ArticlePDF Available

Private cloud solution for Securing and Managing Patient Data in Rural Healthcare System

Authors:

Abstract and Figures

Rural healthcare system in India is managing patient data in a traditional paper based system. Most of the rural hospitals in India are lacking in resources to maintain and manage the patient health data. As the world moves towards digitization, one of the key challenges in developing countries like India is in making the healthcare data accessible from rural to urban in digital form. Advancement in IT technology in healthcare sector has made it possible to maintain and manage the patient data in digital form in all levels of healthcare system. Cloud computing has emerged as a main in providing healthcare IT solution. Therefore, rural healthcare organizations should move towards building their own private cloud infrastructure which could be an excellent solution for the country’s needs to have improved healthcare in rural areas. In private cloud, medical data is stored in databases in which some of the data in a medical database is sensitive in nature and access to this data should be limited to authorized persons. In this paper we propose a secure cloud architecture by building private cloud. The proposed private cloud architecture makes use of two database one for storing medical record and another for key. To reduce the risk of the health information leakage and safeguard the health data, hash and the encryption operation are performed before transmitting to the cloud database. With this technique, path for a third party to obtain the sensitive information stored in the cloud is being blocked. Therefore the proposed framework provides better secured services to the users.
Content may be subject to copyright.
ScienceDirect
Available online at www.sciencedirect.com
Procedia Computer Science 135 (2018) 688–699
1877-0509 © 2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational
Intelligence 2018.
10.1016/j.procs.2018.08.217
10.1016/j.procs.2018.08.217
© 2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational
Intelligence 2018.
1877-0509
Available online at www.sciencedirect.com
Procedia Computer Science 00 (2018) 000–000
www.elsevier.com/locate/procedia
3rd International Conference on Computer Science and Computational Intelligence 2018
Private cloud solution for Securing and Managing Patient Data in
Rural Healthcare System
Raghavendra Ganiga, Radhika M Pai*, Manohara Pai M M, Rajesh Kumar Sinhaa
Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, India
aSchool of Allied Health Science, Manipal Academy of Higher Education, Manipal, India
Abstract
Rural healthcare system in India is managing patient data in a traditional paper based system. Most of the rural hospitals in India
are lacking in resources to maintain and manage the patient health data. As the world moves towards digitization, one of the
key challenges in developing countries like India is in making the healthcare data accessible from rural to urban in digital form.
Advancement in IT technology in healthcare sector has made it possible to maintain and manage the patient data in digital form
in all levels of healthcare system. Cloud computing has emerged as a main in providing healthcare IT solution. Therefore, rural
healthcare organizations should move towards building their own private cloud infrastructure which could be an excellent solution
for the country’s needs to have improved healthcare in rural areas. In private cloud, medical data is stored in databases in which
some of the data in a medical database is sensitive in nature and access to this data should be limited to authorized persons. In this
paper we propose a secure cloud architecture by building private cloud. The proposed private cloud architecture makes use of two
database one for storing medical record and another for key. To reduce the risk of the health information leakage and safeguard
the health data, hash and the encryption operation are performed before transmitting to the cloud database. With this technique,
path for a third party to obtain the sensitive information stored in the cloud is being blocked. Therefore the proposed framework
provides better secured services to the users.
c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intel-
ligence 2018.
Keywords: Rural; Healthcare; Private ;rural; cloud;encryption
Corresponding author. Tel.: +91-994-567-1361
E-mail address: radhika.pai@manipal.edu
1877-0509 c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intelligence 2018.
Available online at www.sciencedirect.com
Procedia Computer Science 00 (2018) 000–000
www.elsevier.com/locate/procedia
3rd International Conference on Computer Science and Computational Intelligence 2018
Private cloud solution for Securing and Managing Patient Data in
Rural Healthcare System
Raghavendra Ganiga, Radhika M Pai*, Manohara Pai M M, Rajesh Kumar Sinhaa
Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, India
aSchool of Allied Health Science, Manipal Academy of Higher Education, Manipal, India
Abstract
Rural healthcare system in India is managing patient data in a traditional paper based system. Most of the rural hospitals in India
are lacking in resources to maintain and manage the patient health data. As the world moves towards digitization, one of the
key challenges in developing countries like India is in making the healthcare data accessible from rural to urban in digital form.
Advancement in IT technology in healthcare sector has made it possible to maintain and manage the patient data in digital form
in all levels of healthcare system. Cloud computing has emerged as a main in providing healthcare IT solution. Therefore, rural
healthcare organizations should move towards building their own private cloud infrastructure which could be an excellent solution
for the country’s needs to have improved healthcare in rural areas. In private cloud, medical data is stored in databases in which
some of the data in a medical database is sensitive in nature and access to this data should be limited to authorized persons. In this
paper we propose a secure cloud architecture by building private cloud. The proposed private cloud architecture makes use of two
database one for storing medical record and another for key. To reduce the risk of the health information leakage and safeguard
the health data, hash and the encryption operation are performed before transmitting to the cloud database. With this technique,
path for a third party to obtain the sensitive information stored in the cloud is being blocked. Therefore the proposed framework
provides better secured services to the users.
c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intel-
ligence 2018.
Keywords: Rural; Healthcare; Private ;rural; cloud;encryption
Corresponding author. Tel.: +91-994-567-1361
E-mail address: radhika.pai@manipal.edu
1877-0509 c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intelligence 2018.
2Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
1. Introduction
The world’s population is growing rapidly1. Developed countries have been facing the trend of population aging,
escalating costs, inconsistent provision of care, and a high burden of chronic diseases related to health behaviors. This
situation makes healthcare management more and more important to all types of healthcare organizations. Health
care is delivered mainly through Primary Healthcare Centre (PHC), Secondary Care Centre (SHC), and Tertiary Care
Centre (THC)2. The dierent levels of healthcare system is depicted in Fig. 1. The primary healthcare centre deal
with patients whose medical conditions can be managed on an outpatient basis. The secondary healthcare usually
deals with acute care hospitals whereas tertiary care requires the resources of a sophisticated medical center.
Fig. 1. Dierent Levels of health-care system
Healthcare ecosystem consists of physicians, nurse, pharmacist, radiologist, lab technician, and patient. Cloud com-
puting helps in organizing the medical record at dierent levels of healthcare setting. Cloud computing is a promising
and emerging technology for the users of the healthcare ecosystem3by connecting many health information manage-
ment systems together with laboratory, pharmacy, radiology etc. The main obstacles and serious problem towards the
rapid growth of cloud computing are data security and privacy issues. Most of the healthcare users of private cloud do
not fully trust the inside threat of the healthcare organization for safeguarding sensitive health information4data be-
cause there is no governance about how this information can be used by them and whether the healthcare organization
actually control their information.
As part of the field study, hospitals at dierent healthcare levels namely Primary Healthcare Centre (PHC), Sec-
ondary Care Centre (SHC), and Tertiary Care Centre (THC) in Udupi district, Karnataka were visited. Field study was
conducted to understand the IT-infrastructure facility used for managing and maintaining the patient information. Dur-
ing this study it was observed that, in PHC levels, namely sub center, primary health center and community healthcare
center are maintaining yearly paper-based records such as registration book, examination book and treatment book.
In the record room only current five years of patient data is maintained and previous ones are discarded. Because of
this the continuous health data about the patient is lost. Hence present requirement for Indian healthcare scenario is
to capture lifelong summary of the patient from pre-birth to post-death with better IT infrastructure facility. Table 1
shows the present infrastructure facility in PHC levels.
Table 1. Infrastructure Facility in PHC levels
Levels and Facilty
Total
computer
facility
Router
facility
(Broadband)
Printer Scanner
Sub Centre(SC) 0 0 0 0
Primary Health
Centre(PHC) 1 1 1 1
Community
Health
Centre (CHC)
2 1 2 2
Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699 689
Available online at www.sciencedirect.com
Procedia Computer Science 00 (2018) 000–000
www.elsevier.com/locate/procedia
3rd International Conference on Computer Science and Computational Intelligence 2018
Private cloud solution for Securing and Managing Patient Data in
Rural Healthcare System
Raghavendra Ganiga, Radhika M Pai*, Manohara Pai M M, Rajesh Kumar Sinhaa
Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, India
aSchool of Allied Health Science, Manipal Academy of Higher Education, Manipal, India
Abstract
Rural healthcare system in India is managing patient data in a traditional paper based system. Most of the rural hospitals in India
are lacking in resources to maintain and manage the patient health data. As the world moves towards digitization, one of the
key challenges in developing countries like India is in making the healthcare data accessible from rural to urban in digital form.
Advancement in IT technology in healthcare sector has made it possible to maintain and manage the patient data in digital form
in all levels of healthcare system. Cloud computing has emerged as a main in providing healthcare IT solution. Therefore, rural
healthcare organizations should move towards building their own private cloud infrastructure which could be an excellent solution
for the country’s needs to have improved healthcare in rural areas. In private cloud, medical data is stored in databases in which
some of the data in a medical database is sensitive in nature and access to this data should be limited to authorized persons. In this
paper we propose a secure cloud architecture by building private cloud. The proposed private cloud architecture makes use of two
database one for storing medical record and another for key. To reduce the risk of the health information leakage and safeguard
the health data, hash and the encryption operation are performed before transmitting to the cloud database. With this technique,
path for a third party to obtain the sensitive information stored in the cloud is being blocked. Therefore the proposed framework
provides better secured services to the users.
c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intel-
ligence 2018.
Keywords: Rural; Healthcare; Private ;rural; cloud;encryption
Corresponding author. Tel.: +91-994-567-1361
E-mail address: radhika.pai@manipal.edu
1877-0509 c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intelligence 2018.
