Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique

Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique

Mamoon Rashid, Harjeet Singh, Vishal Goyal
Copyright: © 2019 |Pages: 12
DOI: 10.4018/IJEHMC.2019100105
(Individual Articles)
No Current Special Offers


Cloud-based platforms are helping organizations like health care systems to improve conditions of patients and saving their lives. Medical professionals are making use of cloud technology to collect information regarding patients more than before and exchange it over different geographical regions. However, the exchange of patient data and information is taking place via complex systems with huge vulnerabilities and risks. In this article, the authors have outlined a model for preserving privacy in data storage used in health care systems by validating access to the data through IP based detection and geographical location-based security techniques. Later, the privacy is enabled by using k-mean clustering technique for validating the user access and avail subscriptions whenever consumer want to use the organization services. The authors also provide the concept of using constant key length encryption technique to secure data on cloud storage irrespective of the type of user.
Article Preview

Several methods have been outlined to provide and preserve privacy to the shared data on cloud platforms and health care systems. Some privacy issues are highlighted in (Na & Xumin, 2010). In this paper, the authors analyse and survey security and privacy in cloud computing environments. Zissis & Lekkas, 2012) attempt to evaluate cloud computing security by introducing a trusted third party and eliminating unique threats.

(Dawoud & Turgay Altilar, 2017) defined and provided the possible scenarios for the integration of cloud systems with e-health care systems. The various requirements in terms of privacy and security for these scenarios are also defined. The authors have proposed the complete guidelines for the security and privacy challenges in e- health systems with cloud systems.

(Wang, Ma, Xhafa, Zhang, & Luo, 2016) described several identity-based cryptographic techniques including new identity based proxy re-encryption for securing e-health systems. They concluded that identity-based proxy re-encryption scheme is highly efficient for re-encryption and can be effectively used for achieving cost effective cloud usage.

Complete Article List

Search this Journal:
Volume 15: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 14: 1 Issue (2023)
Volume 13: 5 Issues (2022): 4 Released, 1 Forthcoming
Volume 12: 6 Issues (2021)
Volume 11: 4 Issues (2020)
Volume 10: 4 Issues (2019)
Volume 9: 4 Issues (2018)
Volume 8: 4 Issues (2017)
Volume 7: 4 Issues (2016)
Volume 6: 4 Issues (2015)
Volume 5: 4 Issues (2014)
Volume 4: 4 Issues (2013)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing