Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet

Authors

  • Dubey KV Department Of Computer Engineering,R.M.D, sinhgad school of engineering, Pune ,India
  • Lomte VM Department Of Computer Engineering,R.M.D, sinhgad school of engineering, Pune ,India

DOI:

https://doi.org/10.26438/ijcse/v6i9.58

Keywords:

Privacy Protection, Data Sharing, Collaborative Intrusion Detection, System (IDS), Healthcare

Abstract

An individual's medical record is a vital form that can be used to track patient data accurately, reliably and completely. For all purposes, the exchange of repair information is a basic and test problem. Consequently, in this document, we develop a new structure for human services through the use of cloudlet adaptability. Cloudlet elements include security insurance, information exchange, and breakpoint location. In the information accumulation phase, we initially used the Numerical Theory Research Unit (NTRU) technique to encode client body information collected from a portable device. This information will be send to near cloudlets in a competent form of vitality. In addition, we show another model of trust to allow customers to choose trusted partners who want to share data stored in the cloudlet. The demonstration of trust also makes comparable patients who talk to each other about their illnesses. Third, we isolate the patient's medical information stored at a distance in three sections and provide them with adequate insurance.

References

[1] A. Sajid and H. Abbas, “Data privacy in cloud-assisted healthcare systems: State of the art and future challenges,” Journal of Medical Systems, vol. 40, no. 6, pp. 1–16, 2016.

[2] R. Mitchell and I.-R. Chen, “Behaviour rule specification-based intrusion detection for safety critical medical cyber physical systems,” Dependable and Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 16–30, 2015.

[3] Y. Shi, S. Abhilash, and K. Hwang, “Cloudlet mesh for securing mobile clouds from intrusions and network attacks,” in The Third IEEE International Conference on Mobile Cloud Computing, Services, and Engineering,(Mobile Cloud 2015). IEEE, 2015.

[4] M. Quwaider and Y. Jararweh,“ Cloudlet-based efficient data collection in wireless body area networks,” Simulation Modelling Practice and Theory, vol. 50, pp. 57–71, 2015.

[5] M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,” 2015.

[6] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, and D. Georgakopoulos, “A security framework in g-hadoop for big data computing across distributed cloud data centres,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.

[7] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.

[8] H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion detection and prevention system in cloud computing,” in AFRICON, 2013. IEEE, 2013, pp. 1–5.

[9]R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” in Cloud Computing (CLOUD), 2010 IEEE 3rdInternational Conference on. IEEE, 2010, pp. 268–275.

[10] K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for telehome healthcare,” in Engineering in Medicine and Biology Society, 2004. IEMBS’ 04.26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387.

Downloads

Published

2018-09-30
CITATION
DOI: 10.26438/ijcse/v6i9.58
Published: 2018-09-30

How to Cite

[1]
K. V. Dubey and V. M. Lomte, “Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet”, Int. J. Comp. Sci. Eng., vol. 6, no. 9, pp. 5–8, Sep. 2018.

Issue

Section

Research Article