A Fog Based Security Model for Electronic Medical Records in the Cloud Database
Elizabeth M J1, Jobin Jose2, Dona Jose3
1Elizabeth M J, Department of Computer Science and Engineering, Viswajyothi College of Engineering, and Technical, Vazhakulam (Kerala), India.
2Jobin Jose, Department of Computer Science and Engineering, Viswajyothi College of Engineering and Technical, Vazhakulam (Kerala), India.
3Dona Jose, Department of Computer Science and Engineering, Viswajyothi College of Engineering and Technical, Vazhakulam (Kerala), India.
Manuscript received on 01 May 2019 | Revised Manuscript received on 15 May 2019 | Manuscript published on 30 May 2019 | PP: 2552-2560 | Volume-8 Issue-7, May 2019 | Retrieval Number: G5776058719/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: Nowadays, a lot of emerging trends such as telemedicine, robotics in hospitals, computerized medical diagnosis, cybersecurity, Artificial intelligence, etc. are used to uplift the healthcare sector. Especially telemedicine services get more attention to diagnose and treat patients where health professionals use information and communication technologies for remote patient monitoring. The medical data such as CT scan, MRI reports, X-rays, Heart or Kidney transplantation videos and other health information should be available in digital format and such type of huge multimedia big data needs to be kept in the cloud and needs to be archived. Cloud storage provides better storage capability so that customers no need to worry about their limited resources. This paper proposes a new method for securing various electronic medical records in the cloud database. This proposal mainly concentrates on how we can get data with less latency for patient monitoring and how to secure the patient’s private data to overcome data breaches in the cloud server using fog computing technology. A pairing based cryptography technique such as an Elliptic Curve Diffie-Hellman key agreement protocol and a decoy technique are used to access and store data more securely along with the help of some cryptographic algorithms.
Keyword: Telemedicine, Fog Computing, Healthcare, Cybersecurity, Electronic Medical Records.
Scope of the Article: Cloud Resources Utilization in IoT