Security System for Healthcare Data in Cloud Computing

被引:1
|
作者
Louk, Maya [1 ]
Lim, Hyotaek [2 ]
Lee, Hoon Jae [3 ]
机构
[1] Dongseo Univ, Grad Sch, Dept Ubiquitous IT, Busan 617716, South Korea
[2] Dongseo Univ, Div Comp & Engn, Busan 617716, South Korea
[3] Dongseo Univ, Div Comp & Engn, Busan 617716, South Korea
基金
新加坡国家研究基金会;
关键词
Cloud Computing; Cryptography; Functional Re-Encryption; Medical Data; tag and Mark; Tracking;
D O I
10.14257/ijsia.2014.8.3.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing is a renowned computing method of sharing data resources whether publicly or privately. Cloud computing is an answer for a better computing environment. It will reduce the costs which are used efficiently. Cloud computing can be used not only for business purposes but also for medical purposes which will be used by patients, specialists, pharmacists, nurses, doctors, and hospital administrations. As an implication, security is an important issue for cloud computing. Data privacy protection and data retrieval control are security issues for cloud computing. This Paper describes security elements like monitoring, recording, tracking and notification. For the purpose of encryption-decryption, AES-256/SHA will be used. Re-encryption "tag" and "mark" for data access system will only be functional for every legal user. It suggests that the cloud computing based on encryption and decryption services. Encrypted medical data could be accessed and decrypted from anywhere and whomever with particular authentication. The writer proposed the constructive idea of Healthcare data via cloud computing and the security accessing data by authorized individuals.
引用
收藏
页码:241 / 248
页数:8
相关论文
共 50 条
  • [41] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [42] Data security and risk assessment in cloud computing
    Li, Jing
    Li, Qinyuan
    [J]. 4TH ANNUAL INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORK (WCSN 2017), 2018, 17
  • [43] Homomorphic Encryption for Data Security in Cloud Computing
    Chauhan, Kamal Kumar
    Sanger, Amit K. S.
    Verma, Ajai
    [J]. 2015 14TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT 2015), 2015, : 206 - 209
  • [44] A framework for Data Security and Storage in Cloud Computing
    Bhandari, Akshita
    Gupta, Ashutosh
    Das, Debasis
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [45] Study on Data Security Mechanism in Cloud Computing
    Sandha
    Durga, M. Ganaga
    [J]. SECOND INTERNATIONAL CONFERENCE ON CURRENT TRENDS IN ENGINEERING AND TECHNOLOGY (ICCTET 2014), 2014, : 13 - 17
  • [46] Data Security and Privacy Protection of Cloud Computing
    Dai Xuebing
    Wang Zhaojing
    Zhang Yan
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1570 - +
  • [47] Study of Data Security Based On Cloud Computing
    Wang, Honghua
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 1609 - 1611
  • [48] Data Classification for achieving Security in cloud computing
    Shaikh, Rizwana
    Sasikumar, M.
    [J]. INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING TECHNOLOGIES AND APPLICATIONS (ICACTA), 2015, 45 : 493 - 498
  • [49] Ensuring Data Storage Security in Cloud Computing
    Wang, Cong
    Wang, Qian
    Ren, Kui
    Lou, Wenjing
    [J]. IWQOS: 2009 IEEE 17TH INTERNATIONAL WORKSHOP ON QUALITY OF SERVICE, 2009, : 37 - +
  • [50] Implementation of cloud computing in the German healthcare system
    Putzier, M.
    Khakzad, T.
    Dreischarf, M.
    Thun, S.
    Trautwein, F.
    Taheri, N.
    [J]. NPJ DIGITAL MEDICINE, 2024, 7 (01)