The Concept of Cloud Computing Services e-health Education

Article history: Received Feb 10 th , 2013 Revised Mar 15 th , 2013 Accepted May 10 th , 2013 This paper presented a concept design of the software architecture of health education services in cloud computing. The design of health education services include open consultation with a doctor of preventive measures taken by a patient, the way the first aid accident, illness symptoms and consultation with expert consultation system. Methodology for analysis of the problem is the Strengths, Weaknesses, Opportunities, and Threats analysis. The approach used to build Software as Services is hierarchy data mining. Hierarchy data mining is the method used to distribute facts to multiple servers and integration of data from multiple clusters. Security systems for database and communication system in health education using public key methods. The result of this paper is a cloud computing service architecture concepts to help transformation of technology applications to the cloud with respect to opportunities and risks for development of these applications and the potential benefits of cloud computing services when people in the field of health education achieved. Keyword: Cloud Services e-health cloud Cloud Computing Health Education Health Information

[1]  Qiang Zhang,et al.  The Characteristics of Cloud Computing , 2010, 2010 39th International Conference on Parallel Processing Workshops.

[2]  Jameela Al-Jaroodi,et al.  e-Health Cloud: Opportunities and Challenges , 2012, Future Internet.

[3]  Eduardo B. Fernández Introduction to the Special Issue on Recent Advances in Web Services , 2012, Future Internet.

[4]  Ke Wang,et al.  Hierarchical Classification of Real Life Documents , 2001, SDM.

[5]  Bernd Grobauer,et al.  Understanding Cloud Computing Vulnerabilities , 2011, IEEE Security & Privacy.

[6]  A. Norris,et al.  Essentials of Telemedicine and Telecare , 2001 .

[7]  Daniel Mellado,et al.  Security Analysis in the Migration to Cloud Environments , 2012, Future Internet.

[8]  Weider D. Yu,et al.  A service modeling approach to service requirements in SOA and cloud computing — Using a u-Healthcare system case , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.

[9]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[10]  Jakob Jonsson,et al.  On the Security of RSA Encryption in TLS , 2002, CRYPTO.

[11]  Chaitanya K. Baru,et al.  A Seeded Cloud Approach to Health Cyberinfrastructure: Preliminary Architecture Design and Case Applications , 2012, 2012 45th Hawaii International Conference on System Sciences.

[12]  George Karypis,et al.  Evaluation of hierarchical clustering algorithms for document datasets , 2002, CIKM '02.

[13]  Ming Li,et al.  Securing Personal Health Records in Cloud Computing: Patient-Centric and Fine-Grained Data Access Control in Multi-owner Settings , 2010, SecureComm.

[14]  Cong Wang,et al.  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.

[15]  Dejan Dinevski,et al.  Adapted User-Centered Design: A Strategy for the Higher User Acceptance of Innovative e-Health Services , 2012, Future Internet.