scholarly journals Impact of Cloud Database in Medical Healthcare Records based on Secure Access

In the future generation would development of new technologies, such as cloud computing, Internet of things (IOT), used in the medical field from concept to practice. Health care medical field is the major import role in cloud computing. The E-medical record contains the Healthcare providers HIS, but its deployment process slow due to high cost and high maintenance cost. In this paper study, electronic medic records with cloudbased security and access rights. In the cloud data ware house contained for all hospital patients details. Cloud middleware gives a platform for electronic healthcare system. It is provides to secure access the medical health record only authorized users and avoid unauthorized user. In this paper, proposed cloud computing design, which enables the secure and collaborative Emedical records among the all the hospitals with case of access rights.

2020 ◽  
Vol 75 (3) ◽  
pp. 256-263
Author(s):  
Maria Y. Egorova ◽  
Irina A. Shuvalova ◽  
Olga I. Zvonareva ◽  
Igor D. Pimenov ◽  
Olga S. Kobyakova ◽  
...  

Background. The organization of clinical trials (CTs) requires the participation and coordination of healthcare providers, patients, public and private parties. Obstacles to the participation of any of these groups pose a risk of lowering the potential for the implementation of CTs. Researchers are a key human resource in conducting of CT. Their motivation for participation can have a significant impact on the recruitment and retention of patients, on the quality of the data collected, which determines the overall outcome of the study. Aims to assess the factors affecting the inclusion of Russian physicians-researchers in CT, and to determine their role in relations with patients-participants. Materials and methods. The study was organized as a part of the Russian multicenter face-to-face study. A survey was conducted of researchers from 10 cities of Russia (20172018). The participation in the survey for doctors was anonymous and voluntary. Results. The study involved 78 respondents. Most research doctors highly value the importance of research for science (4,84 0,39), society (4,67 0,46) and slightly lower for participating patients (4,44 0,61). The expectations of medical researchers are related to improving their financial situation and attaining new experience (n = 14; 18,18%). However, the opportunity to work with new technologies of treatment and diagnosis (n = 41; 52,56%) acted as a motivating factor. According to the questionnaire, the vast majority of research doctors (n = 29; 37,18%) believe that the main reason for patients to participate in CT is to receive quality and free medical care. The most significant obstacle to the inclusion of participants in CT was the side effects of the study drug (n = 38; 48,71%). Conclusions. The potential of clinical researchers in Russia is very high. The patient-participant acts for the research doctor as the subject of the study, and not the object, so the well-being of the patient is not indifferent to the doctor. However, the features of the functioning of our health care system form the motivation of doctors-researchers (additional earnings, professional self-development) and the way they perceive the motivation of patients (CT as an opportunity to receive quality medical care).


Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


2014 ◽  
Vol 13 (7) ◽  
pp. 4625-4632
Author(s):  
Jyh-Shyan Lin ◽  
Kuo-Hsiung Liao ◽  
Chao-Hsing Hsu

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity to use a cloud service, especially for an international enterprise. In this paper we propose a cloud data storage scheme with some protocols to support group collaboration. A group of users can operate on a set of data collaboratively with dynamic data update supported. Every member of the group can access, update and verify the data independently. The verification can also be authorized to a third-party auditor for convenience.


2016 ◽  
Vol 45 (2) ◽  
pp. 28-48 ◽  
Author(s):  
Isaac Dery

Women’s access to and control over productive resources, including land, has increasingly been recognized in global discussions as a key factor in reducing poverty, ensuring food security and promoting gender equality. Indeed, this argument has been widely accepted by both feminists and development theorists since the 1980s. Based on qualitative research with 50 purposively selected men and women, this study explored the complexity of women’s access to and control over land within a specific relationship of contestations, negotiations, and manipulations with men. Data were analyzed using thematic analysis. While theoretically, participants showed that women’s [secure] access to and control over land has beneficial consequences to women themselves, households and the community at large, in principle, women's access and control status was premised in the traditional framework which largely deprives women, equal access and/or control over the land. The study indicates that even though land is the most revered resource and indeed, the dominant source of income for the rural poor, especially women, gender-erected discrimination and exclusion lie at the heart of many rural women in gaining access to land. This study argues that women's weak access rights and control over land continue to perpetuate the feminization of gender inequality–while men were reported to possess primary access and control over land as the heads of households, women were argued to have secondary rights due to their ‘stranger statuses’ in their husbands’ families. Overall, the degree of access to land among women was reported to be situated within two broad contexts–marriage and inheritance.


2014 ◽  
Vol 1008-1009 ◽  
pp. 1513-1516
Author(s):  
Hai Na Song ◽  
Xiao Qing Zhang ◽  
Zhong Tang He

Cloud computing environment is regarded as a kind of multi-tenant computing mode. With virtulization as a support technology, cloud computing realizes the integration of multiple workloads in one server through the package and seperation of virtual machines. Aiming at the contradiction between the heterogeneous applications and uniform shared resource pool, using the idea of bin packing, the multidimensional resource scheduling problem is analyzed in this paper. We carry out some example analysis in one-dimensional resource scheduling, two-dimensional resource schduling and three-dimensional resource scheduling. The results shows that the resource utilization of cloud data centers will be improved greatly when the resource sheduling is conducted after reorganizing rationally the heterogeneous demands.