Available online at www.sciencedirect.com
Procedia Computer Science 00 (2018) 000–000
www.elsevier.com/locate/procedia
3rd International Conference on Computer Science and Computational Intelligence 2018
Private cloud solution for Securing and Managing Patient Data in
Rural Healthcare System
Raghavendra Ganiga, Radhika M Pai*, Manohara Pai M M, Rajesh Kumar Sinhaa
Manipal Institute of Technology, Manipal Academy of Higher Education, Manipal, India
aSchool of Allied Health Science, Manipal Academy of Higher Education, Manipal, India
Abstract
Rural healthcare system in India is managing patient data in a traditional paper based system. Most of the rural hospitals in India
are lacking in resources to maintain and manage the patient health data. As the world moves towards digitization, one of the
key challenges in developing countries like India is in making the healthcare data accessible from rural to urban in digital form.
Advancement in IT technology in healthcare sector has made it possible to maintain and manage the patient data in digital form
in all levels of healthcare system. Cloud computing has emerged as a main in providing healthcare IT solution. Therefore, rural
healthcare organizations should move towards building their own private cloud infrastructure which could be an excellent solution
for the country’s needs to have improved healthcare in rural areas. In private cloud, medical data is stored in databases in which
some of the data in a medical database is sensitive in nature and access to this data should be limited to authorized persons. In this
paper we propose a secure cloud architecture by building private cloud. The proposed private cloud architecture makes use of two
database one for storing medical record and another for key. To reduce the risk of the health information leakage and safeguard
the health data, hash and the encryption operation are performed before transmitting to the cloud database. With this technique,
path for a third party to obtain the sensitive information stored in the cloud is being blocked. Therefore the proposed framework
provides better secured services to the users.
c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intel-
ligence 2018.
Keywords: Rural; Healthcare; Private ;rural; cloud;encryption
Corresponding author. Tel.: +91-994-567-1361
E-mail address: radhika.pai@manipal.edu
1877-0509 c
2018 The Authors. Published by Elsevier Ltd.
This is an open access article under the CC BY-NC-ND license (https://creativecommons.org/licenses/by-nc-nd/4.0/)
Selection and peer-review under responsibility of the 3rd International Conference on Computer Science and Computational Intelligence 2018.
2Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
1. Introduction
The world’s population is growing rapidly1. Developed countries have been facing the trend of population aging,
escalating costs, inconsistent provision of care, and a high burden of chronic diseases related to health behaviors. This
situation makes healthcare management more and more important to all types of healthcare organizations. Health
care is delivered mainly through Primary Healthcare Centre (PHC), Secondary Care Centre (SHC), and Tertiary Care
Centre (THC)2. The dierent levels of healthcare system is depicted in Fig. 1. The primary healthcare centre deal
with patients whose medical conditions can be managed on an outpatient basis. The secondary healthcare usually
deals with acute care hospitals whereas tertiary care requires the resources of a sophisticated medical center.
Fig. 1. Dierent Levels of health-care system
Healthcare ecosystem consists of physicians, nurse, pharmacist, radiologist, lab technician, and patient. Cloud com-
puting helps in organizing the medical record at dierent levels of healthcare setting. Cloud computing is a promising
and emerging technology for the users of the healthcare ecosystem3by connecting many health information manage-
ment systems together with laboratory, pharmacy, radiology etc. The main obstacles and serious problem towards the
rapid growth of cloud computing are data security and privacy issues. Most of the healthcare users of private cloud do
not fully trust the inside threat of the healthcare organization for safeguarding sensitive health information4data be-
cause there is no governance about how this information can be used by them and whether the healthcare organization
actually control their information.
As part of the field study, hospitals at dierent healthcare levels namely Primary Healthcare Centre (PHC), Sec-
ondary Care Centre (SHC), and Tertiary Care Centre (THC) in Udupi district, Karnataka were visited. Field study was
conducted to understand the IT-infrastructure facility used for managing and maintaining the patient information. Dur-
ing this study it was observed that, in PHC levels, namely sub center, primary health center and community healthcare
center are maintaining yearly paper-based records such as registration book, examination book and treatment book.
In the record room only current five years of patient data is maintained and previous ones are discarded. Because of
this the continuous health data about the patient is lost. Hence present requirement for Indian healthcare scenario is
to capture lifelong summary of the patient from pre-birth to post-death with better IT infrastructure facility. Table 1
shows the present infrastructure facility in PHC levels.
Table 1. Infrastructure Facility in PHC levels
Levels and Facilty
Total
computer
facility
Router
facility
(Broadband)
Printer Scanner
Sub Centre(SC) 0 0 0 0
Primary Health
Centre(PHC) 1 1 1 1
Community
Health
Centre (CHC)
2 1 2 2
690 Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 3
To implement IT infrastructure in rural5healthcare system, the main obstacle is requirement of the high speed
INTERNET connectivity. To address this national level problem, the government of India has proposed a new project
BharatNet for providing high-speed broadband optical connectivity to all rural areas. With this communication in-
frastructure all rural places in India will get 1 Gbps (Gigabyte per second) bandwidth capacity at rural level setting.
Additionally,the government requested Telecommunications(Telecom)6company to list all unconnected villages in
India and have planned to connect with Telecom services by 2020.
Internet connectivity with optical network improve the accessibility of health information within and outside the
healthcare system. To build the health management system, the availability of the budget plays an important role.
Many healthcare system prefer to move their IT infrastructures from being a capital expenditure (CAPEX) toward an
operating expenditure (OPEX) model7. If healthcare organizations decide to maintain an internal data center such as
CAPEX business model, there are the direct costs that accompany running a server: power, floor space, storage, and
IT operations to manage those resources. There are also indirect costs of running a server, including the network and
storage infrastructure and IT operations by the public infrastructure provider.
Rural healthcare needs to focus mainly on cost sensitive open source platform for deploying IT infrastructure in
deferent levels of healthcare system8. To build an eective platform many open sources tools are available such as
open stack, cloud stack and eucalyptus. In this paper, as a case study to manage patient data at rural healthcare setting
by building a private cloud using open source tool is proposed. As far as infrastructure provisioning is considered for
cloud, there are only two major players OpenStack and Eucalyptus. Infrastructure provisioning involves a provisioning
tool to supply virtualized resources on-demand. Both Eucalyptus and Openstack are designed to be API-compatible9
with Amazons EC2 platform.
The patient data which is stored in the cloud database is susceptible to attack on the current healthcare system. The
data which is stored in the cloud should be protected from the attacker10 11. To deal with security, secure cloud model
is built and tested with the proposed architecture model.
In this paper private cloud solution for managing patient data in rural healthcare system is proposed. Current version
of private cloud model is deployed in community health centre and given access to all lower level healthcare system.
According to digital India initiative, the rural healthcare system is going to improve with respect to INTERNET
connectivity. Hence the system will be useful to connect all rural healthcare system.
The paper is organized as follows. Section 2 gives background study. In section 3 methodology about building
private cloud in rural healthcare sector is discussed. Section 4 describes authentication and authorization model for
open source cloud. Results are discussed in section 5. Finally, section 6 concludes the paper.
2. Background
According to Cloud Computing Survey12 the private cloud was the most popular cloud deployment scheme of
2013. Although cloud computing has its advantages, it still has some issues to overcome. These issues include se-
curity of data, complete control over the cloud infrastructure, network latency issues and full access of the cloud
environment.Many organizations prefer storing mission-critical data in their own infrastructure. Addition of dedi-
cated components is possible when the cloud is owned by the organization. Wang et al13 . discussed about how in-
formation technology can be adopted in the healthcare to automate the process flow from old technology. They also
discussed about the use of service-oriented architecture (SOA) during implementation of web-based healthcare plat-
form techniques, and also considers some of the implementation factor which requires active recommendation and
customization in health care services.
Robert Birke et al14, discussed about how corporate data centers uses virtualization as a mainstream technology
in current scenario and explained about how virtualization allows ecient and safe resource sharing in data Center.
Author additionally discussed about changes in VM patterns by configuring memory and process settings of the VM.
David Freet et al15, proposed eective cloud based computing services for cloud based applications. They used vari-
eties of hypervisors such as XEN, KVM and ESX for cloud deployment model. They also analyzed the performance of
hypervisor by allowing simultaneous execution of entire OS instances. Repu Daman et al16 . proposed an architecture
for health cloud infrastructure in terms of security models. They discussed about how to protect patient data in private
public cloud environment and also discussed security mechanism namely role based access control , data encryption,
digital signature and time to time security audits for healthcare data.
4Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
A good amount of research has been conducted in both cloud data access systems as well as storage system. Khan
and Sakamura et.al17 proposed a Discretionary Access Control (DAC) framework that provides healthcare organiza-
tions against security attacks and ascertains confidentiality of patient data. A trust-aware RBAC model has been used
to demonstrate social healthcare networks application in a cloud environment18 . A similar cryptographic RBAC model
has also been designed that considers inheritance of the roles as well their hierarchy in the evaluation of trustworthi-
ness of the users and how it can be deployed on the cloud19 . Yu, Wang, Ren and Lu have combined Attribute-based
encryption20, proxy re-encryption and lazy re-encryption to achieve user access privilege confidentiality and secret
key accountability of the users . An emergency medical system has also been developed to enable ubiquitous access
to medical services21. Besides access control systems, eorts have also been to ensure that records have been stored
after encryption and that data is transferred over a secure connection. Zhifeng Xiao et al.22 identified five most impor-
tant security and privacy attributes such as integrity, availability, confidentiality, accountability and privacy preserve.
In addition , author described about administrative and technical safeguard. Using administrative safeguards unau-
thorized disclosure of patient data through inappropriate email are prevented. In technical safeguard, access controls
mechanism is incorporated to prevent unauthorized access to patient information.
3. Methodology
This section discusses about manging the patient data by building a private cloud with proposed security mecha-
nism.
