{"title":"云中的完整性和内存消耗感知电子健康记录处理","authors":"K. T. Sreelatha, V. K. Krishna Reddy","doi":"10.1177/1063293X211027869","DOIUrl":null,"url":null,"abstract":"Cloud environment greatly necessitates two key factors namely integrity and memory consumption. In the proposed work, an efficient integrity check system (EICS) is presented for electronic health record (EHR) classification. The existing system does not concentrate on storage concerns such as storing and retrieving files in cloud and memory storage overheads. De-duplication is one of the solution, however original information loss might take place. This is mitigated by the suggested research work namely Integrity and Memory Consumption aware De-duplication Method (IMCDM), where health care files are stored in secured and reliable manner. File Indexed table are created for all the files for enhancing de-duplication performance before uploading it into server. Duplication existence can be obtained from the indexing table which comprises of file features and hash values. Support vector machine (SVM) classifier is used in indexing table construction for file feature learning. Labels allotted through SVM classifier is considered as index values. Two level encryption is used followed by indexing construction, and stored in cloud severs. For avoiding redundant data, a decrypted hash index comparison is performed with previously stored contents. Various security key based on individual user’s generation is carried for ensuring security and XOR operation is performed with received encrypted file. The evaluation is performed using the Java simulation tool, which aids in validating the proposed methodology against existing research.","PeriodicalId":10680,"journal":{"name":"Concurrent Engineering","volume":"23 1","pages":"258 - 265"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Integrity and memory consumption aware electronic health record handling in cloud\",\"authors\":\"K. T. Sreelatha, V. K. Krishna Reddy\",\"doi\":\"10.1177/1063293X211027869\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud environment greatly necessitates two key factors namely integrity and memory consumption. In the proposed work, an efficient integrity check system (EICS) is presented for electronic health record (EHR) classification. The existing system does not concentrate on storage concerns such as storing and retrieving files in cloud and memory storage overheads. De-duplication is one of the solution, however original information loss might take place. This is mitigated by the suggested research work namely Integrity and Memory Consumption aware De-duplication Method (IMCDM), where health care files are stored in secured and reliable manner. File Indexed table are created for all the files for enhancing de-duplication performance before uploading it into server. Duplication existence can be obtained from the indexing table which comprises of file features and hash values. Support vector machine (SVM) classifier is used in indexing table construction for file feature learning. Labels allotted through SVM classifier is considered as index values. Two level encryption is used followed by indexing construction, and stored in cloud severs. For avoiding redundant data, a decrypted hash index comparison is performed with previously stored contents. Various security key based on individual user’s generation is carried for ensuring security and XOR operation is performed with received encrypted file. The evaluation is performed using the Java simulation tool, which aids in validating the proposed methodology against existing research.\",\"PeriodicalId\":10680,\"journal\":{\"name\":\"Concurrent Engineering\",\"volume\":\"23 1\",\"pages\":\"258 - 265\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Concurrent Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1177/1063293X211027869\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Concurrent Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/1063293X211027869","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Integrity and memory consumption aware electronic health record handling in cloud
Cloud environment greatly necessitates two key factors namely integrity and memory consumption. In the proposed work, an efficient integrity check system (EICS) is presented for electronic health record (EHR) classification. The existing system does not concentrate on storage concerns such as storing and retrieving files in cloud and memory storage overheads. De-duplication is one of the solution, however original information loss might take place. This is mitigated by the suggested research work namely Integrity and Memory Consumption aware De-duplication Method (IMCDM), where health care files are stored in secured and reliable manner. File Indexed table are created for all the files for enhancing de-duplication performance before uploading it into server. Duplication existence can be obtained from the indexing table which comprises of file features and hash values. Support vector machine (SVM) classifier is used in indexing table construction for file feature learning. Labels allotted through SVM classifier is considered as index values. Two level encryption is used followed by indexing construction, and stored in cloud severs. For avoiding redundant data, a decrypted hash index comparison is performed with previously stored contents. Various security key based on individual user’s generation is carried for ensuring security and XOR operation is performed with received encrypted file. The evaluation is performed using the Java simulation tool, which aids in validating the proposed methodology against existing research.