An Enhanced Methodology to Protect the Patient Healthcare Records Using Multi-Cloud Approach

R. Josephius Arunkumar, R. Anbuselvi


Now-a-days, most hospitals and medical centers is to manage huge volume of patient’s medical records into database. It is essential to collect and access this information everywhere, to increase productivity and improve quality of health cares. Need to access electronic health information across the world and improve the quality of healthcare to patients will highlight importance of using cloud computing architecture in this area. But, despite the benefits of cloud computing applications for health care, the security challenges of cloud should be addressed. In this paper, we introduce and describe a new proposed model called Electronic Health Record with Multi-Clouds Databases. This model will ensure the privacy of persons in a network and multi-cloud environment using cryptographic algorithm and distributed storage. This model is able to store any type of data such as number, string, image, etc. in a cloud environment. The Electronic Health Record with Multi-Clouds Database prevent from illegal intrusion and access to data in cloud environment and provide services such as data integrity, confidentiality and permanent availability of data in a safe and secure way. The evaluation results of proposed method show that despite increasing time of information storage and retrieval and System overhead

Full Text:



Zaigham Mahmood, “Data Location and Security Issues in Cloud Computing”, Proceedings of the 2011 International Conference on Emerging Intelligent Data and Web Technologies, pp. 49-54, Tirana, Albania, September 2011.

Benjamin Fabian, Tatiana Ermakova and Philipp Junghanns, “Collaborative and secure sharing of healthcare data in multi-clouds”, Information Systems, Volume 48 Issue C, 2015,pp 132-150.

Balasaraswathi, V. R., and Manikandan, S. , “Enhanced security for multi-cloud storage using cryptographic data splitting with dynamic approach”, In Advanced Communication, International Conference on Control and Computing Technologies (ICACCCT), 2014 on (pp. 1190-1194). IEEE.

Mazhar Ali, RevathiDhamotharan, ErajKhan,SameeU.Khan,AthanasiosV.Vasilakos, KeqinLi and Albert.Y.Zomaya, “SeDaSC: Secure Data Sharing in Clouds”, Systems Journal, IEEE, volume :PP, Issue:99,2015,pp 1-10.

Wang Liang,ChenKe-fei,Mao Xian-ping and Wang Yongtao , “Efficient and Provably-Secure Certificate less Proxy Re-encryption Scheme for Secure Cloud Data Sharing”, Journal of Shanghai Jiaotong University ,Volume 19, issue 4,2014, pp 398-405.

PengXu, XiaqiLiu,ZhenguoSheng,XuanShan and KaiShuang , “SSDS-MC: Slice-based Secure Data Storage in MultiCloud Environment”, 11th EAI International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE) , 2015,pp 304-309.

ShunganZhou,RuiyingDu,JingChen,HuaDeng,JianShen and Huanguo Zhang , “SSEM: Secure, Scalable and Efficient multi-owner data sharing in clouds”, China Communications IEEE ,Volume 13,issue 8, 2016,pp 231-243.

IbrahimAbdullah Althamary, TalalMousa and Alkharobi , “Secure File Sharing in Multi-Cloud using Shamir’s Secret Sharing Scheme”, Transactions on Network and communications Vol 4 issue 6, 2016,pp53-67.

Safaa Salam Hatem, MagedH.Wafy,Mahmoud , “Malware Detection in cloud Computing”,,InternationalJourna of Advanced Science and Computer Science Applications,Vol 5 No 2014.

M. AlZain, E. Pardede, B. Soh and J. Thom, “Cloud Computing Security: From Single to Multi-clouds”, Proceedings of (HICSS), IEEE, pp. 5490–5499, Hawaii, 2012.

HsunChuang ,Syuan-Hao Li , Kuan-Chieh Huang andYau-Hwang Kuo, “An Effective Privacy Protection Scheme for Cloud Computing”, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT), pp. 260 - 265, Seoul , Feb 2011.

Uma Somani, Kanika Lakhani and Manish Mundra, “Implementing Digital Signature with RSA Encryption Algorithm to Enhance the Data Security of Cloud in Cloud Computing”, Proceedings of the 2010 1st International Conference on Parallel, Distributed and Grid Computing (PDGC - 2010), pp. 211-216, Solan, India, Oct 2010.

Jun Feng, Yu Chen, Wei-Shinn Ku and Zhou Su, “D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-order keystream Generation”, Proceedings of the 2010 IEEE International Conference on Communications (ICC), pp.1-6, September 2010.


  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.