藏
页码:124 / 134
页数:11
相关论文
共 50 条
  • [1] Secured Outsourcing Towards a Cloud Computing Environment Based on DNA Cryptography
    Hammami, Hamza
    Brahmi, Hanen
    Ben Yahia, Sadok
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 31 - 36
  • [2] Using Identity-Based Cryptography as a Foundation for an Effective and Secure Cloud Model for E-Health
    Mittal, Shikha
    Bansal, Ankit
    Gupta, Deepali
    Juneja, Sapna
    Turabieh, Hamza
    Elarabawy, Mahmoud M.
    Sharma, Ashish
    Bitsue, Zelalem Kiros
    COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE, 2022, 2022
  • [3] Cost-effective secure E-health cloud system using identity based cryptographic techniques
    Wang, Xu An
    Ma, Jianfeng
    Xhafa, Fatos
    Zhang, Mingwu
    Luo, Xiaoshuang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 67 : 242 - 254
  • [4] Developing an e-health system based on IoT, fog and cloud computing
    Monteiro, Kayo
    Rocha, Elisson
    Silva, Emerson
    Santos, Guto Leoni
    Santos, Wylliams
    Endo, Patricia Takako
    2018 IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING COMPANION (UCC COMPANION), 2018, : 17 - 18
  • [5] E-Health Framework Based on Autonomic Cloud Computing
    Martinovic, Goran
    Zoric, Bruno
    SECOND INTERNATIONAL CONFERENCE ON CLOUD AND GREEN COMPUTING / SECOND INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING AND ITS APPLICATIONS (CGC/SCA 2012), 2012, : 214 - 218
  • [6] Implementation of E-Health Care System using Web Services and Cloud Computing
    Dhanaliya, Unnati
    Devani, Anupam
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 1034 - 1036
  • [7] Challenges and Issues of E-Health Applications in Cloud and Fog Computing Environment
    Premkumar, N.
    Santhosh, R.
    MOBILE COMPUTING AND SUSTAINABLE INFORMATICS, 2022, 68 : 711 - 721
  • [8] An efficient cloud based face recognition system for e-health secured login using steerable pyramid transform and local directional pattern
    Dosaj A.
    Satapathy S.C.
    Soundrapandiyan R.
    Kaur M.
    Hannoon N.
    Journal of Ambient Intelligence and Humanized Computing, 2024, 15 (1) : 1017 - 1027
  • [9] Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography
    Ahamed, N. Niyaz
    Duraipandian, N.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2022, 41 (01): : 83 - 94
  • [10] An efficient secure authentication on cloud based e-health care system in WBAN
    Rani, A. Antony Viswasa
    Baburaj, E.
    BIOMEDICAL RESEARCH-INDIA, 2016, 27 : S53 - S59