A Structured Protective Cohesive Health Care Information System Using Security And Storage Mechanism In Cloud

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2021 by IJETT Journal
Volume-69 Issue-3
Year of Publication : 2021
Authors : Srinivasan S, Sanjeev Kumar Mandal, Lalit Kumar, Menaka C, Akhil Arun Menon
DOI :  10.14445/22315381/IJETT-V69I3P206

Citation 

MLA Style: Srinivasan S, Sanjeev Kumar Mandal, Lalit Kumar, Menaka C, Akhil Arun Menon  "A Structured Protective Cohesive Health Care Information System Using Security And Storage Mechanism In Cloud" International Journal of Engineering Trends and Technology 69.3(2021):29-33. 

APA Style:Srinivasan S, Sanjeev Kumar Mandal, Lalit Kumar, Menaka C, Akhil Arun Menon. A Structured Protective Cohesive Health Care Information System Using Security And Storage Mechanism In Cloud  International Journal of Engineering Trends and Technology, 69(3),29-33.

Abstract
Nowadays, information technologies focusing on the user and data security along with perfect data storages are the key factor in emerging cloud-based computer technology. The present methods manage the privacy and protection concern includes user and data authentication with multiple cloud-based online-storages. This paper focusing the information technology-based safety concern comprises loss of secret information, data integrity, confidentiality, data availability while the distribution of user’s secret data in a cloud-based protective environment. Allocation of resources and storing of secret data are highly vulnerable to various cyber-based attacks, which bring permanent heavy data and loss of confidential information in the health care system. In order to overwhelm the above things, nowadays, the cloud providers and consumers required high performance, protective cohesive health care management information system which conveys reliable online as well as an offline backup like the redundant array of independent disk storage with user and data authentication mechanism in internet-based cloud computing. This paper also deals with the perfect tunnel-based data movement control by advanced improved rule-based methods along with storing confidential health care information in distinguished storage through a cryptographic mechanism insecure manner. This paper also deals with the prevention techniques of cross-site scripting attacks, which able to prevent information and afford security against internet-based web-based attacks. This protected cohesive health care information confirms the data integrity, security, data availability and also firmly insists on the multi-tier cloud-based architecture. This method raises various users’ spirits and morals from clerical to executive members that meet their needs and recognize the defendable development of internet-based health care management information system. This capable secured health care system maintains enhanced performance evaluation in terms of the reduced huge number of attacks and comparison of uploading time in cloud storages, consumer queried rate, bandwidth consumption with different approaches. This method assures better availability of data, privacy, and security on internet-based protective health-care management information systems.

Reference
[1] Guoman Lin, Research on Electronic Data Security Strategy Based on Cloud Computing, 2012 IEEE second International conference on Consumer Electronics, ISBN: 978-1-4577-1415-3, 1228-1231 (2012).
[2] Kannan. K, Raja. K, Secure Decision-Making Approach to Improve Knowledge Management Based on Online Samples”, International Journal of Intelligent Engineering and Systems, 11(1)(2018) 50-61, DOI: 10.22266/ijies2018.0228.06.
[3] Akhil Behl, Kanika Behl, An Analysis of Cloud Computing Security Issues, 2012 IEEE proceedings World Congress on Information and Communication Technologies, (2012) ISBN: 978-1-4673-4805-8,109-114.
[4] Deyan Chen, Hong Zhao, Data Security and Privacy Protection Issues in Cloud Computing,2012 IEEE proceedings of International Conference on Computer Science and Electronics Engineering, ISBN: 978-0-7695-4647-6,(2012) 647-651.
[5] Rajkumar Sharma et al., An Intelligent Cloud Computing Architecture Supporting e-Governance, proceedings of the 17th International Conference on Automation & Computing, University of Huddersfield, (2011) 1-5,10th.
[6] Srinivasan. S, K.Raja, An Advanced Dynamic Authentic Security Method for Cloud Computing, In Bokhari M., Agrawal N., Saini D. (Eds), Cyber Security - Advances in Intelligent Systems and Computing (AISC) Book Series,729(2018) 143-152, Springer, Singapore.
[7] M. Auxilia, K. Raja, K. Kannan, Cloud-Based Access Control Framework for Effective Role Provisioning in Business Application” International Journal of System Dynamics Applications, IGI-Global USA, 9(1)(2020) 63-80.
[8] Y. Zhong et al., A Self-Adaptive Encryption and Decryption Architecture, IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), Xiamen, China, (2019) 388-397.
[9] Arul Rajakumar, Rajalakshmi Shenbaga Moorthy, and Ali Kashif Bashir, “Ensemble Learning Mechanisms for Threat Detection: A Survey, Machine Learning, and Cognitive Science Applications in Cyber Security, USA, (2019) 240-281.
[10] Swathy R, Vinayagasundaram B, Rajesh G, Nayyar A, Abouhawwash M, Abu Elsoud M, Game theoretical approach for load balancing using SGMLB model in cloud environment” PLoS One 15(4)(2020).
[11] Zeller W, Felten EW. Cross-Site Request Forgeries: Exploitation and Prevention, (2008) 1-13 http://citp.princeton.edu/csrf.
[12] C.Cachin, I. Keidar, and A. Shraer Trusting the cloud, ACM SIGACT News,40(2009) 81-86.
[13] Farhan Bashir Shaikh, Sajjad Haider, Security Threats in Cloud Computing, Proceedings of the 6th International Conference on Internet Technology and Secured Transactions, IEEE, (2011).
[14] Srinivasan.S, K.Raja, Trusted Integrated Security Mechanism for Reducing Vulnerability using Authentic and Auditing Methods in Cloud Computing, International Journal of Pure and Applied Mathematics, 119(12)(2018).
[15] Jian Xie, Xiaozhong Pan, An improved RC4 stream cipher, Proceedings of the International Conference on Computer Application and System Modelling IEEE, (2010) 156-159.
[16] S.Srinivasan, K.Raja, Preventing Cloud Attacks using Bio-Metric Authentication in Cloud Computing, Indian Journal of Science and Technology, 9(23)(2016) DOI:10.17485/ijst/2016/v9i23/88322.
[17] Srinivasan. S, K.Raja, An Advanced Dynamic Authentic Security Method for Cloud Computing”, In Bokhari M., Agrawal N., Saini D. (eds) Cyber Security - Advances in Intelligent Systems and Computing(AISC) Book Series, 729(2018) 143-152, Springer, Singapore.

Keywords
Authentication, Attacks, Confidentiality, Cohesive, Health-care, Integrity;