The new model to access control to personal Health Records stored inthe cloud

Publish Year: 1394
نوع سند: مقاله کنفرانسی
زبان: English
View: 418

This Paper With 5 Page And PDF Format Ready To Download

  • Certificate
  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این Paper:

شناسه ملی سند علمی:

CITCONF03_480

تاریخ نمایه سازی: 12 تیر 1395

Abstract:

Cloud computing is of a scalable and virtual-resource set that can provide the required services to users based on how extent they use the service. E-health system by creating a personal health would record collect and integrate all information and history pertaining to the health of the patient. Integrating the information gives rise to ease of access for physicians, patients and other related users such as pharmacies, with respect to the privacy of patients. The technology, by sharing patient information stored, can have significant benefits in providing medical serviceselectronically. Reducing costs and ease of access for physicians to patient information are the most important factors in addressing to the cloud computing E-health. The security and the privacy are the biggest obstacles to the admission of this style of computing in widespread. This article aiming to alleviate this problem suggests a new architecture which uses ecc encryption for storing and sharing secure PHR in the cloud.

Keywords:

security of cloud computing , cloud storage , PHR

Authors

Faezeh Emad

Computer department, International University of Imam Reza, Mashhad, Iran

مراجع و منابع این Paper:

لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
  • A.Behl , "Emerging Security Challenges in Cloud Computing ", 2011, ...
  • AHIMA e-HIM "Personal Health Record Work Group, Defining the personal ...
  • AHIMA. "The Value of Personal Health Records a Joint Position ...
  • Nikooghadam, M., Zakero lhosseini, A., Moghaddam, M.E." Efficient utilization of ...
  • Chia-Hui Liu, Fong-Qi Lin, Chin-Sheng Chen and Tzer-Shyong Chen.(2014), 'Design ...
  • Barka, E., Sandhu, R., " A role-based delegation model and ...
  • Bethencour, J., Sahai, A. and Waters, B. _ 'Ciph ertext-policy ...
  • Blundo, C., Cimato, S., di Vimercati, S.D.C., Santis, A.D., Foresti, ...
  • Boneh, D., Boyen, X. and Goh, E-J. "Hierarchict identity based ...
  • B.P.Rimal, E.Choi and I.Lumb, " A Taxonomy and Survey of ...
  • C.Squicciarini, Elisa Bertin, Lorenzo, D.Martino. Fedrica, Paci.Anna "Security for Web ...
  • نمایش کامل مراجع