Mobile Cloud-Privacy and Data Security in Healthcare Environment Using Cloudsim Simulator

  • Authors

    • R Parameswari
    • K Vani
    2018-08-15
    https://doi.org/10.14419/ijet.v7i3.27.17880
  • Cloud computing, cloudsim, data center, cloud analyst, cloud data security.
  • The advancement of telecommunication in the medical field makes the diagnosis and treatment of patients in a faster manner because the patient information are stored and maintained in an electronic storage device. But there are some issues related to physical data storage, privacy by accessing user data and security etc. With the help of the cloud computing these issues are reduced now. The mobile health care system can improve the quality of patient care and reduce a medical cost for both patients and hospitals. The simulation tool CloudSim is used to generate the data center details, provider’s details and processing time.  For the analysis, the cloud analyst tool can simulate the data center and others.  The patient information in the Healthcare Information System (HIS) and Electronic Medical Records (EMRs) is stored in a data center or cloud platform in a secure manner.

     

     

  • References

    1. [1] Mell P & Grance T, “NIST Definition of Cloud Computingâ€, USA: National Institute of Standards and Technology, (2011).

      [2] AbuKhousa E, Mohamed N & AlJaroodi J, “e-Health Cloud: Panchumarthi, G. P., & Surendar, S. M. A. (2017). A review article on Fin-FET based self-checking full adders. Journal of Advanced Research in Dynamical and Control Systems, 9(4).

      [3] Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I & Zaharia M, “A View of Cloud Computingâ€, Communication of the ACM, Vol.53, No.4, (2010).

      [4] Arora R & Anshu P, “Cloud Computing Is Transforming-Secure user data in cloud computing using encryption algorithmsâ€, International Journal of Engineering Research and Applications, (2013), pp.1922-1926.

      [5] Berry LL & Bendapudi N, “Health care: a fertile field for service researchâ€, Journal of Service Research, Vol.10, No.2, (2007), pp.111–122.

      [6] Boroujerdi M & Nazem S, “Cloud Computing: Changing Cogitation about Computingâ€, World Academy of Science, Engineering and Technology, (2009).

      [7] Varshney U, “Pervasive healthcare and wireless health monitoring, Mobile Networks and Applicationsâ€, Kluwer Academic Publishers, Vol.12, (2007), pp.113–127.

      [8] Cong W, Chow SSM, Qian W, Kui R & Wenjing L, “Privacy preserving public auditing for secure cloud storageâ€, IEEE Transactions on Computers, Vol.62, (2013), No.2.

      [9] Jeager PT, Lin J & Crimes JM, “Cloud Computing and information policy: Computing in a policy cloudâ€, Journal of Information Technology and Politics, Vol.5, No.3, (2008), pp.269-283.

      [10] Johan GB, “Electronic healthcare record; a way to empower the patientâ€, International Journal of Medical Informatics, Vol.69, (2003), pp.191-196.

      [11] Kim J, Beresford AR & Stajano F, “Towards a Security Policy for Ubiquitous Healthcare Systemsâ€, Proc. 1st International Conference on Ubiquitous Convergence Technology, (2006), pp. 263–272.

      [12] Kuyuto SO, Ibikunle F & Awodele O, “Cloud computing security issues and challengesâ€, International Journal of Computer Networks (IJCN), Vol.3, No.5, (2011), pp.247-255.

      [13] Lour H, Sadeghi AR & Winandy M, “Securing the E-Health Cloudâ€, Proc. First ACM International Health Informatics Symposium, (2010), pp.220-229.

      [14] Villalobos Antúnez, JV (2017). Karl R. Popper, Heráclito y la invención del logos. Un contexto para la Filosofía de las Ciencias Sociales. Opción Vol. 33, Núm. 84. 5-11

      [15] M Pallarès Piquer and O Chiva Bartoll (2017). La teoría de la educación desde la filosofía de Xavier Zubiri. Opción, Año 33, No. 82 (2017): 91-113

  • Downloads

  • How to Cite

    Parameswari, R., & Vani, K. (2018). Mobile Cloud-Privacy and Data Security in Healthcare Environment Using Cloudsim Simulator. International Journal of Engineering & Technology, 7(3.27), 220-222. https://doi.org/10.14419/ijet.v7i3.27.17880