Cloud Assisted Mobile Access Of Health Data With Privacy And Audit Ability

Navuduri Sruthi, K Lakshmi Priya

Abstract


— Monitoring and advising patients via mobile health care system is the current trend in medical field that acts as a life saver due to its availability at anytime and anywhere. This e-healthcare system requires patient’s private data to be available at cloud, outsourced data storage. This situation faces privacy issues. Hence the proposed approach focus on providing a private cloud for mobile users to ensure less cost, effective and secure storage. The data keyed in the mobile is transferred to private cloud, which in turn is processed and again transferred to public cloud. The sensitivity of the outsourced cloud data is maintained using Attribute based Encryption technique which restricts data access based on encrypt/decrypt of data with its access structures. The data privacy is ensured by PRF based key management and secures indexing methodologies. Personal Health records view ability access control to the actual data owner is the core idea of this project. The project segregates the access users in to Public Domain Users and Private Domain users.


Keywords


e-Health, Privacy, Auditability, Access Control.

References


P. Mohan, D. Marin, S. Sultan, and A. Deen, “Medinet: personalizing the self-care process for patients with diabetes and cardiovascular disease using mobile telephony.” Conference Proceedings of the International Conference of IEEE Engineering in Medicine and Biology Society, vol. 2008, no. 3, pp. 755–758. [Online]. Available: http://www.ncbi.nlm.nih.gov/pubmed/19162765

A. Tsanas, M. Little, P. McSharry, and L. Ramig, “Accurate telemonitoring of parkinson’s disease progression by noninvasive speech tests,” Biomedical Engineering, IEEE Transactions on, vol. 57, no. 4, pp. 884 – 893, 2010.

G. Clifford and D. Clifton, “Wireless technology in disease management and medicine,” Annual Review of Medicine, vol. 63, pp. 479–492, 2012.

L. Ponemon Institute, “Americans’ opinions on healthcare privacy, available: http://tinyurl.com/4atsdlj,” 2010.

A. V. Dhukaram, C. Baber, L. Elloumi, B.-J. van Beijnum, and P. D. Stefanis, “End-user perception towards pervasive cardiac healthcare services: Benefits, acceptance, adoption, risks, security, privacy and trust,” in PervasiveHealth, 2011, pp. 478–484.

M. Delgado, “The evolution of health care it: Are current u.s. privacy policies ready for the clouds?” in SERVICES, 2011, pp. 371–378.

N. Singer, “When 2+ 2 equals a privacy question,” New York Times, 2009.

E. B. Fernandez, “Security in data intensive computing systems,” in Handbook of Data Intensive Computing, 2011, pp. 447–466.

A. Narayanan and V. Shmatikov, “Myths and fallacies of personally identifiable information,” Communications of the ACM, vol. 53, no. 6, pp. 24–26, 2010.

P. Baldi, R. Baronio, E. D. Cristofaro, P. Gasti, and G. Tsudik, “Countering gattaca: efficient and secure testing of fully-sequenced human genomes,” in ACM Conference on Computer and Communications Security, 2011, pp. 691–702.

Sites Referred:

http://java.sun.com

http://www.sourcefordgde.com

http://www.networkcomputing.com/

http://www.roseindia.com/

http://www.java2s.com/


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.