3.1. Private cloud solution to manage patient data in rural healthcare system
Fig. 2shows the architecture of proposed model which describes one simple application of IaaS on private cloud
using EUCALYPTUS. For this purpose, Faststart model of installation was used with Eucalyptus version 3.4.2. All
the necessary setup was done and an instance was launched with the custom Ubuntu Karmic (9.10) image. Then
by accessing the instance from terminal using ssh, proper network settings like proxy settings, dns servers were
configured and the internet connection was given to the instance. Using this connection, tomcat6 was installed on the
instances of Ubuntu operating system. Although limiting the access of private cloud to intranet is vital as it provides
Fig. 2. Opensource methodology for managing patient data in rural healthcare system
Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699 691
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 3
To implement IT infrastructure in rural5healthcare system, the main obstacle is requirement of the high speed
INTERNET connectivity. To address this national level problem, the government of India has proposed a new project
BharatNet for providing high-speed broadband optical connectivity to all rural areas. With this communication in-
frastructure all rural places in India will get 1 Gbps (Gigabyte per second) bandwidth capacity at rural level setting.
Additionally,the government requested Telecommunications(Telecom)6company to list all unconnected villages in
India and have planned to connect with Telecom services by 2020.
Internet connectivity with optical network improve the accessibility of health information within and outside the
healthcare system. To build the health management system, the availability of the budget plays an important role.
Many healthcare system prefer to move their IT infrastructures from being a capital expenditure (CAPEX) toward an
operating expenditure (OPEX) model7. If healthcare organizations decide to maintain an internal data center such as
CAPEX business model, there are the direct costs that accompany running a server: power, floor space, storage, and
IT operations to manage those resources. There are also indirect costs of running a server, including the network and
storage infrastructure and IT operations by the public infrastructure provider.
Rural healthcare needs to focus mainly on cost sensitive open source platform for deploying IT infrastructure in
deferent levels of healthcare system8. To build an eective platform many open sources tools are available such as
open stack, cloud stack and eucalyptus. In this paper, as a case study to manage patient data at rural healthcare setting
by building a private cloud using open source tool is proposed. As far as infrastructure provisioning is considered for
cloud, there are only two major players OpenStack and Eucalyptus. Infrastructure provisioning involves a provisioning
tool to supply virtualized resources on-demand. Both Eucalyptus and Openstack are designed to be API-compatible9
with Amazons EC2 platform.
The patient data which is stored in the cloud database is susceptible to attack on the current healthcare system. The
data which is stored in the cloud should be protected from the attacker10 11. To deal with security, secure cloud model
is built and tested with the proposed architecture model.
In this paper private cloud solution for managing patient data in rural healthcare system is proposed. Current version
of private cloud model is deployed in community health centre and given access to all lower level healthcare system.
According to digital India initiative, the rural healthcare system is going to improve with respect to INTERNET
connectivity. Hence the system will be useful to connect all rural healthcare system.
The paper is organized as follows. Section 2 gives background study. In section 3 methodology about building
private cloud in rural healthcare sector is discussed. Section 4 describes authentication and authorization model for
open source cloud. Results are discussed in section 5. Finally, section 6 concludes the paper.
2. Background
According to Cloud Computing Survey12 the private cloud was the most popular cloud deployment scheme of
2013. Although cloud computing has its advantages, it still has some issues to overcome. These issues include se-
curity of data, complete control over the cloud infrastructure, network latency issues and full access of the cloud
environment.Many organizations prefer storing mission-critical data in their own infrastructure. Addition of dedi-
cated components is possible when the cloud is owned by the organization. Wang et al13 . discussed about how in-
formation technology can be adopted in the healthcare to automate the process flow from old technology. They also
discussed about the use of service-oriented architecture (SOA) during implementation of web-based healthcare plat-
form techniques, and also considers some of the implementation factor which requires active recommendation and
customization in health care services.
Robert Birke et al14, discussed about how corporate data centers uses virtualization as a mainstream technology
in current scenario and explained about how virtualization allows ecient and safe resource sharing in data Center.
Author additionally discussed about changes in VM patterns by configuring memory and process settings of the VM.
David Freet et al15, proposed eective cloud based computing services for cloud based applications. They used vari-
eties of hypervisors such as XEN, KVM and ESX for cloud deployment model. They also analyzed the performance of
hypervisor by allowing simultaneous execution of entire OS instances. Repu Daman et al16 . proposed an architecture
for health cloud infrastructure in terms of security models. They discussed about how to protect patient data in private
public cloud environment and also discussed security mechanism namely role based access control , data encryption,
digital signature and time to time security audits for healthcare data.
4Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
A good amount of research has been conducted in both cloud data access systems as well as storage system. Khan
and Sakamura et.al17 proposed a Discretionary Access Control (DAC) framework that provides healthcare organiza-
tions against security attacks and ascertains confidentiality of patient data. A trust-aware RBAC model has been used
to demonstrate social healthcare networks application in a cloud environment18 . A similar cryptographic RBAC model
has also been designed that considers inheritance of the roles as well their hierarchy in the evaluation of trustworthi-
ness of the users and how it can be deployed on the cloud19 . Yu, Wang, Ren and Lu have combined Attribute-based
encryption20, proxy re-encryption and lazy re-encryption to achieve user access privilege confidentiality and secret
key accountability of the users . An emergency medical system has also been developed to enable ubiquitous access
to medical services21. Besides access control systems, eorts have also been to ensure that records have been stored
after encryption and that data is transferred over a secure connection. Zhifeng Xiao et al.22 identified five most impor-
tant security and privacy attributes such as integrity, availability, confidentiality, accountability and privacy preserve.
In addition , author described about administrative and technical safeguard. Using administrative safeguards unau-
thorized disclosure of patient data through inappropriate email are prevented. In technical safeguard, access controls
mechanism is incorporated to prevent unauthorized access to patient information.
3. Methodology
This section discusses about manging the patient data by building a private cloud with proposed security mecha-
nism.
3.1. Private cloud solution to manage patient data in rural healthcare system
Fig. 2shows the architecture of proposed model which describes one simple application of IaaS on private cloud
using EUCALYPTUS. For this purpose, Faststart model of installation was used with Eucalyptus version 3.4.2. All
the necessary setup was done and an instance was launched with the custom Ubuntu Karmic (9.10) image. Then
by accessing the instance from terminal using ssh, proper network settings like proxy settings, dns servers were
configured and the internet connection was given to the instance. Using this connection, tomcat6 was installed on the
instances of Ubuntu operating system. Although limiting the access of private cloud to intranet is vital as it provides
Fig. 2. Opensource methodology for managing patient data in rural healthcare system
692 Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 5
security, it may be necessary to provide access to the private cloud from outside the intranet (Internet). Providing
access means providing access to one or some of the VMs that are running on the private cloud. These VMs can be
accessed using ssh which uses port 22. The basic idea is to use a public IP address and assign it to the VM to which
the access is to be provided by using port forwarding for all ssh requests on port 22. This can be done on the router
which is used to connect the server(s) running the private cloud to the INTERNET. Private cloud is mainly built for
accessing the data from the intranet of the organization. The provision is given to the user to access the private data
remotely using port forwarding techniques as shown in the Fig. 3. This concept was tested on the private cloud using
a single public IP address. The server running the private cloud was connected to the INTERNET using a router. A
VM was started on the cloud with a local intranet IP and the router which had the public address assigned to it was
configured to forward all requests on port 22 to the VMs local IP address. Now from the INTERNET, an ssh request
was sent to the public IP address.
Fig. 3. Access the private data remotely using port forwarding techniques
The request first reaches the router on port 22 as it has the public IP address and not the actual VM. As the router is
configured to forward all packets at port 22 to the VM, the request now reaches the VM which handles it and responds
back to the IP address from which the request was generated. For providing access to multiple VMs, multiple public
addresses can be used and the router has to be configured suitably. Apart from this, the private cloud was used to host
a simple website as well by using port forwarding on port 80.
3.2. Supporting infrastructure for sustainability
The proposed private cloud model ensures or supports high availability as shown in the Fig. 4. The model is durable
and likely to operate continuously without failure for a long time. Also fault tolerance characteristics features allows
to remain in operation even if some of the component used to build the system fail. Major building blocks of high
availability architectures are healthcare user, load balancer, availability zone, snapshot and replication layer.
The healthcare users are requesting health care services from the health information system and receiving response
from the system. With load-balancer features, availability of the system increases by distributing the load between the
zone. The request always move to the healthy running instances instead of going to the unavailability zone. It also
automatically distributes the incoming application trac among multiple instances using the load-balancing facility.
Also load balancer is configured to handle encrypted (HTTPS) trac, session persistence, health checking, and more.
6Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
The availability zone is another major component of the architecture where it is hosted in multiple locations. These
locations are composed of regions and availability zones. Each region is a separate geographic area. Each region has
multiple, isolated locations known as availability zones. It provides the ability to place resources, such as instances,
and data in multiple locations. Snapshot feature provides the backup of the instances during the instance failure. The
backup layer protect from failure. The health information data is stored in global database. Health care users are
allowed to perform read, write and update the health data which is stored in the primary database. The data replication
layer provides the functionality of switching data between primary and secondary database. In case if primary fails
still user can access data from the secondary. When healthcare users grows, user can add block storage disks and
attach them to created instance for adding more user to the system.
Fig. 4. High availability architecture for rural healthcare system
3.2.1. Testing for sustainability of the system
The network connectivity is ensured by using the dedicated high speed optical networks, which connects all rural
facilities including sub centre, primary health centre and community health centre. The private/Hybrid cloud services
are created by using co-locating our server in Data Center(Institute TIER IV Certified). With this network connectivity
is attained in all levels of healthcare system.
4. Securing patient data in rural healthcare system
The following is a list of suggested countermeasures to address the security problems faced by rural healthcare
organization.
4.1. Dual database for securing the patient data
The security model for storing and retrieving sensitive personal information of the patient are depicted in Fig. 5.
