scholarly journals Medical Data Sharing in Cloud Computing with Privacy Protection and Intrusion Avoidance for Patient

2020 ◽  
Author(s):  
Suresh Kondeti ◽  
Siva Kumar

With the popularity of smart electronic devices, along with the development of clouds and cloudlet technology, there has been increasing need to provide better medical care. The processing chain of medical data mainly includes data collection, data storage and data sharing, etc. Traditional healthcare system often requires the delivery of medical data to the cloud, which involves users’ sensitive information and causes communication energy consumption. Practically, medical data sharing is a critical and challenging issue. Along these lines in this paper, we develop a novel human services framework by using the adaptability of cloudlet. The elements of cloudlet incorporate security assurance, information sharing and interruption location. In the phase of information accumulation, we initially use Number Theory Research Unit (NTRU) technique to scramble client's body information gathered by wearable gadgets. Those information will be transmitted to close-by cloudlet in a vitality productive form. Also, we introduce another trust model to assist clients with selecting trustable accomplices who need to share put away information in the cloudlet. The trust demonstrate additionally causes comparable patients to speak with each other about their illnesses. Thirdly, we partition clients' therapeutic information put away in remote billow of healing facility into three sections, and give them appropriate insurance. At long last, keeping in mind the end goal to shield the medicinal services framework from malignant assaults, we build up a novel cooperative interruption discovery framework (IDS) strategy in view of cloudlet work, which can viably keep the remote social insurance huge information cloud from assaults. Our examinations show the viability of the proposed conspire.

2018 ◽  
Vol 7 (2.32) ◽  
pp. 164
Author(s):  
Syed. Karimunnisa ◽  
K Suma Anusha

With the development of clouds and cloudlet technology along with wearable devices, the need for providing security to medical data can be increased. Medical data includes data collection, data storage and data sharing, etc. Traditional healthcare system transmits the medical data to the cloud using sensitive information which causes communication energy consumption. Practically, sharing medical data is a challenging task. Thus in this paper, we propose a novel healthcare system by using the flexibility of cloudlet. The operations of cloudlet include privacy protection, data sharing and intrusion detection. In data collection stage, First, the data collected by wearable devices is encrypted using Number Theory Research Unit (NTRU) method and that encrypted data can be transfered to nearby cloudlet. Secondly, we develop a new trust model to help users to select trustable similar patients who want to share stored data in the cloudlet and to communicate with each other about their diseases. Thirdly, we divide users’ medical data into three parts and give them security which is stored in remote cloud of hospital. Finally, to protect the healthcare system from malicious attacks, we implement a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh, Our experiments proves the effectiveness of the proposed scheme.  


2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Maliha Sultana ◽  
Afrida Hossain ◽  
Fabiha Laila ◽  
Kazi Abu Taher ◽  
Muhammad Nazrul Islam

Abstract Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data vulnerable to cyber attacks. Medical records in particular seem to be the regular victims of hackers. Several data breach incidents throughout history have warranted the invention of security measures against these threats. Although various security procedures like firewalls, virtual private networks, encryption, etc are present, a mix of these approaches are required for maximum security in medical image and data sharing. Methods Relatively new, blockchain has become an effective tool for safeguarding sensitive information. However, to ensure overall protection of medical data (images), security measures have to be taken at each step, from the beginning, during and even after transmission of medical images which is ensured by zero trust security model. In this research, a number of studies that deal with these two concepts were studied and a decentralized and trustless framework was proposed by combining these two concepts for secured medical data and image transfer and storage. Results Research output suggested blockchain technology ensures data integrity by maintaining an audit trail of every transaction while zero trust principles make sure the medical data is encrypted and only authenticated users and devices interact with the network. Thus the proposed model solves a lot of vulnerabilities related to data security. Conclusions A system to combat medical/health data vulnerabilities has been proposed. The system makes use of the immutability of blockchain, the additional security of zero trust principles, and the scalability of off chain data storage using Inter Planetary File Systems (IPFS). The adoption of this system suggests to enhance the security of medical or health data transmission.


