Skip to main content

Design of EHR in Cloud with Security

  • Conference paper
  • First Online:
Smart Intelligent Computing and Applications

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 105))

Abstract

The adaptation of data and resource sharing in health care is more popular and maintaining of Electronic Health Records (EHR) is efficient to doctors and patients. Nowadays storing of health records in cloud environment is more popular and low cost with scalable of data to access. But the security of those data assurance will be less in current technology. Health care started using a storing of data in cloud with minimal level of security. We propose method to provide data security and access control to the constraints patients or doctors to access the data using encryption of unique identification. We introduce a multi-user encryption with authorization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Deshmukh, P.: Design of cloud security in the EHR for Indian healthcare services. J. King Saud Univ. Comput. Inf. Sci. 29(3), 281–287 (2017)

    Article  Google Scholar 

  2. Hu, H., Xu, J., Ren, C., Choi, B.: Processing private queries over untrusted data cloud through privacy homomorphism. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 601–612 (2011)

    Google Scholar 

  3. Sahafizadeh: Survey on access control models. In: 2010 2nd International Conference on Future Computer and Communication (ICFCC), vol. 1, pp. V1–1. IEEE (2010)

    Google Scholar 

  4. Huang, Q.Z.: Medical information integration based cloud computing. In: 2011 International Conference on Network Computing and Information Security

    Google Scholar 

  5. Geoghegan, S.: The latest on data sharing and secure cloud computing. Law. Order 24–26 (2012)

    Google Scholar 

  6. Li, H.-C.: Analysis on cloud-based security vulnerability assessment. In: 2010 IEEE 7th International Conference on e-Business Engineering (ICEBE), pp. 490–494. IEEE (2010)

    Google Scholar 

  7. Boyinbode, O.: CloudMR: a cloud based electronic medical records. Int. J. Hybrid Inf. Technol. 8(4), 201–212 (2015)

    Google Scholar 

  8. Ved, V., Tyagi, V., Agarwal, A., Pandya, A.S.: Personal health record system and integration techniques with various electronic medical record systems. In: 2011 IEEE 13th International Symposium on High-Assurance System Engineering, pp. 91–94 (2011)

    Google Scholar 

  9. Xu, X., Li, L.: An artificial urban health care system and applications. IEEE Trans. Intell. Syst. 25(3), 63–73 (2010)

    Article  Google Scholar 

  10. Benaloh, J., Chase, M., Horvitz, E., Lauter, K.: Patient controlled encryption: ensuring privacy of electronic medical records. In: Proceedings of the 2009 ACM Workshop on Cloud Computing Security, pp. 103–114. ACM (2009)

    Google Scholar 

  11. Zhou: Security and privacy in cloud computing: a survey. In: 2010 Sixth International Conference on Semantics Knowledge and Grid (SKG), pp. 105–112. IEEE (2010)

    Google Scholar 

  12. Tong, Y., Sun, J., Chow, S.S.M., Li, P.: Cloud assisted mobile access of health data with privacy and auditability. IEEE J. Biomed. Health Inf. 18(2), 419–429 (2014)

    Article  Google Scholar 

  13. Wang, Y.-H.: The role of SAAS privacy and security compliance for continued SAAS use (2011)

    Google Scholar 

  14. Tang, P.C., Ash, J.S., Bates, D.W., Overhage, J.M., Sands, D.Z.: Personal health records: definitions, benefits and strategies for overcoming barriers to adoption. J. Am. Med. Inf. Assoc. 13(2), 121–126 (2006)

    Article  Google Scholar 

  15. Oza, N., Karppinen, K.: User experience and security in the cloud—an empirical study in the finnish cloud consortium. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 621–628. IEEE (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to R. Prathap .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prathap, R., Mohanasundaram, R., Ashok Kumar, P. (2019). Design of EHR in Cloud with Security. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Intelligent Computing and Applications . Smart Innovation, Systems and Technologies, vol 105. Springer, Singapore. https://doi.org/10.1007/978-981-13-1927-3_45

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1927-3_45

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1926-6

  • Online ISBN: 978-981-13-1927-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics