A Secured Cloud based Health Care Data Management System

With the advent of Information Technology many research works are going on medical data collection. But most of the works are facing shortcomings in management of data. A huge amount of data that is generated by different sensors and uploaded into the server through Wireless Sensor Network (WSN) faces a several types of security, privacy, flexibility, scalability and confidentiality challenges. Existing architectures for patient‟s health data collection lack of different types of security issues. In this paper, we have proposed a secured Health cloud architecture for patient‟s health data collection. Our work is based on WSN integrated with Cloud computing technology. We have proposed to have Cypher text Policy-ABE within our cloud infrastructure to guarantee data security, privacy and fine grained access control of data. We have also give constraint on attributes of different types of patients to reduce unnecessary data storage. Thus our proposal makes the whole data collection and management technique unique.

[1]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Aleksandar Milenkovic,et al.  Journal of Neuroengineering and Rehabilitation Open Access a Wireless Body Area Network of Intelligent Motion Sensors for Computer Assisted Physical Rehabilitation , 2005 .

[3]  Fugang Wang,et al.  Cyberaide JavaScript: A JavaScript Commodity Grid Kit , 2008, 2008 Grid Computing Environments Workshop.

[4]  Marco Furini,et al.  International Journal of Computer and Applications , 2010 .

[5]  Xi He,et al.  Experiment and Workflow Management Using Cyberaide Shell , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.

[6]  Siani Pearson,et al.  Towards accountable management of identity and privacy: sticky policies and enforceable tracing services , 2003, 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings..

[7]  K. Wac,et al.  Mobile patient monitoring: The MobiHealth system , 2009, 2009 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[8]  Gail-Joon Ahn,et al.  Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.

[9]  Young-Koo Lee,et al.  Semi-Markov conditional random fields for accelerometer-based activity recognition , 2010, Applied Intelligence.

[10]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[11]  Xiaohui Liang,et al.  ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing , 2011, Int. J. Secur. Networks.

[12]  Biao Song,et al.  A framework of sensor-cloud integration opportunities and challenges , 2009, ICUIMC '09.

[13]  Yacine Challal,et al.  Secure and Scalable Cloud-Based Architecture for e-Health Wireless Sensor Networks , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[14]  Xi He,et al.  Cloud Computing: a Perspective Study , 2010, New Generation Computing.

[15]  Stefan Katzenbeisser,et al.  Rights Management Technologies: A Good Choice for Securing Electronic Health Records? , 2007, ISSE.

[16]  Heejo Lee,et al.  Human Identification Through Image Evaluation Using Secret Predicates , 2007, CT-RSA.

[17]  J. O'Donoghue,et al.  Telemedicine: issues and implications. , 2002, Technology and health care : official journal of the European Society for Engineering and Medicine.