2021 ◽  
Vol 1 ◽  
pp. 80
Author(s):  
Thijs Devriendt ◽  
Clemens Ammann ◽  
Folkert W. Asselbergs ◽  
Alexander Bernier ◽  
Rodrigo Costas ◽  
...  

Various data sharing platforms are being developed to enhance the sharing of cohort data by addressing the fragmented state of data storage and access systems. However, policy challenges in several domains remain unresolved. The euCanSHare workshop was organized to identify and discuss these challenges and to set the future research agenda. Concerns over the multiplicity and long-term sustainability of platforms, lack of resources, access of commercial parties to medical data, credit and recognition mechanisms in academia and the organization of data access committees are outlined. Within these areas, solutions need to be devised to ensure an optimal functioning of platforms.


This modern society expects sophisticated modern health care services to enhance the healthy living conditions. The world’s ageing population and prevalence of chronic diseases has lead to high demand for medical data monitoring. The modern technology is supporting in all the way to realize the sophisticated health services. Specialized doctors are generally very rare and they may be geographically far away from needy patient. Without the support of technology, they cannot provide health services from remote places. In most of the cases, patients are immovable to doctor’s place due to their critical health conditions. But, the technology is a coming to help in such situations in a great way. The modern technology is helping in providing health services remotely with same quality as a local doctor can provide. The key concept behind this technology is collecting health data with highest possible accuracy and sharing it with remotely present health specialists. The wearable devices can collect body data most accurately and can send data to cloud for sharing it with remotely present health specialists. But, we know, sharing medical information is very critical and challenging issue because medical information contains patient’s important and highly confidential information. On the other hand, medical ethics says that doctors cannot share patient’s health records with others without the consent of patient. Such data will be shared between only authentic persons in cloud. The chain of processing mainly includes data collection, data storage, and data sharing. In this work a protected cloudlet based medical data sharing is proposed. In this paper, three major issues pertaining to medical data sharing are addressed. Firstly, a method for secured medical data sharing using cloudlet is proposed. During data collection, Number Theory Research Unit (NTRU) method used to encrypt user’s body data collected by wearable devices, then transmitted to nearby cloudlet. Secondly, a new trust model to help users to select trustable partners for sharing stored data in the cloudlet is presented. This model is to help similar patients to communicate with each other. Thirdly, a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh is proposed, which can effectively prevent the remote healthcare big data cloud from attacks. Finally, an analysis of security to the information is presented and the results are quite encouraging.


2021 ◽  
Vol 1 ◽  
pp. 80
Author(s):  
Thijs Devriendt ◽  
Clemens Ammann ◽  
Folkert W. Asselberghs ◽  
Alexander Bernier ◽  
Rodrigo Costas ◽  
...  

Various data sharing platforms are being developed to enhance the sharing of cohort data by addressing the fragmented state of data storage and access systems. However, policy challenges in several domains remain unresolved. The euCanSHare workshop was organized to identify and discuss these challenges and to set the future research agenda. Concerns over the multiplicity and long-term sustainability of platforms, lack of resources, access of commercial parties to medical data, credit and recognition mechanisms in academia and the organization of data access committees are outlined. Within these areas, solutions need to be devised to ensure an optimal functioning of platforms.


2021 ◽  
Author(s):  
Xianfei Zhou ◽  
Jing Huang ◽  
Fulong Chen ◽  
Yuqing Tang ◽  
Canlin Wang ◽  
...  

Abstract With the rapid development of medical information technology, the medical cyber-physical system is undergoing a rapid transformation, and the safe storage and sharing of medical data are facing great challenges. It makes the work of safe medical data storage, privacy protection and data sharing get more difficult. In this paper, we propose the combination of private blockchain and consortium blockchain that can protect information security and realize data sharing. In the system, the medical records of each node are stored in the private blockchain, and the shared data is on the consortium blockchain so as to improve the data storage and reduce data redundancy. And the threshold signature scheme without trusted center is applied in the system. In order to initiate threshold signature, a set of nodes is constructed by the sponsoring doctor, in which the threshold signature process is initiated. When there are no less than $t$ nodes sending part-signatures, the signature can be synthesized to group signature. This scheme can be well applied to the scene of multidisciplinary joint consultation in the medical blockchain. The scheme proposed in this paper has high security and computing efficiency.


