Open Access   Article Go Back

Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet

Kavita V. Dubey1 , Vina M. Lomte2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 5-8, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.58

Online published on Sep 30, 2018

Copyright © Kavita V. Dubey, Vina M. Lomte . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kavita V. Dubey, Vina M. Lomte , “Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.5-8, 2018.

MLA Style Citation: Kavita V. Dubey, Vina M. Lomte "Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet." International Journal of Computer Sciences and Engineering 6.9 (2018): 5-8.

APA Style Citation: Kavita V. Dubey, Vina M. Lomte , (2018). Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet. International Journal of Computer Sciences and Engineering, 6(9), 5-8.

BibTex Style Citation:
@article{Dubey_2018,
author = {Kavita V. Dubey, Vina M. Lomte },
title = {Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {5-8},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2813},
doi = {https://doi.org/10.26438/ijcse/v6i9.58}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.58}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2813
TI - Healthcare System with Intrusion Detection and Privacy Protection based Cloudlet
T2 - International Journal of Computer Sciences and Engineering
AU - Kavita V. Dubey, Vina M. Lomte
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 5-8
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
845 765 downloads 355 downloads
  
  
           

Abstract

An individual`s medical record is a vital form that can be used to track patient data accurately, reliably and completely. For all purposes, the exchange of repair information is a basic and test problem. Consequently, in this document, we develop a new structure for human services through the use of cloudlet adaptability. Cloudlet elements include security insurance, information exchange, and breakpoint location. In the information accumulation phase, we initially used the Numerical Theory Research Unit (NTRU) technique to encode client body information collected from a portable device. This information will be send to near cloudlets in a competent form of vitality. In addition, we show another model of trust to allow customers to choose trusted partners who want to share data stored in the cloudlet. The demonstration of trust also makes comparable patients who talk to each other about their illnesses. Third, we isolate the patient`s medical information stored at a distance in three sections and provide them with adequate insurance.

Key-Words / Index Term

Privacy Protection, Data Sharing, Collaborative Intrusion Detection System (IDS), Healthcare

References

A. Sajid and H. Abbas, “Data privacy in cloud-assisted healthcare systems: State of the art and future challenges,” Journal of Medical Systems, vol. 40, no. 6, pp. 1–16, 2016.
[2] R. Mitchell and I.-R. Chen, “Behaviour rule specification-based intrusion detection for safety critical medical cyber physical systems,” Dependable and Secure Computing, IEEE Transactions on, vol. 12, no. 1, pp. 16–30, 2015.
[3] Y. Shi, S. Abhilash, and K. Hwang, “Cloudlet mesh for securing mobile clouds from intrusions and network attacks,” in The Third IEEE International Conference on Mobile Cloud Computing, Services, and Engineering,(Mobile Cloud 2015). IEEE, 2015.
[4] M. Quwaider and Y. Jararweh,“ Cloudlet-based efficient data collection in wireless body area networks,” Simulation Modelling Practice and Theory, vol. 50, pp. 57–71, 2015.
[5] M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,” 2015.
[6] J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej, A. Streit, and D. Georgakopoulos, “A security framework in g-hadoop for big data computing across distributed cloud data centres,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.
[7] N. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014.
[8] H. Mohamed, L. Adil, T. Saida, and M. Hicham, “A collaborative intrusion detection and prevention system in cloud computing,” in AFRICON, 2013. IEEE, 2013, pp. 1–5.
[9]R. Zhang and L. Liu, “Security models and requirements for healthcare application clouds,” in Cloud Computing (CLOUD), 2010 IEEE 3rdInternational Conference on. IEEE, 2010, pp. 268–275.
[10] K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices for telehome healthcare,” in Engineering in Medicine and Biology Society, 2004. IEMBS’ 04.26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387.