The model consists of central health record server in communication with a medical record repository or database. The
patient himself owns the contained data which are the sensitive personal data. The medical record of the patient which
typically is found in such records may include several type of medical information such as biometric information,
Physical, psychological and mental health condition, family history, allergies, medications taken, medical conditions,
past medical treatments, and diseases. The medical records may further include financial information such as bank
account or credit card or debit card number with identity of the patient. According to the IT Act, 2000 above medical
record fields are considered as sensitive personal data information.
Ensuring the privacy, security, and confidentiality of Electronic Health Record has been considered as fundamental
principle for the health information management (HIM) .The health information system mainly requires safeguards
to ensure the data is available when needed and also to ensure that the information is not used, disclosed, accessed,
Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699 693
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 5
security, it may be necessary to provide access to the private cloud from outside the intranet (Internet). Providing
access means providing access to one or some of the VMs that are running on the private cloud. These VMs can be
accessed using ssh which uses port 22. The basic idea is to use a public IP address and assign it to the VM to which
the access is to be provided by using port forwarding for all ssh requests on port 22. This can be done on the router
which is used to connect the server(s) running the private cloud to the INTERNET. Private cloud is mainly built for
accessing the data from the intranet of the organization. The provision is given to the user to access the private data
remotely using port forwarding techniques as shown in the Fig. 3. This concept was tested on the private cloud using
a single public IP address. The server running the private cloud was connected to the INTERNET using a router. A
VM was started on the cloud with a local intranet IP and the router which had the public address assigned to it was
configured to forward all requests on port 22 to the VMs local IP address. Now from the INTERNET, an ssh request
was sent to the public IP address.
Fig. 3. Access the private data remotely using port forwarding techniques
The request first reaches the router on port 22 as it has the public IP address and not the actual VM. As the router is
configured to forward all packets at port 22 to the VM, the request now reaches the VM which handles it and responds
back to the IP address from which the request was generated. For providing access to multiple VMs, multiple public
addresses can be used and the router has to be configured suitably. Apart from this, the private cloud was used to host
a simple website as well by using port forwarding on port 80.
3.2. Supporting infrastructure for sustainability
The proposed private cloud model ensures or supports high availability as shown in the Fig. 4. The model is durable
and likely to operate continuously without failure for a long time. Also fault tolerance characteristics features allows
to remain in operation even if some of the component used to build the system fail. Major building blocks of high
availability architectures are healthcare user, load balancer, availability zone, snapshot and replication layer.
The healthcare users are requesting health care services from the health information system and receiving response
from the system. With load-balancer features, availability of the system increases by distributing the load between the
zone. The request always move to the healthy running instances instead of going to the unavailability zone. It also
automatically distributes the incoming application trac among multiple instances using the load-balancing facility.
Also load balancer is configured to handle encrypted (HTTPS) trac, session persistence, health checking, and more.
6Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
The availability zone is another major component of the architecture where it is hosted in multiple locations. These
locations are composed of regions and availability zones. Each region is a separate geographic area. Each region has
multiple, isolated locations known as availability zones. It provides the ability to place resources, such as instances,
and data in multiple locations. Snapshot feature provides the backup of the instances during the instance failure. The
backup layer protect from failure. The health information data is stored in global database. Health care users are
allowed to perform read, write and update the health data which is stored in the primary database. The data replication
layer provides the functionality of switching data between primary and secondary database. In case if primary fails
still user can access data from the secondary. When healthcare users grows, user can add block storage disks and
attach them to created instance for adding more user to the system.
Fig. 4. High availability architecture for rural healthcare system
3.2.1. Testing for sustainability of the system
The network connectivity is ensured by using the dedicated high speed optical networks, which connects all rural
facilities including sub centre, primary health centre and community health centre. The private/Hybrid cloud services
are created by using co-locating our server in Data Center(Institute TIER IV Certified). With this network connectivity
is attained in all levels of healthcare system.
4. Securing patient data in rural healthcare system
The following is a list of suggested countermeasures to address the security problems faced by rural healthcare
organization.
4.1. Dual database for securing the patient data
The security model for storing and retrieving sensitive personal information of the patient are depicted in Fig. 5.
The model consists of central health record server in communication with a medical record repository or database. The
patient himself owns the contained data which are the sensitive personal data. The medical record of the patient which
typically is found in such records may include several type of medical information such as biometric information,
Physical, psychological and mental health condition, family history, allergies, medications taken, medical conditions,
past medical treatments, and diseases. The medical records may further include financial information such as bank
account or credit card or debit card number with identity of the patient. According to the IT Act, 2000 above medical
record fields are considered as sensitive personal data information.
Ensuring the privacy, security, and confidentiality of Electronic Health Record has been considered as fundamental
principle for the health information management (HIM) .The health information system mainly requires safeguards
to ensure the data is available when needed and also to ensure that the information is not used, disclosed, accessed,
694 Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 7
Fig. 5. Various actors interaction with EHR System
altered, or deleted inappropriately while being stored or transmitted. The Security Standards work together with the
Privacy Standards to establish appropriate controls and protections. The medical record maintained in the medical
record repository or database is identified using patient identification number. Health data of the patient are individu-
ally identifiable under mentioned identifiers. Information of the patient could be used either alone or in combination
with other information.
The proposed system makes use of two database one for medical record and another for biometric information.
Medical record database need not include personal identification of the patient (patient name) instead patient identi-
fication or biometric information is stored in the biometric database. Patient health information stored in the medical
records may be identified using one or more identifier associated with the patient. Both the database are associated or
linked by using an alphanumeric pass-code. Using this pass-code medical records can cross-reference with biometrics
data. The patient data are available for the patient without using the patient’s name or other personal information.
The virtual machine in the private cloud consists of databases to store the patient data. Private cloud infrastructure
provides compute,storage and network services for managing the data. The interface between gateway and virtual
machine database is shown in Fig. 6.
In dual database, to store the patient health information EHR database is used, in which data is stored in encrypted
format. To store the key and hash value another database is used called key database. The main role is to perform
encryption operation. In order to identify the key used for encrypting the data, the timestamp at which the operation is
performed is also stored in the corresponding databases. Before storing data into the database, encryption is applied
8Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
Fig. 6. Interface between gateway and VM Database
at the gateway to maintain confidentiality of the patient data. The encrypted data is hashed to perform integrity, which
prevent from modification The hash value that is stored in the cloud is computed as:
Hi{m}=Hash(Ei(m)) Keyi(1)
where Hi(m) is the hash value of the ith data, Eiis the encrypted data and Keyiis the key used for encrypting the
ith data. Thus Hi(m) maintains the integrity of the encrypted data and also the key used for performing the encryption.
For decryption VM checks for the integrity constraint. If satisfied, the decryption operation is performed using the
corresponding key. This decrypted information is forwarded to the service cloud. The service cloud displays the results
in the required format to the end user.
In the proposed model for private cloud secure architecture we observe that before sending health data to cloud
the encryption and the hash operations are performed. Actual data of health record is stored in one database and other
contains the key required for performing the encryption. Hence, access to sensitive patient information from the cloud
EHR database is blocked for an attacker. Therefore, the proposed architecture protects the sensitive information of the
patient by maintaining the confidentiality and integrity of the data. As a result the healthcare users can access relevant
information from anywhere and at anytime.
4.2. Authorization model for proposed private cloud model
Authorization services include policy management, role management, and role-based access control. Cloud based
EHR system supports OAuth23 for authorization as shown in Fig. 7. Authorization model contains four rows for
representing user (browser), application, Authorization server and resource server. User or browser own the resources
which is stored in the remote server or remote database. If user wants to access the resources, first he/she has to enter
the credentials such as user-name and password.
User credential validation is done at the authorization server where after validation, it is redirected back to user for
further access to the resources. On behalf of the user application, the token is obtained and returned to the application.
Using this token, application talk to the resource server and get required data to access. The presentation page is dis-
played to the user to view the data. The elements of authentication services used for authorizing the health information
resources are listed in Table 2. The cryptographic syntax used for the authorization is shown in equation 2.
Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699 695
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 7
Fig. 5. Various actors interaction with EHR System
altered, or deleted inappropriately while being stored or transmitted. The Security Standards work together with the
Privacy Standards to establish appropriate controls and protections. The medical record maintained in the medical
record repository or database is identified using patient identification number. Health data of the patient are individu-
ally identifiable under mentioned identifiers. Information of the patient could be used either alone or in combination
with other information.
The proposed system makes use of two database one for medical record and another for biometric information.
Medical record database need not include personal identification of the patient (patient name) instead patient identi-
fication or biometric information is stored in the biometric database. Patient health information stored in the medical
records may be identified using one or more identifier associated with the patient. Both the database are associated or
linked by using an alphanumeric pass-code. Using this pass-code medical records can cross-reference with biometrics
data. The patient data are available for the patient without using the patient’s name or other personal information.
The virtual machine in the private cloud consists of databases to store the patient data. Private cloud infrastructure
provides compute,storage and network services for managing the data. The interface between gateway and virtual
machine database is shown in Fig. 6.
In dual database, to store the patient health information EHR database is used, in which data is stored in encrypted
format. To store the key and hash value another database is used called key database. The main role is to perform
encryption operation. In order to identify the key used for encrypting the data, the timestamp at which the operation is
performed is also stored in the corresponding databases. Before storing data into the database, encryption is applied
8Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
Fig. 6. Interface between gateway and VM Database
at the gateway to maintain confidentiality of the patient data. The encrypted data is hashed to perform integrity, which
prevent from modification The hash value that is stored in the cloud is computed as:
Hi{m}=Hash(Ei(m)) Keyi(1)
where Hi(m) is the hash value of the ith data, Eiis the encrypted data and Keyiis the key used for encrypting the
ith data. Thus Hi(m) maintains the integrity of the encrypted data and also the key used for performing the encryption.
For decryption VM checks for the integrity constraint. If satisfied, the decryption operation is performed using the
corresponding key. This decrypted information is forwarded to the service cloud. The service cloud displays the results
in the required format to the end user.
