Sign In to Follow Application
View All Documents & Correspondence

Novel Method For Prevention Of Security Attack On Cloud Medical Data Using Artificial Intelligence And Iot

Abstract: The usage nf cloud computing tor storage and retrieval of electronic health reeofdsfEHRs) have seen a steep rise In past few yttts. This Invention proposes an efficient attack prevention mechanism frnm nn authorized user to the electronic health reen-rdu stored, in cloud. Also effective secured electronic hcjtllh record retrieval mechanism is also proposed. Health record signals arc been stored mud proces^d fur the predetermined health function or paranic-tcrr lo define value in the ubn

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
09 February 2020
Publication Number
08/2020
Publication Type
INA
Invention Field
BIO-MEDICAL ENGINEERING
Status
Email
manusharma@doonuniversity.ac.in
Parent Application

Applicants

1. Dr.Manu Sharma
School of Management, Doon University, P.O.Defence Colony, Deharadun, Uttrakhand, India
2. Dr. Sudhanshu Joshi
School of Management, Doon University, P.O.Defence Colony, Deharadun, Uttrakhand, India
3. Dr.Jayant Gautam
College of Agribusiness Management, Govind Ballabh Pant University of Agriculture and Technology, Patnagar, Udham Singh Nagar, Uttarakhand 263145, India
4. Dr.Achyuth Sarkar
National Insititute of Technology, Arunalchal Pradesh – 791112, India
5. Dr.S.Balamurugan
Director-Research & Development, Intelligent Research Consultancy Services, No.21, Kalloori Nagar, Peelamedu, Coimbatore-641004, Tamilnadu, India
6. Mr.V.M.Prabhakaran
Assistant Professor, Department of CSE, KIT-Kalaignar Karunanidhi Institute of Technology, Pallapalayam, Kannampalayam, Tamil Nadu 641402

Inventors

1. Dr.Manu Sharma
School of Management, Doon University, P.O.Defence Colony, Deharadun, Uttrakhand, India
2. Dr. Sudhanshu Joshi
School of Management, Doon University, P.O.Defence Colony, Deharadun, Uttrakhand, India
3. Dr.Jayant Gautam
College of Agribusiness Management, Govind Ballabh Pant University of Agriculture and Technology, Patnagar, Udham Singh Nagar, Uttarakhand 263145, India
4. Dr.Achyuth Sarkar
National Insititute of Technology, Arunalchal Pradesh – 791112, India
5. Dr.S.Balamurugan
Director-Research & Development, Intelligent Research Consultancy Services, No.21, Kalloori Nagar, Peelamedu, Coimbatore-641004, Tamilnadu, India
6. Mr.V.M.Prabhakaran
Assistant Professor, Department of CSE, KIT-Kalaignar Karunanidhi Institute of Technology, Pallapalayam, Kannampalayam, Tamil Nadu 641402

Specification

Field of Invention
Cloud storage services to users, where users can have access to very large volume of storage. Data kept on clouds can also be shared by users giving that the sharing is authorized by the data owners Alice has a piece of data that is kept on the cloud. Secure data sharing needs to be achieved via an un trusted cloud storage provider. It is necessary that the cloud storage provider helps to enforce the authorization policy for data access but the enforcement should not reveal any information to the cloud storage provider or enable the cloud storage provider have excessive privileges to allow unauthorized access. Cloud storage services provide, very large volume of storage to outsource user data. Data kept on clouds can also be shared to users that the sharing is authorized by the data owners. Cloud storage provider helps to enforce the authorization policy for data access. Related Art
Arindam Banerjee, PrateekAgrawal and R. Rajkumar (2013) in "Design of a Cloud Based Emergency Healthcare Service Model" explored that Cloud computing plays an important role in medical field and Information technology for most scalable and resources satisfy the customer needs. Virtual health service is a remote based patient monitoring system which serves patients in emergency condition. Previous medical history can also be retrieved and analyzed for future process. Every system or process is integrated with unique identification number systems.
Louise Olsson, Gunnel Ostlund, Peter Strang, Eva JeppssonGrassman, Maria Friedrichsen (2010) in "Maintaining hope when close to death: insight from cancer patients in palliative home care" explored that cancer patients receiving palliative home care used to keep their hope alive, use a grounded theory methodology. Two important processes are evolved maintaining life and preparing for death. Proposed and revealed two parallel and interdependent processes used by patients in the palliative care phase to uphold hope and respond to living close to death.
K.S. Aswathy, G. Venifa Mini (2014) in "Secure Alternate Viable Technique of Securely Sharing the Personal Health Records in Cloud" defined in cloud computing environment resources can be accessed in free also pay per use process. It provides different kinds of services and framework. Personal health record sharing is an important in that, share the data but some issues occur such as data loss, third party interfere. To overcome all those shortcomings secure alternative viable technique is proposed which overcome problem of security issues. Jithendra K, Thanapal P, Prabhu J (2013 ) "Developing Secure Social Healthcare System over the

