Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet
DOI:
https://doi.org/10.26438/ijcse/v6i9.58Keywords:
Privacy Protection, Data Sharing, Collaborative Intrusion Detection, System (IDS), HealthcareAbstract
An individual's medical record is a vital form that can be used to track patient data accurately, reliably and completely. For all purposes, the exchange of repair information is a basic and test problem. Consequently, in this document, we develop a new structure for human services through the use of cloudlet adaptability. Cloudlet elements include security insurance, information exchange, and breakpoint location. In the information accumulation phase, we initially used the Numerical Theory Research Unit (NTRU) technique to encode client body information collected from a portable device. This information will be send to near cloudlets in a competent form of vitality. In addition, we show another model of trust to allow customers to choose trusted partners who want to share data stored in the cloudlet. The demonstration of trust also makes comparable patients who talk to each other about their illnesses. Third, we isolate the patient's medical information stored at a distance in three sections and provide them with adequate insurance.
References
[1] A. Sajid and H. Abbas, “Data privacy in cloud-assisted healthcare systems: State of the art and future challenges,” Journal of Medical Systems, vol. 40, no. 6, pp. 1–16, 2016.
[2] R. Mitchell and I.-R. Chen, “Behaviour rule specification-based intrusion detection for safety critical medical cyber physical systems,” Dependable and Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 16–30, 2015.
[3] Y. Shi, S. Abhilash, and K. Hwang, “Cloudlet mesh for securing mobile clouds from intrusions and network attacks,” in The Third IEEE International Conference on Mobile Cloud Computing, Services, and Engineering,(Mobile Cloud 2015). IEEE, 2015.
[4] M. Quwaider and Y. Jararweh,“ Cloudlet-based efficient data collection in wireless body area networks,” Simulation Modelling Practice and Theory, vol. 50, pp. 57–71, 2015.
[5] M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,” 2015.
[6] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, and D. Georgakopoulos, “A security framework in g-hadoop for big data computing across distributed cloud data centres,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.
[7] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.
[8] H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion detection and prevention system in cloud computing,” in AFRICON, 2013. IEEE, 2013, pp. 1–5.
[9]R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” in Cloud Computing (CLOUD), 2010 IEEE 3rdInternational Conference on. IEEE, 2010, pp. 268–275.
[10] K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for telehome healthcare,” in Engineering in Medicine and Biology Society, 2004. IEMBS’ 04.26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
