Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Aug 18:2022:3804553.
doi: 10.1155/2022/3804553. eCollection 2022.

On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment

Affiliations

On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment

Kirtirajsinh Zala et al. Comput Intell Neurosci. .

Retraction in

Abstract

Traditional healthcare services have changed into modern ones in which doctors can diagnose patients from a distance. All stakeholders, including patients, ward boy, life insurance agents, physicians, and others, have easy access to patients' medical records due to cloud computing. The cloud's services are very cost-effective and scalable, and provide various mobile access options for a patient's electronic health records (EHRs). EHR privacy and security are critical concerns despite the many benefits of the cloud. Patient health information is extremely sensitive and important, and sending it over an unencrypted wireless media raises a number of security hazards. This study suggests an innovative and secure access system for cloud-based electronic healthcare services storing patient health records in a third-party cloud service provider. The research considers the remote healthcare requirements for maintaining patient information integrity, confidentiality, and security. There will be fewer attacks on e-healthcare records now that stakeholders will have a safe interface and data on the cloud will not be accessible to them. End-to-end encryption is ensured by using multiple keys generated by the key conclusion function (KCF), and access to cloud services is granted based on a person's identity and the relationship between the parties involved, which protects their personal information that is the methodology used in the proposed scheme. The proposed scheme is best suited for cloud-based e-healthcare services because of its simplicity and robustness. Using different Amazon EC2 hosting options, we examine how well our cloud-based web application service works when the number of requests linearly increases. The performance of our web application service that runs in the cloud is based on how many requests it can handle per second while keeping its response time constant. The proposed secure access scheme for cloud-based web applications was compared to the Ethereum blockchain platform, which uses internet of things (IoT) devices in terms of execution time, throughput, and latency.

PubMed Disclaimer

Conflict of interest statement

The authors declare that they have no conflicts of interest.

Figures

Figure 1
Figure 1
Cloud-based electronic health data architecture.
Figure 2
Figure 2
E-healthcare system based on the cloud for secure sharing with different entities.
Figure 3
Figure 3
Registration for hospital over cloud.
Figure 4
Figure 4
Device registration (offline).
Figure 5
Figure 5
Retrieval phase for data.
Figure 6
Figure 6
Throughput (requests per second).
Figure 7
Figure 7
Avg. response time.
Figure 8
Figure 8
Web server and database tier instances' CPU utilization.
Figure 9
Figure 9
Throughput (requests per second).
Figure 10
Figure 10
Avg. response time.
Figure 11
Figure 11
Web server and database tier instances' CPU utilization.
Figure 12
Figure 12
Throughput (requests per second).
Figure 13
Figure 13
Avg. response time.
Figure 14
Figure 14
Web server and database tier instances' CPU utilization.
Figure 15
Figure 15
Latency comparison of access transaction.
Figure 16
Figure 16
Latency comparison of store transaction.
Figure 17
Figure 17
Execute time comparison of access transaction.
Figure 18
Figure 18
Execute time comparison of store transaction.
Figure 19
Figure 19
Throughput comparison of access transaction.
Figure 20
Figure 20
Throughput comparison of store transaction.

References

    1. Deepa N., Pham Q.-V., Nguyen D. C., et al. A survey on blockchain for big data: approaches,opportunities,and future directions. Future Generation Computer Systems . 2022;131:209–226. doi: 10.1016/j.future.2022.01.017. - DOI
    1. Thakkar H. K., Sahoo P. K., Mohanty P. Dofm: domain feature miner for robust extractive summarization. Information Processing & Management . 2021;58(3) doi: 10.1016/j.ipm.2020.102474.102474 - DOI
    1. Kumar R., Swarnkar M., Singal G., Kumar N. Iot network traffic classification using machine learning algorithms: an experimental analysis. IEEE Internet of Things Journal . 2021;9(2):989–1008. doi: 10.1109/JIOT.2021.3121517. - DOI
    1. Kruse C. S., Mileski M., Vijaykumar A. G., Viswanathan S. V., Suskandla U., Chidambaram Y. Impact of electronic health records on long-term care facilities: systematic review. JMIR medical informatics . 2017;5(3):e7958. doi: 10.2196/medinform.7958. - DOI - PMC - PubMed
    1. Mubashar A., Asghar K., Javed A. R., et al. Storage and proximity management for centralized personal health records using an ipfs-based optimization algorithm. Journal of Circuits, Systems, and Computers . 2022;31(01) doi: 10.1142/s0218126622500104.2250010 - DOI

Publication types