Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique

Cloud-based platforms are helping organizations like health care systems to improve conditions of patients and saving their lives. Medical professionals are making use of cloud technology to collect information regarding patients more than before and exchange it over different geographical regions. However, the exchange of patient data and information is taking place via complex systems with huge vulnerabilities and risks. In this article, the authors have outlined a model for preserving privacy in data storage used in health care systems by validating access to the data through IP based detection and geographical location-based security techniques. Later, the privacy is enabled by using k-mean clustering technique for validating the user access and avail subscriptions whenever consumer want to use the organization services. The authors also provide the concept of using constant key length encryption technique to secure data on cloud storage irrespective of the type of user.

[1]  Costas Lambrinoudakis,et al.  Cryptography Goes to the Cloud , 2011, STA Workshops.

[2]  Farhana Ahad,et al.  Information hiding in medical images: a robust medical image watermarking system for E-healthcare , 2017, Multimedia Tools and Applications.

[3]  Javaid A. Sheikh,et al.  Electronic Health Record hiding in Images for smart city applications: A computationally efficient and reversible information hiding technique for secure communication , 2020, Future Gener. Comput. Syst..

[4]  Kyungho Jeon,et al.  The HybrEx Model for Confidentiality and Privacy in Cloud Computing , 2011, HotCloud.

[5]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[6]  Gang Ren,et al.  Source Address Validation: Architecture and Protocol Design , 2007, 2007 IEEE International Conference on Network Protocols.

[7]  Thomas Engel,et al.  Verification of Data Location in Cloud Networking , 2011, 2011 Fourth IEEE International Conference on Utility and Cloud Computing.

[8]  Dimitrios Zissis,et al.  Addressing cloud computing security issues , 2012, Future Gener. Comput. Syst..

[9]  Shubhashis Sengupta,et al.  Cloud Computing Security--Trends and Research Directions , 2011, 2011 IEEE World Congress on Services.

[10]  Ahmad-Reza Sadeghi,et al.  Securing the e-health cloud , 2010, IHI.

[11]  Farhana Ahad,et al.  A New Reversible and high capacity data hiding technique for E-healthcare applications , 2017, Multimedia Tools and Applications.

[12]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[13]  Mamoon Rashid,et al.  Securing Data Storage By Extending Role-Based Access Control , 2013, Int. J. Cloud Appl. Comput..

[14]  Alfredo De Santis,et al.  Device Tracking in Private Networks via NAPT Log Analysis , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[15]  Mehmet Hadi Gunes,et al.  Enhancing data privacy and integrity in the cloud , 2011, 2011 International Conference on High Performance Computing & Simulation.

[16]  Sushil Jajodia,et al.  Privacy of data outsourced to a cloud for selected readers through client-side encryption , 2011, WPES '11.

[17]  Hassan A. Aziz,et al.  Cloud Computing and Healthcare Services , 2016 .

[18]  Guan Yong,et al.  Research on k-means Clustering Algorithm: An Improved k-means Clustering Algorithm , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.

[19]  D. Turgay Altilar,et al.  Cloud-based E-health systems: Security and privacy challenges and solutions , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).

[20]  Martin Gilje Jaatun,et al.  Beyond lightning: A survey on security challenges in cloud computing , 2013, Comput. Electr. Eng..

[21]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.