Answer To: Sample 1_Augmented Reality Reference in APA format Penza, V., Ortiz, J., Mattos, L. S., Forgione,...
Amit answered on Aug 25 2020
cloud computing with AES encryption for Health sector
(
18
cloud
computing with AES encryption for Health sector
)
Table of contents
1) Journal 1
2) Journal 2
3) Journal3
4) Journal 4
5) Journal 5
6) Journal 6
7) Journal 7
8) Journal 8
9) Journal 9
10) Journal 10
Version 1.0 _ Week 1 (10 Journal Papers from CSU Library)
1.
Reference in APA format that will be in 'Reference List'
Doukas, C., & Maglogiannis, I. (2012, July). Bringing IoT and cloud computing towards pervasive healthcare. In Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on (pp. 922-926). IEEE.
Citation that will be in the content
Doukas & Maglogiannis, 2012
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://ieeexplore.ieee.org/abstract/document/6296978/
Q1
IMIS , Cloud computing, Medical services, Clouds, Biomedical monitoring, Mobile communication, Real time systems
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
Bringing IoT and cloud computing towards pervasive healthcare
Tools: AES
Applied Area:
Internet of Things (IoT), Cloud Computing, Patient Monitoring, Wearable Sensors
Problem: the problem of data privacy and data security. Now data is centralised due to cloud computing technology.
Goal: The key facility of cloud computing provide the security to data. Three main points are covered by data security’s goal: Integrity, availability and confidentially.
IMIS , IoT, cloud computing, pervasive healthcare applications, body sensor networks, Internet of Things, sensor data online processing, mobile sensor management, wearable healthcare sensor management
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Cloud computing architecture divided into two sections: back end and front end. Client application and computer comprises in front end. Server and data storage at back end. Network computer communicates each other through middleware and protocols.
Reduced cost
Security issues
2
Patient complete healthcare report stored on cloud computing through IoT. Some private data stored in image form. For extra care image converted into pixels and encrypted into pixels.
Improved performance
Technical issues
3
Encryption is done through technique advance encryption standard (AES). Cryptography is important method to secure data on cloud
Increased processing time
4
Symmetric and asymmetric algorithm is providing by cryptography to secure data.
Provide privacy
5
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Hybrid cloud
Central server
Protocols
Data encryption
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Patient data
Secured data on wireless devices
Feature of this work is mainly provided security and privacy to the data which is related to patients’ health and stored that data on cloud.
There is a chance of data hacking in this research current solution. This is limitation of it.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
Cloud service models include platform as a service, software as a service and infrastructure as a service. There is no need of direct communication for health records’ transfers.
Technique:AES
The importance of this research to encrypting important data and centralized data in heath sector.
Diagram/Flowchart
2.
Reference in APA format that will be in 'Reference List'
Zhang, K., Zhou, X., Chen, Y., Wang, X., & Ruan, Y. (2011, October). Sedic: privacy-aware data intensive computing on hybrid clouds. In Proceedings of the 18th ACM conference on Computer and communications security (pp. 515-526). ACM.
Citation that will be in the content
Zhang, 2011
URL of the Reference
Level of Journal (Q1, Q2, …An)
Keywords in this Reference
https://dl.acm.org/citation.cfm?id=2046767
Q3
Medical records
Cloud storage
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution &What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name: Eahancement the security of medical records by making use of integrity check.
Tools: AES
Applied Area:
Medical records
Data sharing for medical records
Problem: The use of hybrid cloud for sharing the medical records can cause data privacy issues. The implementation of cryptography with cloud can solve this issue.
Goal: The security of medical data stored on hybrid cloud is main goal. For archiving this goal encryption is being implemented.
Medical records
Integrity checks
Security requirements on hybrid cloud for medical records
Statistical analysis
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
The policy, privacy statics and privacy cryptography are the main process steps for implementing Cloud computing architecture and encryption protocols on health care records.
Reduced operational cost
Security issues to health care databases stored on hybrid cloud.
2
Complete records of healthcare report are merged and integrity checks are carried out.
Overall performance is increased
Technical issues
3
The hybrid search of plan text in cipher text is completed.
Increased data accessing time.
4
A protocol based system for improved security on medical data is implemented.
Provide improved security
5
An effective extensive experiment is carried out.
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
Hybrid cloud
Health care data.
integrity checks
Data encryption
Protocol based system implementation
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Health care data for merging on hybrid cloud.
Protocol based secured data as output.
The implementation of protocol based system on hybrid cloud for medical databases provides additional security to hybrid cloud which increases the overall security of medical data.
The implementation cost is increased due to implementation of protocol based system, is its limitation.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
The hybrid Cloud service models include protocol based system and merged health care data on hybrid cloud. The patient records can be accessed by providing the decryption key only.
Technique: AES
The importance of this research to implement protocol based system to increase security of health care data stored on hybrid cloud.
Diagram/Flowchart
3.
Reference in APA format that will be in 'Reference List'
Chen, Y. Y., Lu, J. C., & Jan, J. K. (2012). A secure EHR system based on hybrid clouds. Journal of medical systems, 36(5), 3375-3384.
Citation that will be in the content
Chen, 2012
URL of the Reference
Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://link.springer.com/article/10.1007/s10916-012-9830-6
Q1
interoperable EHR
cloud implementation
The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ ... etc )
The Goal (Objective) of this Solution & What is the Problem that need to be solved
What are the components of it?
Technique/Algorithm name:
EHR system for CHISTAR for archiving semantic interoperability
Tools:
EHR system
CHISTAR
Applied Area:
Health sector
Problem: the main problem is data minimum use of interoperability standards in implementation of hybrid cloud. The improved of interoperability standards will increase the security of cloud.
Goal: the main goal is increase of use of proper interoperability standards on cloud storing medical data.
EHR system
Cloud server
CHISTAR
Public health records
The Process (Mechanism) of this Work; The process steps of the Technique/system
Process Steps
Advantage (Purpose of this step)
Disadvantage (Limitation/Challenge)
1
Implement EHR (electronic health record) system to all the users and stakeholders of cloud.
Improved performance
Security issue
2
Implement CHISTAR (cloud health information systems technology architecture) for improved security.
Improved privacy
Lengthy process
3
The interoperability standards are implemented for desired implementation of hybrid cloud holding medical records.
Technical issues
4
5
Validation Criteria (Measurement Criteria)
Dependent Variable
Independent Variable
EHR system
Access keys
CHISTAR
Interoperability standards
Hybrid cloud
Input and Output
Critical Thinking: Feature of this work, and Why (Justify)
Critical Thinking: Limitations of the research current solution, and Why (Justify)
Input (Data)
Output (View)
Data in form of EHR
Secured databases
The implementation of HER system, CHISTAR and interoperability standards on cloud by AES technique in health sector.
Data privacy.
(Describe the research/current solution)
Evaluation Criteria
How this research/current solution is valuable for your project
The data is stored with help of EHR system....