phat 20(23): e1

Research Article

Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study

Download1003 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.165497,
        author={Shilpi Harnal and R.K. Chauhan},
        title={Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study},
        journal={EAI Endorsed Transactions on Pervasive Health and Technology},
        volume={6},
        number={23},
        publisher={EAI},
        journal_a={PHAT},
        year={2020},
        month={6},
        keywords={Cloud Computing, Role-Based Access Control, Access control, Security, DDOS, Multimedia cloud computing, Hospital, eHealth},
        doi={10.4108/eai.13-7-2018.165497}
    }
    
  • Shilpi Harnal
    R.K. Chauhan
    Year: 2020
    Towards Secure, Flexible and Efficient Role Based Hospital’s Cloud Management System: Case Study
    PHAT
    EAI
    DOI: 10.4108/eai.13-7-2018.165497
Shilpi Harnal1,*, R.K. Chauhan1
  • 1: Department of Computer Science and Application, Kurukshetra University, Kurukshetra, India
*Contact email: shilpi13n@gmail.com

Abstract

INTRODUCTION: Many organizations of health care have recognized that quality of service can be improved by maintaining e-records of patient’s reports, medical histories, surgeries recordings, etc. over the multimedia cloud servers. But, the data breach is always a matter of stake for an organization as well as for the patients.

OBJECTIVES: This work has considered a qualitative scenario related to multimedia e-content management for a multiforte hospital’s cloud server.

METHODS: An End-to-End Encryption with the cryptographic algorithm is applied along with an access control framework for secure transmission and storage of e-records.

RESULTS: The results are presented in the form of bar graphs for the time taken to perform encryption/decryption of various media files and combo graphs for different scenarios of access control.

CONCLUSION: This can provide prevention from many attacks/threats, ensures authentication and privacy along with limiting the server usage and cost.