In the proposed model for private cloud secure architecture we observe that before sending health data to cloud
the encryption and the hash operations are performed. Actual data of health record is stored in one database and other
contains the key required for performing the encryption. Hence, access to sensitive patient information from the cloud
EHR database is blocked for an attacker. Therefore, the proposed architecture protects the sensitive information of the
patient by maintaining the confidentiality and integrity of the data. As a result the healthcare users can access relevant
information from anywhere and at anytime.
4.2. Authorization model for proposed private cloud model
Authorization services include policy management, role management, and role-based access control. Cloud based
EHR system supports OAuth23 for authorization as shown in Fig. 7. Authorization model contains four rows for
representing user (browser), application, Authorization server and resource server. User or browser own the resources
which is stored in the remote server or remote database. If user wants to access the resources, first he/she has to enter
the credentials such as user-name and password.
User credential validation is done at the authorization server where after validation, it is redirected back to user for
further access to the resources. On behalf of the user application, the token is obtained and returned to the application.
Using this token, application talk to the resource server and get required data to access. The presentation page is dis-
played to the user to view the data. The elements of authentication services used for authorizing the health information
resources are listed in Table 2. The cryptographic syntax used for the authorization is shown in equation 2.
696 Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 9
Fig. 7. Authorization Model for healthcare system
CAS :Options IdcT imes Nounce S er vice
AS C:Options E[IdcT imes Nounce Kc,v]
AS V:S ervice Options T ime s Kc,v
CV:E[Kc,vMessage]
VC:Nounce
(2)
Table 2. Elements of Authentication Service
Options Designation Healthcare level Rural Urban Year of experience
Idc Aadhar number
Times
Used by the client to request the following time setting in the ticket.
From: Start time for the requested ticket
Till:Expiration time for the requested ticket
rtime: requested renew -till time
Nonce A random value assure that the response is fresh.
5. Results and Discussion
Rural hospitals are under more pressure than urban hospitals because of the size and scale of population and
available infrastructure facilities. The field study was conducted for the hospitals at dierent levels namely Primary
Healthcare Centre (PHC), Secondary Care Centre (SHC), and Tertiary Care Centre (THC) in Udupi district, Kar-
nataka, India. With this study it is concluded that rural and community hospitals are having limited IT-infrastructure
facility to manage and maintain the health information. For the following reason, private cloud model is developed to
serve all the connected hospital in the udupi rural healthcare system. For this Faststart model of installation was used
with Eucalyptus version 3.4.2 in Community health centre(CHC). All the necessary setup was done and an instance
was launched with the custom Ubuntu Karmic (9.10) image. Then by accessing the instance from terminal using ssh,
proper network settings like proxy settings, DNS servers were configured and the internet connection was given to
10 Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
the instance. With this setup CHC are allowed to access the resources and also using the same private cloud setup
resource accesses are provisioned and provided access to the resources from outside the intranet (Internet). Private
cloud implementation in CHC, shares the required resources to all rural health hospital on rent basis to deploy their
health application on private cloud. By using this facility dierent levels of healthcare users can share information
easily at any time they need.
For secure storage introduced security levels based on type of content and accessibility. In this approach dierent
levels of security in cloud storage and access restrictions for the data is specified. From the web application, web log
analysis is performed which parses the server log from a web server based on the number of times demographic data
of the patient is accessed are stored in log file. The frequency of patient demographic data access is shown in the
Fig. 8. In this 0 signifies low, 0.5 medium and 1 for high frequency of access. Based on that, security provisions are
extended. Properties of demographic data to store in the cloud database with encryption is shown in Fig. 9
Fig. 8. Patient Demographic Data properties
Fig. 9. Properties of demographic data to store in cloud database
In private cloud, authorization model implemented using OAuth method. In which healthcare user can access to
computer or network resources which are regulated on the basis of authorization code and token. A healthcare user
can have multiple resources stored in cloud database model. Various factors are considered when it comes to assign
the authorization code and token generation. Once the criteria has been fulfilled, the user can access the resources.
The OAuth Server is created with following consideration:
Authorize - Server endpoint which grants the EHR web application to an authorization code.
Token - Server endpoint which grants the web application an access token when supplied with the authorization
code using above step.
Resource - Server endpoint which grants the web application access to EHR protected resources when supplied
to the token.
Web application is created to access the healthcare resources from the server. If healthcare professionals wants
to access resources of patient, user has to click the authorize button. Once he clicks, the request will go to EHR
server where OAuth server is running. Once server receives the request, web application shows abstract view of the
Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699 697
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 9
Fig. 7. Authorization Model for healthcare system
CAS :Options IdcT imes Nounce S er vice
AS C:Options E[IdcT imes Nounce Kc,v]
AS V:S ervice Options T ime s Kc,v
CV:E[Kc,vMessage]
VC:Nounce
(2)
Table 2. Elements of Authentication Service
Options Designation Healthcare level Rural Urban Year of experience
Idc Aadhar number
Times
Used by the client to request the following time setting in the ticket.
From: Start time for the requested ticket
Till:Expiration time for the requested ticket
rtime: requested renew -till time
Nonce A random value assure that the response is fresh.
5. Results and Discussion
Rural hospitals are under more pressure than urban hospitals because of the size and scale of population and
available infrastructure facilities. The field study was conducted for the hospitals at dierent levels namely Primary
Healthcare Centre (PHC), Secondary Care Centre (SHC), and Tertiary Care Centre (THC) in Udupi district, Kar-
nataka, India. With this study it is concluded that rural and community hospitals are having limited IT-infrastructure
facility to manage and maintain the health information. For the following reason, private cloud model is developed to
serve all the connected hospital in the udupi rural healthcare system. For this Faststart model of installation was used
with Eucalyptus version 3.4.2 in Community health centre(CHC). All the necessary setup was done and an instance
was launched with the custom Ubuntu Karmic (9.10) image. Then by accessing the instance from terminal using ssh,
proper network settings like proxy settings, DNS servers were configured and the internet connection was given to
10 Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
the instance. With this setup CHC are allowed to access the resources and also using the same private cloud setup
resource accesses are provisioned and provided access to the resources from outside the intranet (Internet). Private
cloud implementation in CHC, shares the required resources to all rural health hospital on rent basis to deploy their
health application on private cloud. By using this facility dierent levels of healthcare users can share information
easily at any time they need.
For secure storage introduced security levels based on type of content and accessibility. In this approach dierent
levels of security in cloud storage and access restrictions for the data is specified. From the web application, web log
analysis is performed which parses the server log from a web server based on the number of times demographic data
of the patient is accessed are stored in log file. The frequency of patient demographic data access is shown in the
Fig. 8. In this 0 signifies low, 0.5 medium and 1 for high frequency of access. Based on that, security provisions are
extended. Properties of demographic data to store in the cloud database with encryption is shown in Fig. 9
Fig. 8. Patient Demographic Data properties
Fig. 9. Properties of demographic data to store in cloud database
In private cloud, authorization model implemented using OAuth method. In which healthcare user can access to
computer or network resources which are regulated on the basis of authorization code and token. A healthcare user
can have multiple resources stored in cloud database model. Various factors are considered when it comes to assign
the authorization code and token generation. Once the criteria has been fulfilled, the user can access the resources.
The OAuth Server is created with following consideration:
Authorize - Server endpoint which grants the EHR web application to an authorization code.
Token - Server endpoint which grants the web application an access token when supplied with the authorization
code using above step.
Resource - Server endpoint which grants the web application access to EHR protected resources when supplied
to the token.
Web application is created to access the healthcare resources from the server. If healthcare professionals wants
to access resources of patient, user has to click the authorize button. Once he clicks, the request will go to EHR
server where OAuth server is running. Once server receives the request, web application shows abstract view of the
698 Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 11
Fig. 10. Authorization code is generated by the server
resources which healthcare user can access. After confirmation of the resource displayed in the screen, user has to
complete authorization and receives an authorization code. For performing this user has to click the button called
”Yes, I Authorize The Request”.
Authorization code is generated by the server and code is exchanged with client as shown in Fig. 10. For example
the authorization Code received is 675931b9e0137277c2891a64682d025a96850a95. With this code user can access
the token by sending authorization code to server.
As soon as server receives the request , access token is generated with expiration time of 3600 seconds. For example
access token is received d3291f6a495542d6029ba2f225a2374d4cbde74d. Using this token user makes request for the
resources and user is redirected to the resource as shown in Fig. 11.
Fig. 11. Access token is generated with expiration time
User can access the resources till token expiries. Example of resources accessed by user is shown in Fig. 12.
Fig. 12. Access the health record resources till token expiries
6. Conclusion
Building private cloud is an extremely useful idea for rural healthcare sector to make data available in all levels of
healthcare system. It makes the complete process of building a private cloud infrastructure very easy if the approach
12 Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
is standardized. Therefore, rural healthcare organizations should move towards building their own private cloud in-
frastructure which could be an excellent solution for the countrys needs to have improved Health care in rural areas.
Building a community private cloud becomes much simpler if an accurately organized method is followed to do so.
Once standardization is achieved, additional automation can be used to further shorten process times. In the cloud
computing environment, the privacy of the electronic health data is a serious issue that requires a special considera-
tion. The proposed solution in this paper provides authentication and storage model strengthen user health data when
data is stored in the cloud environment. Use of two dierent database for medical record which blocks the path for an
attacker to modify the data stored in the cloud. Future work with respect to the RBAC model would be to implement
cryptographic algorithms and integrate it with the system to guarantee entity authentication and thus further increase
the security.
References
1. Dasgupta, R., Qadeer, I., et al. The national rural health mission (nrhm): a critical overview. Indian J Public Health 2005;49(3):138–40.
2. Human, E.K.. Medical record management. Physicians’ Record Company; 1972.
3. Mohrman, S.A., Shani, A.B.. Reconfiguring the eco-system for sustainable healthcare. Emerald Group Publishing; 2014.
4. Fraser, H., Biondich, P., Moodley, D., Choi, S., Mamlin, B., Szolovits, P.. Implementing electronic medical record systems in developing
countries. Journal of Innovation in Health Informatics 2005;13(2):83–95.