2018 ◽  
Vol 189 ◽  
pp. 10015 ◽  
Author(s):  
Karim Zkik ◽  
Said EL Hajji ◽  
Ghizlane Orhanou

The information technology sector has experienced phenomenal growth during recent years. To follow this development many new technologies have emerged to satisfy the expectations of businesses and customers, such as Cloud Computing, mobility, virtualization, Internet of things and big data. Traditional network cannot longer support this growth and suffers more and more in terms of misconfiguration,management and configurations complexity. Software defined network (SDN) architectures can be considered as a big revolution in the field of computer networks, because they offer a centralized control on infrastructure, services and the applications deployed which facilitate configuration and management on the network. The implementation of this type of architecture is not obvious and requires great expertise and good handling and management of network equipment. To remedy this problem the SDN architectures have evolved towards distributed and hybrid architectures. Despites the advantages of using SDN, security issues remain a real obstacle in front of the deployment of this type of architecture. The centralized architecture of this type of networks makes it vulnerable to several types of attacks and intrusions, and the implementation of security equipment generally causes a decrease in performance and increase latency.


2016 ◽  
Vol 2016 ◽  
pp. 1-15 ◽  
Author(s):  
Franco Callegati ◽  
Walter Cerroni ◽  
Chiara Contoli

The emerging Network Function Virtualization (NFV) paradigm, coupled with the highly flexible and programmatic control of network devices offered by Software Defined Networking solutions, enables unprecedented levels of network virtualization that will definitely change the shape of future network architectures, where legacy telco central offices will be replaced by cloud data centers located at the edge. On the one hand, this software-centric evolution of telecommunications will allow network operators to take advantage of the increased flexibility and reduced deployment costs typical of cloud computing. On the other hand, it will pose a number of challenges in terms of virtual network performance and customer isolation. This paper intends to provide some insights on how an open-source cloud computing platform such as OpenStack implements multitenant network virtualization and how it can be used to deploy NFV, focusing in particular on packet forwarding performance issues. To this purpose, a set of experiments is presented that refer to a number of scenarios inspired by the cloud computing and NFV paradigms, considering both single tenant and multitenant scenarios. From the results of the evaluation it is possible to highlight potentials and limitations of running NFV on OpenStack.


Author(s):  
VINITHA S P ◽  
GURUPRASAD E

Cloud computing has been envisioned as the next generation architecture of IT enterprise. It moves the application software and databases to the centralized large data centers where management of data and services may not be fully trustworthy. This unique paradigm brings out many new security challenges like, maintaining correctness and integrity of data in cloud. Integrity of cloud data may be lost due to unauthorized access, modification or deletion of data. Lacking of availability of data may be due to the cloud service providers (CSP), in order to increase their margin of profit by reducing the cost, CSP may discard rarely accessed data without detecting in timely fashion. To overcome above issues, flexible distributed storage, token utilizing, signature creations used to ensure integrity of data, auditing mechanism used assists in maintaining the correctness of data and also locating, identifying of server where exactly the data has been corrupted and also dependability and availability of data achieved through distributed storage of data in cloud. Further in order to ensure authorized access to cloud data a admin module has been proposed in our previous conference paper, which prevents unauthorized users from accessing data and also selective storage scheme based on different parameters of cloud servers proposed in previous paper, in order to provide efficient storage of data in the cloud. In order to provide more efficiency in this paper dynamic data operations are supported such as updating, deletion and addition of data.


2019 ◽  
Vol 7 (1) ◽  
pp. 82-85
Author(s):  
Geetha Swaminathan

In the 21st Century, the buzzword is often used in all fields is “Innovation". It is no wonder using Innovation in day to the conversation as well as striving for innovation execution at organisations in Information Technology (IT) sectors. When we need to talk about innovation in IT sectors in the fast-moving technology IT organisations, they are in a position in increasing its capability in its innovative product and services. There is a lot of benefits out of business innovations that are being reaped in IT companies; there are apparent disadvantages are also the outcome of them. It is quite common, despite all benefits and drawbacks, they are in apposition to survive in the global market. That becomes a great challenge to all IT organisations. In IT organisations which consist of departments such as Development, Testing, Consulting, Networking, Infrastructure, Process and having common platforms and legacy languages, Apart from that they are in the way of invading new technologies such as Digital, Mobile, IoT, Artificial Intelligence, Machine learning Cloud computing. In all the fields, as mentioned above and area, they need to do innovation to sustain their business. This paper will provide elaborate results on Pros and Cons of Business Innovation in IT Organization.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Amr M. Sauber ◽  
Passent M. El-Kafrawy ◽  
Amr F. Shawish ◽  
Mohamed A. Amin ◽  
Ismail M. Hagag

The main goal of any data storage model on the cloud is accessing data in an easy way without risking its security. A security consideration is a major aspect in any cloud data storage model to provide safety and efficiency. In this paper, we propose a secure data protection model over the cloud. The proposed model presents a solution to some security issues of cloud such as data protection from any violations and protection from a fake authorized identity user, which adversely affects the security of the cloud. This paper includes multiple issues and challenges with cloud computing that impairs security and privacy of data. It presents the threats and attacks that affect data residing in the cloud. Our proposed model provides the benefits and effectiveness of security in cloud computing such as enhancement of the encryption of data in the cloud. It provides security and scalability of data sharing for users on the cloud computing. Our model achieves the security functions over cloud computing such as identification and authentication, authorization, and encryption. Also, this model protects the system from any fake data owner who enters malicious information that may destroy the main goal of cloud services. We develop the one-time password (OTP) as a logging technique and uploading technique to protect users and data owners from any fake unauthorized access to the cloud. We implement our model using a simulation of the model called Next Generation Secure Cloud Server (NG-Cloud). These results increase the security protection techniques for end user and data owner from fake user and fake data owner in the cloud.


Sign in / Sign up

Export Citation Format

Share Document