2020 ◽  
Vol 2020 ◽  
pp. 1-11
Author(s):  
Liang Huang ◽  
Hyung-Hyo Lee

With the features of decentralization and trustlessness and through distributed data storage, point-to-point transmission, and encryption algorithms, blockchain has shed new light on the security and protection of medical data, and it can resolve the contradiction between data sharing and privacy protection with proper security strategies. In this paper, we integrate the strengths of both blockchain and cloud computing and build the privacy protection scheme for medical data based on blockchain and cloud computing. This scheme introduces cloud computing and provides services to blockchain nodes with cloud server computing; meanwhile, it collects, analyzes, processes, and maintains medical data in the identity authentication interface and solves the insufficient computing abilities of some nodes in blockchain so as to verify the authenticity and reliability of data. The simulation experiment proves that the proposed scheme is effective. It can achieve the secure protection and integrity verification of medical data and address the problems of high computing complexity, data sharing, and privacy protection.


2018 ◽  
Vol 3 (2) ◽  
pp. 74
Author(s):  
Helina Apriyani ◽  
Sismadi Sismadi ◽  
Sefrika Sefrika

AbstrakInternet of things (IoT) adalah sebuah konsep yang menghubungkan komputer dan perangkat elektronik melalui internet dan dapat dikendalikan dari jarak jauh. Konsep terpenting dalam Internet of things (Iot) adalah modul sistem informasi, koneksi internet dan penyimpanan datanya dalam cloud computing. Konsep ini memiliki manfaat besar dalam perkembangan usaha dan kelangsungan bisnis perusahaan dimana hampir semua bidang menggunakan IoT untuk dapat bersaing di pasaran. Indonesia merupakan sebuah negara yang dianugerahi kekayaan alam yang melimpah ruah. Salah satu komoditi unggulan adalah produk pertanian. Penelitian ini bertujuan untuk membantu para petani dalam memasarkan produknya melalui e-commerce dengan menggunakan konsep Internet of things IoT. Metode penelitian dengan menggunakan metode incremental.  Incremental digunakan untuk mendesai produk, kemudian  diimplementasikan, dan diuji secara bertahap (setiap modul akan ditambahkan bertahap) hingga produk selesai. Hasil penelitian ini digunakan untuk membantu petani di Kabupaten Bogor untuk mendistribusikan penjualannya secara luas, meningkatkan revenue dan memutus rantai panjang proses penjualan. Kata kunci— sistem penjualan, incremental, Internet of Things (IoT), produk pertanian, Kabupaten Bogor Abstract Internet of things (IoT) is a concept that connects computers and electronic devices via the internet and can be controlled remotely. The main concept in Internet of things (IoT) is information systems, internet connections and data storage in cloud computing. This concept has great benefits in the efforts and efforts used to use IoT to be able to compete in the market. Indonesia is a country that is blessed with abundant natural resources. One of the leading commodities is agricultural products. This study aims to help farmers market their products through e-commerce using the IoT Internet of things concept. Research method using incremental method. Incremental to design the product, then implemented, and gradually delay (each module will be added gradually) until the product is finished. The results of this study are to help farmers in Bogor Regency to distribute sales widely, increase revenue and break the sales process. Keywords—sales system, incremental, Internet of Things (IoT), agricultural products, Kabupaten Bogor


2021 ◽  
Vol 58 (4) ◽  
pp. 102604
Author(s):  
Renpeng Zou ◽  
Xixiang Lv ◽  
Jingsong Zhao

Sign in / Sign up

Export Citation Format

Share Document