Protection of electronic health records (EHRs) in cloud

EHR technology has come into widespread use and has attracted attention in healthcare institutions as well as in research. Cloud services are used to build efficient EHR systems and obtain the greatest benefits of EHR implementation. Many issues relating to building an ideal EHR system in the cloud, especially the tradeoff between flexibility and security, have recently surfaced. The privacy of patient records in cloud platforms is still a point of contention. In this research, we are going to improve the management of access control by restricting participants' access through the use of distinct encrypted parameters for each participant in the cloud-based database. Also, we implement and improve an existing secure index search algorithm to enhance the efficiency of information control and flow through a cloud-based EHR system. At the final stage, we contribute to the design of reliable, flexible and secure access control, enabling quick access to EHR information.

[1]  S.Charanyaa,et al.  Certain Investigations on Securing MovingData Objects , 2014 .

[2]  K. Sangeetha,et al.  Term Frequency Based Sequence Generation Algorithm for Graph Based Data Anonymization , 2014 .

[3]  Carmelo Pino,et al.  A Survey of Cloud Computing Architecture and Applications in Health , 2013 .

[4]  S. Balamurugan,et al.  Certain Investigations on Strategies for Protecting Medical Data in Cloud , 2014 .

[5]  Pieter Van Gorp,et al.  Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud , 2014, IEEE Journal of Biomedical and Health Informatics.

[6]  R R Frerichs,et al.  Introduction of a microcomputer for health research in a developing country--the Bangladesh experience. , 1985, Public health reports.

[7]  T. Shanmugapriya,et al.  Certain Investigations on Approaches for Protecting Graph Privacy in Data Anonymization , 2013 .

[8]  Lein Harn,et al.  A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..

[9]  Selim G. Akl,et al.  An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.

[10]  Selim G. Akl,et al.  Adaptive Cryptographic Access Control , 2010, Advances in Information Security.

[11]  Selim G. Akl,et al.  Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.

[12]  David W. Bates,et al.  Viewpoint Paper: A Research Agenda for Personal Health Records (PHRs) , 2008, J. Am. Medical Informatics Assoc..

[13]  S. Charanyaa,et al.  Privacy Preserving Personal Health Care Data in Cloud , 2014 .

[14]  Chin-Chen Chang,et al.  A new key assignment scheme for enforcing complicated access control policies in hierarchy , 2003, Future Gener. Comput. Syst..

[15]  K. Sangeetha,et al.  Proposing a Novel Synergized K-Degree L-Diversity T-Closeness Model for Graph Based Data Anonymization , 2014 .

[16]  Pekka Ruotsalainen A cross-platform model for secure Electronic Health Record communication , 2004, Int. J. Medical Informatics.

[17]  Alison Richardson,et al.  Does the patient‐held record improve continuity and related outcomes in cancer care: a systematic review , 2007, Health expectations : an international journal of public participation in health care and health policy.

[18]  Wendy L. Currie,et al.  Conflicting institutional logics: a national programme for IT in the organisational field of healthcare , 2007, J. Inf. Technol..

[19]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[20]  G. Mini,et al.  Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud , 2014 .

[21]  Kalaignar Karunanidhi,et al.  Modified Partitioning Algorithm for Privacy Preservation in Microdata Publishing with Full Functional Dependencies , 2013 .