Enhancement of Cloud Computing Security in Health Care Sector
نویسنده
چکیده
Now-a-days Healthcare Sectors to create a cloud computing environment to obtain a patient's complete medical record. This environment reduces time consuming efforts and other costly operations and uniformly integrates collection of medical data to deliver it to the healthcare specialists. Electronic Health Records have been usually implemented to enable healthcare providers and patients to create, manage and access healthcare information from at any time and any place. Cloud environment provide the essential infrastructure at lower cost and improved quality. The Healthcare sector reduces the cost of storing, processing and updating with improved efficiency and quality by using Cloud computing. But today the security of data in cloud environment is not adequate. The electronic health record consists of images of the patient’s record which is very confidential. The Electronic Health Records in the healthcare sector includes the scan images, X-rays, DNA reports etc., which are considered as the patients private data. It requires a very high degree of privacy and authentication. So, providing security for a large volume of data with high efficiency is required in cloud environment. This paper introduces a new mechanism in which the images of patient’s record can be secured efficiently and the private data are wellmaintained for later use. Since most of the private data are in the form of images, extra care must be taken to secure these images. This can be done by converting the images into pixels and then encrypting those pixels. After the encryption, the single encrypted file is divided into ‘n’ number of files and they are stored in the cloud database server. The original data is obtained by merging the n divided files from the cloud database server and then decrypting that merged file using the private key which is made visible only to the authorized persons as required by the hospital. To protect the data in cloud database server cryptography is one of the important methods. Cryptography provides several symmetric and asymmetric algorithms to secure the data. This paper presents the symmetric cryptographic algorithm named as Advanced Encryption Standard (AES). KeywordsCloud environment, Electronic Health Record, Security, Healthcare Data, Encryption, Decryption, Cryptography, Advanced Encryption Standard (AES).
منابع مشابه
A Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملProposal for a Security Management in Cloud Computing for Health Care
Cloud computing is actually one of the most popular themes of information systems research. Considering the nature of the processed information especially health care organizations need to assess and treat specific risks according to cloud computing in their information security management system. Therefore, in this paper we propose a framework that includes the most important security processe...
متن کامل