5. Srinivasa, D., Siddegowda, Y., et al. Rural health care towards a healthy rural india: A social work response. Asian Journal of Development
Matters 2018;12(1s):68–74.
6. Singh, P., Kathuria, R.. Infrastructure and connectivity in india: getting the basics right. Asian Economic Policy Review 2016;11(2):266–285.
7. Skilton, M., Director, C.. Building return on investment from cloud computing. White Paper, The Open Group 2010;.
8. Pooja, B., Pai, M.M., Radhika, M.P.. A dual cloud based secure environmental parameter monitoring system: A wsn approac. In: International
Conference on Cloud Computing. Springer; 2013, p. 189–198.
9. Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youse, L., et al. The eucalyptus open-source cloud-computing system.
In: Cluster Computing and the Grid, 2009. CCGRID’09. 9th IEEE/ACM International Symposium on. IEEE; 2009, p. 124–131.
10. Sun, Y., Zhang, J., Xiong, Y., Zhu, G.. Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks
2014;10(7):190903.
11. Latif, R., Abbas, H., Assar, S., Ali, Q.. Cloud computing risk assessment: a systematic literature review. In: Future Information Technology.
Springer; 2014, p. 285–295.
12. Aceto, G., Botta, A., De Donato, W., Pescap, A.. Cloud monitoring: A survey. Computer Networks 2013;57(9):2093–2115.
13. Wang, P., Ding, Z., Jiang, C., Zhou, M.. Design and implementation of a web-service-based public-oriented personalized health care
platform. IEEE Transactions on Systems, Man, and Cybernetics: Systems 2013;43(4):941–957.
14. Birke, R., Podzimek, A., Chen, L.Y., Smirni, E.. Virtualization in the private cloud: State of the practice. IEEE Transactions on Network
and Service Management 2016;13(3):608–621.
15. Freet, D., Agrawal, R., Walker, J.J., Badr, Y.. Open source cloud management platforms and hypervisor technologies: A review and
comparison. In: SoutheastCon, 2016. IEEE; 2016, p. 1–8.
16. Daman, R., Tripathi, M.M., Mishra, S.K.. Security issues in cloud computing for healthcare. In: Computing for Sustainable Global
Development (INDIACom), 2016 3rd International Conference on. IEEE; 2016, p. 1231–1236.
17. Khan, M.F.F., Sakamura, K.. Context-aware access control for clinical information systems. In: Innovations in Information Technology (IIT),
2012 International Conference on. IEEE; 2012, p. 123–128.
18. Yu, S., Wang, C., Ren, K., Lou, W.. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Infocom, 2010
proceedings IEEE. Ieee; 2010, p. 1–9.
19. Xiao, Z., Xiao, Y.. Security and privacy in cloud computing. IEEE Communications Surveys &Tutorials 2013;15(2):843–859.
20. Yu, S., Wang, C., Ren, K., Lou, W.. Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on
Information, Computer and Communications Security. ACM; 2010, p. 261–270.
21. Koufi, V., Malamateniou, F., Vassilacopoulos, G.. Ubiquitous access to cloud emergency medical services. In: Information Technology and
Applications in Biomedicine (ITAB), 2010 10th IEEE International Conference on. IEEE; 2010, p. 1–4.
22. Xiao, Z., Xiao, Y.. Security and privacy in cloud computing. IEEE Communications Surveys &Tutorials 2013;15(2):843–859.
23. Kasthurirathne, S.N., Mamlin, B., Kumara, H., Grieve, G., Biondich, P.. Enabling better interoperability for healthcare: lessons in developing
a standards based application programing interface for electronic medical record systems. Journal of medical systems 2015;39(11):182.
Raghavendra Ganiga et al. / Procedia Computer Science 135 (2018) 688–699 699
Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000 11
Fig. 10. Authorization code is generated by the server
resources which healthcare user can access. After confirmation of the resource displayed in the screen, user has to
complete authorization and receives an authorization code. For performing this user has to click the button called
”Yes, I Authorize The Request”.
Authorization code is generated by the server and code is exchanged with client as shown in Fig. 10. For example
the authorization Code received is 675931b9e0137277c2891a64682d025a96850a95. With this code user can access
the token by sending authorization code to server.
As soon as server receives the request , access token is generated with expiration time of 3600 seconds. For example
access token is received d3291f6a495542d6029ba2f225a2374d4cbde74d. Using this token user makes request for the
resources and user is redirected to the resource as shown in Fig. 11.
Fig. 11. Access token is generated with expiration time
User can access the resources till token expiries. Example of resources accessed by user is shown in Fig. 12.
Fig. 12. Access the health record resources till token expiries
6. Conclusion
Building private cloud is an extremely useful idea for rural healthcare sector to make data available in all levels of
healthcare system. It makes the complete process of building a private cloud infrastructure very easy if the approach
12 Raghavendra Ganiga, Radhika M Pai /Procedia Computer Science 00 (2018) 000–000
is standardized. Therefore, rural healthcare organizations should move towards building their own private cloud in-
frastructure which could be an excellent solution for the countrys needs to have improved Health care in rural areas.
Building a community private cloud becomes much simpler if an accurately organized method is followed to do so.
Once standardization is achieved, additional automation can be used to further shorten process times. In the cloud
computing environment, the privacy of the electronic health data is a serious issue that requires a special considera-
tion. The proposed solution in this paper provides authentication and storage model strengthen user health data when
data is stored in the cloud environment. Use of two dierent database for medical record which blocks the path for an
attacker to modify the data stored in the cloud. Future work with respect to the RBAC model would be to implement
cryptographic algorithms and integrate it with the system to guarantee entity authentication and thus further increase
the security.
References
1. Dasgupta, R., Qadeer, I., et al. The national rural health mission (nrhm): a critical overview. Indian J Public Health 2005;49(3):138–40.
2. Human, E.K.. Medical record management. Physicians’ Record Company; 1972.
3. Mohrman, S.A., Shani, A.B.. Reconfiguring the eco-system for sustainable healthcare. Emerald Group Publishing; 2014.
4. Fraser, H., Biondich, P., Moodley, D., Choi, S., Mamlin, B., Szolovits, P.. Implementing electronic medical record systems in developing
countries. Journal of Innovation in Health Informatics 2005;13(2):83–95.
5. Srinivasa, D., Siddegowda, Y., et al. Rural health care towards a healthy rural india: A social work response. Asian Journal of Development
Matters 2018;12(1s):68–74.
6. Singh, P., Kathuria, R.. Infrastructure and connectivity in india: getting the basics right. Asian Economic Policy Review 2016;11(2):266–285.
7. Skilton, M., Director, C.. Building return on investment from cloud computing. White Paper, The Open Group 2010;.
8. Pooja, B., Pai, M.M., Radhika, M.P.. A dual cloud based secure environmental parameter monitoring system: A wsn approac. In: International
Conference on Cloud Computing. Springer; 2013, p. 189–198.
9. Nurmi, D., Wolski, R., Grzegorczyk, C., Obertelli, G., Soman, S., Youse, L., et al. The eucalyptus open-source cloud-computing system.
In: Cluster Computing and the Grid, 2009. CCGRID’09. 9th IEEE/ACM International Symposium on. IEEE; 2009, p. 124–131.
10. Sun, Y., Zhang, J., Xiong, Y., Zhu, G.. Data security and privacy in cloud computing. International Journal of Distributed Sensor Networks
2014;10(7):190903.
11. Latif, R., Abbas, H., Assar, S., Ali, Q.. Cloud computing risk assessment: a systematic literature review. In: Future Information Technology.
Springer; 2014, p. 285–295.
12. Aceto, G., Botta, A., De Donato, W., Pescap, A.. Cloud monitoring: A survey. Computer Networks 2013;57(9):2093–2115.
13. Wang, P., Ding, Z., Jiang, C., Zhou, M.. Design and implementation of a web-service-based public-oriented personalized health care
platform. IEEE Transactions on Systems, Man, and Cybernetics: Systems 2013;43(4):941–957.
14. Birke, R., Podzimek, A., Chen, L.Y., Smirni, E.. Virtualization in the private cloud: State of the practice. IEEE Transactions on Network
and Service Management 2016;13(3):608–621.
15. Freet, D., Agrawal, R., Walker, J.J., Badr, Y.. Open source cloud management platforms and hypervisor technologies: A review and
comparison. In: SoutheastCon, 2016. IEEE; 2016, p. 1–8.
16. Daman, R., Tripathi, M.M., Mishra, S.K.. Security issues in cloud computing for healthcare. In: Computing for Sustainable Global
Development (INDIACom), 2016 3rd International Conference on. IEEE; 2016, p. 1231–1236.
17. Khan, M.F.F., Sakamura, K.. Context-aware access control for clinical information systems. In: Innovations in Information Technology (IIT),
2012 International Conference on. IEEE; 2012, p. 123–128.
18. Yu, S., Wang, C., Ren, K., Lou, W.. Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Infocom, 2010
proceedings IEEE. Ieee; 2010, p. 1–9.
19. Xiao, Z., Xiao, Y.. Security and privacy in cloud computing. IEEE Communications Surveys &Tutorials 2013;15(2):843–859.
20. Yu, S., Wang, C., Ren, K., Lou, W.. Attribute based data sharing with attribute revocation. In: Proceedings of the 5th ACM Symposium on
Information, Computer and Communications Security. ACM; 2010, p. 261–270.
21. Koufi, V., Malamateniou, F., Vassilacopoulos, G.. Ubiquitous access to cloud emergency medical services. In: Information Technology and
Applications in Biomedicine (ITAB), 2010 10th IEEE International Conference on. IEEE; 2010, p. 1–4.
22. Xiao, Z., Xiao, Y.. Security and privacy in cloud computing. IEEE Communications Surveys &Tutorials 2013;15(2):843–859.