Cloud" defined two important technologies in current such as Social media and cloud computing. Evolving and upholding a healthcare system with self-infrastructure well cost more. Small institutions have hard copy of records. Healthcare application will provide web service which is established over the cloud so it well decreases the cost and they need not be concerned about infrastructure. Cloud providers well software which update frequently. Since data is exist in the cloud, security may be main concern to be concerned.. By using role based access control healthcare system is secured.
L G Branch and A M Jette (1984) "Personal health practices and mortality among the elderly. American Journal of Public Health" defined that Morality is reduced between personal health practices. They inspected the association of physical activity, cigarette smoking, hours of sleep, alcohol consumption, and number of meals with five-year mortality rates. The personal health practices are related significantly to mortality among elderly men.
Jean Harvey-Berino, Stephen Pintauro, Paul Buzzell, and Elizabeth Casey Gold (2004) in "Effect of Internet Support on the Long-Term Maintenance of Weight Loss" objective are to examine the effectiveness of an Internet weight maintenance program. Members assigned to an internet-based weight maintenance program sustained comparable weight loss. Therefore, the internet appears to be a viable medium for promoting long-term weight maintenance. Detailed Description
The architectural representation of cloud based PHR storage is represented in Fig 1. The portal plays an important role in uploading copy of data, remote access maintenence, start/stop operation. PCAS access is used to provide and show copies. The cloud takes the responsibility of mounting the PHRs. Architectural representation of MyPHR Machine consists of two components evolution and storage with which client directly interacts with MyPHR Machine. The first component of MyPHR Machine consists of web portal which in turn interacts with Virtual Box Hypervisor. Virtual Machines are connected together with Virtual Box Hypervisor. The second component of MyPHR Machine, storage consists of VM Repository which houses VM Data and Private Network folders as indicated in Figure 2. Once stored in Cloud environment, patients can flexibly view and share these data with any other care institution or interested stakeholder. Cloud environment also allows care institutions to make available specialist software required to view or analyze health data. When the Cloud user three upload a copy of the medical data of the relevant patient to whom the bonding has been given, Only the same relevant patient can view the medical data which has been uploaded, the user is provided with authorization functionality to process the data so to outsource the user have to enroll the cloud user as three in the outsourcing function. But in some case unauthorized users involve in accessing the specified user data for knowing the medical details which was kept in confidential manner, but it can't be visible because the

data viewing functionality is provided only for the specified doctor and the patient. This fact is illustrated in Fig 4.
Also in some process the cloud user can two try to outsource the data of the cloud user three, But it ends in fail they can't access they get information such as This level user don't have permission to access the data. So the privacy information of the patient data is been protected. This fact is illustrated in Fig 5. Description of Drawings:
For the detailed understanding of the invention the explanations with reference to the figures are given below.
Figure 1: Represents the Architectural example Cloud Based PHRs storage
Figure 2: represents Technical Architectural diagram of Cloud Based PHRs storage
Figure 3: represents Modular Workflow of Cloud Based PHRs storage
Figure 4: represents system of Prevention from the unauthorized user
Figure 5: represents system for Retrieval of patient data with the authorized user

Claims:
In this invention on Novel Method for Prevention of Security Attack on Cloud Medical Data using Artificial Intelligence and IoT, we claim that:
1. This system proposed an efficient attack prevention mechanism from unauthorized user to the electronic health records stored in cloud.
2. As a System in Claim 1, an effective secured electronic health record retrieval mechanism is also proposed.
3. As a System in Claim 1, future health signal record is to trend the predetermined function and assume a value in abnormal range and condition. PHR systems typically offer functionality to share, visualize and analyze PHR data.
4. As a System in Claim 1, Secure lifelong management of patient medical records since data are stored in the cloud and do not have to be earned around by patients.

Documents

Application Documents

# Name Date
1 202011005608-FER.pdf 2021-10-18
1 202011005608-STATEMENT OF UNDERTAKING (FORM 3) [09-02-2020(online)].pdf 2020-02-09
2 abstract.jpg 2021-10-18
2 202011005608-REQUEST FOR EXAMINATION (FORM-18) [09-02-2020(online)].pdf 2020-02-09
3 202011005608-REQUEST FOR EARLY PUBLICATION(FORM-9) [09-02-2020(online)].pdf 2020-02-09
3 202011005608-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [09-02-2020(online)].pdf 2020-02-09
4 202011005608-COMPLETE SPECIFICATION [09-02-2020(online)].pdf 2020-02-09
4 202011005608-FORM-9 [09-02-2020(online)].pdf 2020-02-09
5 202011005608-FORM 18 [09-02-2020(online)].pdf 2020-02-09
5 202011005608-DECLARATION OF INVENTORSHIP (FORM 5) [09-02-2020(online)].pdf 2020-02-09
6 202011005608-FORM 1 [09-02-2020(online)].pdf 2020-02-09
6 202011005608-DRAWINGS [09-02-2020(online)].pdf 2020-02-09
7 202011005608-FIGURE OF ABSTRACT [09-02-2020(online)].jpg 2020-02-09
8 202011005608-FORM 1 [09-02-2020(online)].pdf 2020-02-09
8 202011005608-DRAWINGS [09-02-2020(online)].pdf 2020-02-09
9 202011005608-FORM 18 [09-02-2020(online)].pdf 2020-02-09
9 202011005608-DECLARATION OF INVENTORSHIP (FORM 5) [09-02-2020(online)].pdf 2020-02-09
10 202011005608-COMPLETE SPECIFICATION [09-02-2020(online)].pdf 2020-02-09
10 202011005608-FORM-9 [09-02-2020(online)].pdf 2020-02-09
11 202011005608-CLAIMS UNDER RULE 1 (PROVISIO) OF RULE 20 [09-02-2020(online)].pdf 2020-02-09
11 202011005608-REQUEST FOR EARLY PUBLICATION(FORM-9) [09-02-2020(online)].pdf 2020-02-09
12 abstract.jpg 2021-10-18
12 202011005608-REQUEST FOR EXAMINATION (FORM-18) [09-02-2020(online)].pdf 2020-02-09
13 202011005608-STATEMENT OF UNDERTAKING (FORM 3) [09-02-2020(online)].pdf 2020-02-09
13 202011005608-FER.pdf 2021-10-18

Search Strategy

1 2021-06-3012-13-31E_30-06-2021.pdf