International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 11 Issue: 01 | Jan 2024
p-ISSN: 2395-0072
www.irjet.net
Survey Paper on Cloud-Based Secured Healthcare System Siddhi Gorde1, Rutuja Gurav 2, Susmit Walekar 3, Dhrumil More4, Vrushali Bahurupi5 1,2,3,4Student, Dept. of Computer Engineering, Pillai College of Engineering, New Panvel, India 5Professor, Dept. of Computer Engineering, Pillai College of Engineering, New Panvel, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - India and the healthcare system are facing
methodologies employed in research articles and studies, shedding light on their utility and real-world implementations.
many threats due to the pandemic, so we encouraged hospitals to switch from paper patient records to electronic health information. Additionally, as the population grows, tracking, documenting and evaluating patients as they move through the multiple channels of the healthcare system becomes more complex. A model must be created to collect patient data from different locations where care is provided in emergencies such as organ transplants. However, the model requires more storage space to store all patient data. Thus, Google Cloud enables healthcare companies to quickly generate insights using industry-specific data, visualization and privacy standards while consuming large amounts of clinical data. After user authentication, cloud services using encryption methods are used to centrally process user data. security of data transferred between the user and the cloud. The idea behind facial recognition technology is to use a smart card to obtain patient-specific medical information by combining and identifying facial features. It also provides users with medication reminders, which are now quite useful, and a chat that helps users understand the basic functions of the software. It aims to provide consumers with basic drug information and help them manage local hospital information. Keywords: electronic healthcare, electronic health records (EHR), data security, facial recognition technology, chat.
In the following sections, we scrutinize each of these elements in detail and offer comprehensive justifications for their significance. We highlight the strategies and tools that academics are employing to address the pressing issues with healthcare data privacy, without naming any specific initiative. Our objective is to summarize the corpus of current literature, identify areas that warrant further investigation, and draw attention to recurring problems to provide a comprehensive resource for academics and business professionals. Robust data security protocols are crucial as the healthcare industry continues to adopt digitalization. This survey contributes to the ongoing discussion on healthcare data security by providing a thorough evaluation of these technologies' present condition and potential for future advancements. By releasing this survey research, we hope to further equip the medical community with knowledge and insights that help fortify data security in an ever-evolving healthcare landscape.
1.2. LITERATURE SURVEY [1] This study examines several symmetric key cryptography-related topics, emphasizing the role that information security plays in the development of new technologies. The study explores the topic of secure data independence and the role of cryptography, particularly symmetric key cryptography, in data authentication at the execution level. It focuses on encryption and decryption, which are the core processes of safe data transmission. The Advanced Encryption Standard is one of the symmetric key encryption algorithms that the authors review and compare. The study covers research on symmetric cryptography, including the usage of cryptographic microprocessors in virtual cards, selftesting cryptographic devices, and VLSI implementations like VINCI. It also examines public key certification and revocation techniques, oblivious transmission, and security protocols based on quantum wave functions. The paper looks at the properties, advantages, disadvantages, and applications of several cryptographic systems. Secure multiparty computations are ensured via oblivious transfer, while autonomous data transmission is made possible by a chip/card-based authentication system.
Key Words: E-healthcare, Electronic Health Records (EHR), Data Security, Facial Recognition Technology, Chatbot
1. INTRODUCTION The digital revolution in the healthcare sector is being propelled by the utilization of electronic health records and data-driven decision-making. It is crucial to ensure the integrity and security of healthcare data in the digital era. The technologies that are enhancing the security of medical data now include smart cards and fingerprint authentication as vital parts. Moreover, integrating these technologies with cloud-based systems that are centralized offers a complete approach to patient data security.The essential ideas underlying improved healthcare data security are thoroughly examined in this survey research. We examine the vital roles that facial identification, centralized cloud-based systems, smart cards, and their interconnections play in the context of healthcare data protection. The primary objective of this study is to examine and elucidate the algorithms and
© 2024, IRJET
|
Impact Factor value: 8.226
|
ISO 9001:2008 Certified Journal
|
Page 646