23. Kasthurirathne, S.N., Mamlin, B., Kumara, H., Grieve, G., Biondich, P.. Enabling better interoperability for healthcare: lessons in developing
a standards based application programing interface for electronic medical record systems. Journal of medical systems 2015;39(11):182.
... A solution for the management of patient data in rural healthcare systems via a private cloud model was proposed in [54]. The private cloud architecture stores and accesses patient data locally within the rural healthcare organization, eliminating the need for a centralized public cloud. ...
... Healthcare providers can face difficulties with the access and exchange of patient data in areas with limited or unstable internet access, hindering HIE efforts [57]. Therefore, healthcare organizations must have a robust internet connection to maintain seamless access to cloud services, and to avoid latency issues and slower response times that can negatively impact the overall performance of HIE [54]. Despite rigorous protective protocols implemented by digital infrastructure vendors, vulnerabilities persist regarding the unauthorized retrieval of sensitive health information and potential compromise of data confidentiality [57]. ...
... This model belongs to the client-server type of model, in which the clients are the healthcare workers and the patients who require the services of the server [52]. This model has been implemented to offer the best performance in processing healthcare information, especially within major healthcare institutions [54]. As for decentralized cloud computing, such a system can be described as a set of nodes. ...
Article
Full-text available
Healthcare is one of the industries that seeks to deliver medical services to patients on time. One of the issues it currently grapples with is real-time patient data exchange between various healthcare organizations. This challenge was solved by both centralized and decentralized cloud computing architecture solutions. In this paper, we review the current state of these two cloud computing architectures in the health sector with regard to the effect on the efficiency of Health Information Exchange (HIE) systems. Our study seeks to determine the relevance of these cloud computing approaches in assisting healthcare facilities in the decision-making process to adopt HIE systems. This paper considers the system performance, patient data privacy, and cost and identifies research directions in each of the architectures. This study shows that there are some benefits in both cloud architectures, but there are also some drawbacks. The prominent characteristic of centralized cloud computing is that all data and information are stored together at one location, known as a single data center. This offers many services, such as integration, effectiveness, simplicity, and rapid information access. However, it entails providing data privacy and confidentiality aspects because it will face the hazard of a single point of failure. On the other hand, decentralized cloud computing is built to safeguard data privacy and security whereby data are distributed to several nodes as a way of forming mini-data centers. This increases the system’s ability to cope with a node failure. Thus, continuity and less latency are achieved. Nevertheless, it poses integration issues because managing data from several sites could be a problem, and the costs of operating several data centers are higher and complex. This paper also pays attention to the differences in aspects like efficiency, capacity, and cost. This paper assists healthcare organizations in determining the most suitable cloud architecture strategy for deploying secure and effective HIE systems.
... Therefore, H4 is supported. This outcome is supported by Ganiga et al. (2018) and Mubarakali et al. (2020) who pointed out that Cloud services can help healthcare organisations to manage and protect the data of patients. ...
Article
Full-text available
Background and Aim of Study: To remain competitive in today’s digital society, Small and Medium Enterprises (SMEs) in the healthcare sector need to consider effective ways to improve their dynamic capabilities (DCs) using Software as a Service (SaaS). SaaS and DCs are current key issues in both academia and practice. The aim of the study: to develop the conceptual model for the use of SaaS to improve the DCs of healthcare SMEs in South Africa. Materials and Methods: The study employed Task-Technology Fit (TTF) and Fit Viability Model (FVM) as a lens to develop a model for the use of SaaS to improve the DCs of healthcare SMEs. To achieve the aim of the study, a deductive approach was followed. The study population was healthcare SMEs, in South Africa. The sampling frame was 384 randomly selected SMEs, in a self-administered survey. Results: The study results show that customer service (β=0.125, p<0.05), sharing information (β=0.132, p<0.05), internet access (β=0.057, p<0.05), data security (β=0.022, p<0.05), top management support (β=0.427, p<0.05), competitive pressure (β=0.178, p<0.05), viability (β=0.325, p<0.05) and task-technology fit (β=0.032, p<0.05) are highly significant on the use of SaaS to improve the DCs of healthcare SMEs. While finance (β=0.235, p>0.05) and infrastructure (β=0.052, p>0.05) were found to be less significant. Conclusions: The conceptual model was developed to identify and explain the factors influencing the use of SaaS to improve the DCs of healthcare enterprises. This model is based on TTF, FVM and external constructs (organisational and environmental characteristics) that are key to improving the DC of South African healthcare SMEs
... [51,52] The possibility of tele-health and remote accessibility for higher patient control and medical research are the additional advantages with adopting cloud computing. [53] ...
Article
Full-text available
Tele-health is now tapping lucrative opportunity to reach to large rural areas too and can contribute significantly in building safe, efficient, patient-centered, timely intervention and effective healthcare ecosystem. India had been noticed as the fastest-growing digital economies over the past few years as 90% of the growth in terms of digital adoption index occurred from 2014 to 2017.[1] The healthcare sector in India has embraced digital transformation to improve quality and accessibility. In terms of revenue, the digital healthcare market in India was valued at INR 116.61 Billion in 2018, and is estimated to reach INR 485.43 Billion by 2024, expanding at a compound annual growth rate (CAGR) of ~27.41% during the 2019-2024 period.[2] Indian healthcare market is estimated to grow and touch US372billionby2022,withincreasinghealthawarenessandhigherpenetrationofhealthinsurance.[3]AccordingtothereportofMcKinseyGlobalInstitute,therewillbe40372 billion by 2022, with increasing health awareness and higher penetration of health insurance.[3] According to the report of McKinsey Global Institute, there will be 40 % increase in the number of internet users (approximately 750 to 800 million) and smartphone users in India will also double by 2023.[4] Due to such a rapid increase in digitalization, it is expected that patients will be also tech-savvy and will be more engaging more with tele-consultations, m-Health technologies, Electronic Health records, and many other technologies enabled options. It lead to the exponential growth in Medical technology sector (US 9.6 billion by 2022[5] and the healthcare Telemedicine industry in India is also expected to grow at 31% Compound annual growth rate (CAGR) to reach at US$ 5.4 billion by 2025.[6] Optimum utilization of information & technology is an essential weapon for overcoming the challenges faced in these crucial times of pandemic. The objective of this paper was to analyze the factors responsible for tele-health development and revolutionizing the healthcare industry in India.
... Mediblock is a patient-oriented health record t to overcome the issue where the patient records are usually kept in a separate system or papers/files at the specific hospital. However, this method has led to a new issue: privacy and integrity of the data since it is shared on the cloud and can be accessed by many hospitals [6]. Data sharing is the collection of practices, technologies, cultural elements, and legal frameworks relevant to digital transactions in any type of information exchange between various organizations. ...
Article
Full-text available
With the advancements in the era of artificial intelligence, blockchain, cloud computing, and big data, there is a need for secure, decentralized medical record storage and retrieval systems. While cloud storage solves storage issues, it is challenging to realize secure sharing of records over the network. Medi-block record in the healthcare system has brought a new digitalization method for patients' medical records. This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital. It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval. Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record. This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records. It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing, such as using Blockchain technology, access control, privacy-preserving, proxy re-encryption, and service-on-chain approach. Finally, we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems.
... To manage such data for use in planning and policy-making in cancer prevention, diagnosis, and treatment, health care organizations need to use technological infrastructures that have potentials for storing, processing, integrating, and analyzing these data at a high speed and with a high quality [14]. Cloud computing is one solution that allows for the management of big data in healthcare in a secure environment [15]. CC provides users with on-demand access to a shared pool of customizable resources (e.g., networks, servers, storages, applications, and services) that could be used with minimal management efforts or service provider interactions [16,17]. ...
Article
Full-text available
Objective There has been exponential growth in the volume, variety, and velocity of cancer data. Cloud computing (CC) plays a pivotal role in the managing of cancer big data by providing powerful processing, infinite storage, accessibility, scalability, and cost-effectiveness computational resources. This study aims to systematically review and summarize studies on CC applications in cancer information management. Material and methods A structured search was conducted according to PRISMA statement guideline in the Web of Science, PubMed, Scopus, and IEEE databases as well as the Google Scholar for studies published until July 7, 2021. Of the total 498 yielded study, 48 articles were included in the review, and their results were classified and coded. The button–up Grounded theory method was used to analyze the data of the final articles. According axial and open coding approaches, three categories, eight subcategories and 47 themes were identified. Results Half of the studies focused on cancer clinical data. Medical imaging management was the most common application, and software as a service (SaaS) was the most prevalent service model of CC in the cancer domain. The majority of the studies deployed public cloud for cancer management. Data processing was the most common cloud usage in managing cancer data. Accurate and early cancer diagnosis was the most frequent reason for using CC in cancer care management. Physicians were the main users of cancer data in the cloud platform. Breast cancer and lung cancer were the most prevalent types of cancer managed using the cloud-based technology. Technical and organizational opportunities were the main incentives for applying CC in cancer information management. Conclusions CC, by providing available, ubiquitous, distributed, scalable, and flexible resource pooling, unlimited storage, and an approach of lower costs, enhances computational functionalities, enables collaborative analysis and care, and finally improves the cancer care continuum. Furthermore, the results of this study by summarizing the scientific literature related to CC in cancer information management, introducing the application areas, the role of CC in improving cancer diagnosis and treatment and technology users, has provided comprehensive information to acquire basic knowledge to use CC in cancer information management.
... Advances in IT technology in healthcare have made it possible to maintain and manage patient data in digital form at all levels of the healthcare system. Cloud computing has become the main way to provide healthcare SOLUTIONS [2]. Rural and agricultural development requires accurate spatial information to achieve the accuracy of sustainable development planning. ...
