Data Security in Cloud for Health Care Applications

With the proliferation of data in medical field and health care systems towards cloud, maintaining the huge volume of sensitive data becomes mandatory. This paper describes into the benefit of cloud computing for healthcare organizations and examines the availability and security considerations that healthcare data requires. The proposed model strengthens the availability and security of data using metadata. The metadata created based on DCMI standards provides easy access of data by locating the server and secure the data resting in the cloud. In this paper security is enforced by cipher key which is generated from the attributes of metadata by providing two novel features. 1. Security is provided, where the encryption and decryption keys cannot be compromised without the involvement of data owner and health care organization, hence makes the data secured 2. The cipher key generated using modified feistel network increases the complexity of the key which strengthens the security effect.

[1]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[2]  Bernhard Seeger,et al.  Dynamic Metadata Management for Scalable Stream Processing Systems , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[3]  K. Popovic,et al.  Cloud computing security issues and challenges , 2010, The 33rd International Convention MIPRO.

[4]  Chiemi Watanabe,et al.  Query log perturbation method for privacy preserving query , 2010, ICUIMC '10.

[5]  A. Mathew,et al.  Survey Paper on Security & Privacy Issues in Cloud Storage Systems , 2012 .

[6]  P. Venkata Krishna,et al.  Global Trends in Information Systems and Software Applications , 2012, Communications in Computer and Information Science.

[7]  Bernd Blobel,et al.  A systematic approach for analysis and design of secure health information systems , 2001, Int. J. Medical Informatics.

[8]  Yang Tang,et al.  Secure Overlay Cloud Storage with Access Control and Assured Deletion , 2012, IEEE Transactions on Dependable and Secure Computing.

[9]  Pangfeng Liu,et al.  Metadata Partitioning for Large-Scale Distributed Storage Systems , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[10]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2013, The Journal of Supercomputing.

[11]  Saswati Mukherjee,et al.  A Dynamic Semantic Metadata Model in Cloud Computing , 2011 .

[12]  Thomas Neubauer,et al.  PERiMETER – pseudonymization and personal metadata encryption for privacy-preserving searchable documents , 2012 .