Abstract— Cloud computing is
emerging as a promising paradigm for computing and is drawing the attention
from both academia and industry. The cloud-computing model shifts the computing
infrastructure to third-party service providers that manage the hardware and
software resources with significant cost reductions. It is emerging as a new
computing paradigm in the medical sector besides other business domains. Large
numbers of health organizations have started shifting the electronic health
information to the cloud environment.
Introducing the cloud services in
the health sector not only facilitates the exchange of electronic medical
records among the hospitals and clinics, but also enables the cloud to act as a
medical record storage center. Moreover, shifting to the cloud environment
relieves the healthcare organizations of the tedious tasks of infrastructure
management and also minimizes development and maintenance costs. Storing the
medical data in cloud makes the treatment efficient by retrieving
patient’s medical history from the database
before going for the treatment and get to know about the health issues of the
system which handles the medical history of each individual of the country and
provides access to all registered hospitals to read or update the data. The
hospital which accesses the database must be registered and must have got a
license. The license number is used as a unique code to access the database.
The details of the patients will be stored and an identification number will be
generated when their data are stored into the database for the first time after
the implementation of the system.
is no such system which manages the medical data of each individual in the
country. Existing systems store the data of only a particular organization or
group of organizations but not all.
1.1. Objective of the work
vast amount of medical data
treatment through the data reference
the difficulties to keep the data safe
Cloud based health system’s main
focus is the patient’s data collection, storage, access, analysis, and presentation etc. The
current patient data collection techniques are time consuming, inefficient,
laborious. It is also obvious that currents technique is violating the real
time data access for monitoring the patients.
In m-health care
social networks, the personal health information is always shared among the patients
located in respective social communities suffering from the same disease for
mutual support, and across distributed health care providers equipped with
their own cloud servers for medical consultant. However, it also brings about a
series of challenges, especially how to ensure the security and privacy of the
patients personal health information from various attacks in the wireless
communication channel such as eavesdropping and tampering.
based health system solution
is based on the concept of “Cloud Computing” a distributed computing system where a pool of virtualized,
dynamically-salable, managed computing power, storage, platforms, and services
are delivered. This system provides an environment where patient’s records are stored and it will be referenced by the doctors to
improve the efficiency of the treatment.
handles the medical history of each individual of the country and provides
access to all registered hospitals to read or update the data. The hospital
which accesses the database must be registered and must have got a license. The
license number is used as a unique code to access the database. The details of
the patients will be stored and an identification number will be generated when
their data are stored into the database for the first time after the
implementation of the system.
they go for a treatment, their medical data will be stored into the database
using their identification number. For security reasons, any person who wants
to view their data will be allowed only to read the data. They will not be
given access to update the database. For hospitals to update the database they
require the license number along with the identification number of the person
whose record has to be stored
2. MODULE DESCRIPTION
1. Admin Modules
2. Unique Id
And Key verification
3. Reports Upload
4. Doctor Counseling
5. User Entry Checking
6. Database Report
In this Module , an User must Authorised in an
our application and there is a provider side must add the doctors and hospitals
for the further counselling for Patients or Users. Even Doctor Profile, Doctors
only able to known the Password for their view of Counselling Information.
2. Unique Id And Key verification.
In this module, when an
every provider must have an unique hospital details and doctor list.When an
User comes under in an application and accepts the Provider for further
Proceeding Comes under in the booked Provider alone..
3. Reports Upload.
In this module, When an
User booked his Provider along with Hospitality Functions and Doctor Specalist
in an application…Once an User come back for further Process They made an counselling
to Particular Doctor.
We consider the server to be semi-trusted,
That means the server will try to find out as much secret information in the
stored PHR files as possible, but they will
honestly follow the protocol in general. On the other hand,some users will also
try to access the files beyond their privileges. For example,a pharmacy may
want to obtain the prescriptions of patients for marketing and boosting its
Module, we had implemented main goal of the Project it denotes security for
viewing our personal information to all roles in an application.To prevent that
we had proposed to use Attribute Based Encryption Algorithm for the access to
encrypt the Selected Details to Restrict to view By others.
6. Database Report Search.
In this module, admin can able to
view overall users report,Users personal Records and User Counselling Records.In
Such Case,user had made encrypted their information it will visualization in cipher text format.
is the stage of the project when the theoretical design is turned out into a
working system. Thus it can be considered to be the most critical stage in
achieving a successful new system and in giving the user, confidence that the
new system will work and be effective. The implementation stage involves
careful planning, investigation of the existing system and it’s constraints on
implementation, designing of methods to achieve changeover and evaluation of
Existing System Diagram: