Protection of Medical Data Sharing and Intrusion Avoidance Based on Cloudlet
Journal: International Journal of Trend in Scientific Research and Development (Vol.2, No. 3)Publication Date: 2018-08-02
Authors : M. Babu V. Priyadharshini R. Punitha V. Reena;
Page : 758-760
Keywords : Cloud computing; Data privacy; Encryption; Intrusion detection; Healthcare;
Abstract
Generally medical data is commonly known as health information of patients, organize and track medical records for healthcare facilities. It can be analyzed for service quality and insurance reimbursement purpose. Cloud assisted healthcare big data computing becomes critical to meet user's ever growing demands on health consultation. The body data collected by device is transmits to the mobile. The mobile collects the information in an array. The information contains user's sensitive information, so it converts to cipher text format. The patients suffer from similar kinds of symptoms; they can able to exchange their information and suggest hospital in personal chat application. A similar disease patient connected to common group, they exchange their information. Patient information's are divided into two types and stored in cloud. The two types are EID and MI. EID is the property which can identify the user apparently. MI contains medical information such as disease type and medicine. The two information stored in two independent tables. EID stored in cipher text format and MI stored in plaintext format. M. Babu | V. Priyadharshini | R. Punitha | V. Reena"Protection of Medical Data Sharing and Intrusion Avoidance Based on Cloudlet" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11086.pdf http://www.ijtsrd.com/engineering/computer-engineering/11086/protection-of-medical-data-sharing-and-intrusion-avoidance-based-on-cloudlet/m-babu
Other Latest Articles
- Experimental Investigation on Surface Roughness and Vibration Parameters in Turning of EN8K steel using PTFE / Nylon66 Liners for Carbide Insert Cutting Tools
- Classification on Missing Data for Multiple Imputations
- Deployment of ID3 decision tree algorithm for placement prediction
- Business Excellence Model: A Selective Study
- An Adaptive IoT Framework: using FPGA Based SOC for varying Applications
Last modified: 2018-08-02 21:17:53