Article
Full-text available
With the mutual promotion of Internet information technology and economic globalization, the information economy has gradually become the focus of national development, and digital governance technology has been deeply integrated into the entire process of agricultural production. Through the reintegration of agricultural information flow, capital flow, business flow, and logistics, the transformation of intelligent agricultural production, networked operations, electronic management, and informatization of services has become an inevitable choice for rural revitalization. The purpose of this paper is to carry out a series of researches on the crowd-sensing and mining push technology of agricultural big data according to the application characteristics of agricultural data in the process of perception acquisition, analysis, and service. Therefore, we propose and study effective ways to collect IoT in rural complex environments, and how to use complex Internet data to mine rural areas vertically and provide a database source of large-scale data about agricultural resources. Experiments show that, from 10% of the death of a node to 90% of the death of a node, AODV passes about 550 laps, ExOR passes about 350 laps, and MWOR passes through less than 100 laps. From the results, the AODV algorithm is poor because it does not solve the problem of energy balance between nodes, while the ExOR algorithm selects the chance path with the least number of jumps.
Article
Full-text available
PurposeA growing body of empirical research has emerged, focused on leveraging Industry 4.0 technologies to develop and optimise systems within various operational contexts, including healthcare delivery. However, even though a significant number of studies have been published on application of digital technologies in enhancing delivery and health outcomes of health systems, systematic studies that review how extensively these technologies have been applied within a low- and middle-income economies’ context remain scarce in the literature. This work attempts to close that gap by investigating the impact of industry 4.0 on healthcare systems in emerging economies.Methods The study follows a systematic review approach and uses PRISMA guidelines to conduct the research and synthesise its findings. A final sample of 72 articles is selected for in-depth review following a systematic screening from an initial list of 597 results.ResultsThe study successfully synthesises the latest research in the subject area and reveals that, hitherto, approaches to use of digital tools have been fragmented and thus unable to provide holistic optimisation solutions for healthcare systems in low-resource settings. The analysis exposes a heavy skew towards adoption of mobile health and telemedicine technologies, with conspicuous research gaps in the use of augmented reality, additive manufacturing as well as simulation and digital twin technologies.Conclusions The study provides researchers, health-care practitioners and systems engineers with knowledge on the state-of-the-art in healthcare systems optimisation and points out research gaps that may be addressed through future empirical studies.
Article
With the rapid growth in medical data, hospitals need to make enormous investments annually to expand computing resources. Cloud computing offers a platform for running medical services. However, sharing of medical data with unknown neighbors in the cloud environment may threaten the sensitive data of medical services. Private cloud provides a safety way to protect the sensitive data of medical services. But it is quite different from public cloud, since it is not easy to obtain more resources timely when the unpredictable workload is over the total amount of resources of private cloud. In addition, optimal resource allocation becomes a key issue as medical services possess distinctive features require different kinds of resource combination. In this article, an efficient resource management solution for medical services in hospital information system based on private cloud is proposed. We use intelligent control theory to adjust the resource allocation based on the dynamic workload adaptively, that effectively utilizes the limited resources of the private cloud while ensures the quality of services. The experiment results suggest that the proposed solution enables the efficient application of resources and reactions to unpredictable situations, which reduces the IT resources to hospitals.
Conference Paper
Full-text available
ICT infrastructure in healthcare domain is improved with the advancement of technology. Health data consist multi-format data as it has text reports, MRI, CT-SCAN images, & pathological slides. Healthcare domain has a large volume of data which is archived as Electronic Health Record (EHR) and it has to be updated frequently. The data of the patients has to be available whenever and wherever necessary in the future course of treatment as patient history. Such a huge archival of data in the hospital needs Skilled manpower, Information and Communication Technology (ICT) and Civil infrastructure and its recurring maintenance cost. Cloud technology thus provides the necessary infrastructure as pay per usage model and when used in healthcare sector lowers the cost of storage, processing and updating infrastructure with minimum cost. Data of patients which are confidential and private in nature can be stored in cloud by selecting appropriate deployment models as different models have different levels of security.
Article
Full-text available
We sought to enable better interoperability and easy adoption of healthcare applications by developing a standardized domain independent Application Programming Interface (API) for an Electronic Medical Record (EMR) system. We leveraged the modular architecture of the Open Medical Record System (OpenMRS) to build a Fast Healthcare Interoperability Resources (FHIR) based add-on module that could consume FHIR resources and requests made on OpenMRS. The OpenMRS FHIR module supports a subset of FHIR resources that could be used to interact with clinical data persisted in OpenMRS. We demonstrate the ease of connecting healthcare applications using the FHIR API by integrating a third party Substitutable Medical Apps & Reusable Technology (SMART) application with OpenMRS via FHIR. The OpenMRS FHIR module is an optional component of the OpenMRS platform. The FHIR API significantly reduces the effort required to implement OpenMRS by preventing developers from having to learn or work with a domain specific OpenMRS API. We propose an integration pathway where the domain specific legacy OpenMRS API is gradually retired in favor of the new FHIR API, which would be integrated into the core OpenMRS platform. Our efforts indicate that a domain independent API is a reality for any EMR system. These efforts demonstrate the adoption of an emerging FHIR standard that is seen as a replacement for both Health Level 7 (HL7) Version 2 and Version 3. We propose a gradual integration approach where our FHIR API becomes the preferred method for communicating with the OpenMRS platform.
Article
Full-text available
Data security has consistently been a major issue in information technology. In the cloud computing environment, it becomes particularly serious because the data is located in different places even in all the globe. Data security and privacy protection are the two main factors of user's concerns about the cloud technology. Though many techniques on the topics in cloud computing have been investigated in both academics and industries, data security and privacy protection are becoming more important for the future development of cloud computing technology in government, industry, and business. Data security and privacy protection issues are relevant to both hardware and software in the cloud architecture. This study is to review different security techniques and challenges from both software and hardware aspects for protecting data in the cloud and aims at enhancing the data security and privacy protection for the trustworthy cloud environment. In this paper, we make a comparative research analysis of the existing research work regarding the data security and privacy protection techniques used in the cloud computing.
Article
Full-text available
Utility computing, elastic computing, and cloud computing are all terms that refer to the concept of dynamically provisioning processing time and storage space from a ubiquitous "cloud" of computational resources. Such systems allow users to acquire and release the resources on demand and provide ready access to data from processing elements, while relegating the physical location and exact parameters of the resources. Over the past few years, such systems have become increasingly popular, but nearly all current cloud computing offerings are either proprietary or depend upon software infrastructure that is invisible to the research community. In this work, we present Eucalyptus, an open-source software implementation of cloud computing that utilizes compute resources that are typically available to researchers, such as clusters and workstation farms. In order to foster community research exploration of cloud computing systems, the design of Eucalyptus emphasizes modularity, allowing researchers to experiment with their own security, scalability, scheduling, and interface implementations. In this paper, we outline the design of Eucalyptus, describe our own implementations of the modular system components, and provide results from experiments that measure performance and scalability of a Eucalyptus installation currently deployed for public use. The main contribution of our work is the presentation of the first research-oriented open-source cloud computing system focused on enabling methodical investigations into the programming, administration, and deployment of systems exploring this novel distributed computing model.
Conference Paper
Advancement of technologies has made the presence of Wireless Sensor Networks (WSNs) ubiquitous. The adequacy of WSNs to gather critical information has provided solution to applications in areas such as transport, health care systems, environment monitoring etc. However, due to the limitations of WSNs in terms of memory, computation and scalability, efficient management of WSN data to provide information services to users is a hindrance. In the midst of these issues the resources of cloud computing act as a remedy. But, once the data enters the cloud the owner has no control over it. This imposes a barrier on the confidentiality and integrity of the data being stored in the cloud. In this paper we propose secure sensor-cloud architecture by integrating two different clouds. In this architecture, the sink node outsources data into the cloud after performing the respective hash and the encryption operations. Since the encrypted data and the key required to perform this operation are stored in different databases, the path for a third party to obtain the sensitive information stored in the cloud is being blocked. As the IaaS resources, SaaS and PaaS environments of Cloud Computing are provided by two different cloud service providers (CSPs), both the CSPs will not have complete information of the architecture. This provides inherent security as data storage and data processing are done on different clouds. Therefore the proposed framework provides better services to the users.
Article
Virtualization has become a mainstream technology that allows efficient and safe resource sharing in data centers. In this paper, we present a large scale workload characterization study of 90K virtual machines hosted on 8K physical servers, across several geographically distributed corporate data centers of a major service provider. The study focuses on 19 days of operation and focuses on the state of the practice, i.e., how virtual machines are deployed across different physical resources with an emphasis on processors and memory, focusing on resource sharing and usage of physical resources, virtual machine life cycles, and migration patterns and their frequencies. This paper illustrates that indeed there is a huge tendency in over-provisioning CPU and memory resources while certain virtualization features (e.g., migration and collocation) are used rather conservatively, showing that there is significant room for the development of policies that aim to reduce operational costs in data centers.
Article
Infrastructure helps in building productive capacity by bridging connectivity gaps, reducing distribution and trade costs, and facilitating the sharing of the benefits of growth with poorer groups and communities, among others. The evidence in this paper suggests the need for India to develop both hard as well as soft infrastructure for enhancing trade flows and growth. The existence of both aspects simultaneously will produce gains of a significantly higher order but one without the other is likely to be ineffective.
Article
The use of information technology and management systems for the betterment of health care is more and more important and popular. However, existing efforts mainly focus on informatization of hospitals or medical institutions within the organizations, and few are directly oriented to the patients, their families, and other ordinary people. The strong demand for various medical and public health care services from customers calls for the creation of powerful individual-oriented personalized health care service systems. Service computing and related technologies can greatly help one in fulfilling this task. In this paper, we present PHISP: a Public-oriented Health care Information Service Platform, which is based on such technologies. It can support numerous health care tasks, provide individuals with many intelligent and personalized services, and support basic remote health care and guardianship. In order to realize the personalized customization and active recommendation of intelligent services for individuals, several key techniques for service composition are integrated, which can support branch and parallel control structures in the process models of composite services and are highlighted in this paper.