Abstract— systems store the data of only a particular

Abstract— Cloud computing isemerging as a promising paradigm for computing and is drawing the attentionfrom both academia and industry.

The cloud-computing model shifts the computinginfrastructure to third-party service providers that manage the hardware andsoftware resources with significant cost reductions. It is emerging as a newcomputing paradigm in the medical sector besides other business domains. Largenumbers of health organizations have started shifting the electronic healthinformation to the cloud environment. Introducing the cloud services inthe health sector not only facilitates the exchange of electronic medicalrecords among the hospitals and clinics, but also enables the cloud to act as amedical record storage center. Moreover, shifting to the cloud environmentrelieves the healthcare organizations of the tedious tasks of infrastructuremanagement and also minimizes development and maintenance costs. Storing themedical data in cloud makes the treatment efficient by retrievingpatient’s medical history from the databasebefore going for the treatment and get to know about the health issues of thepatient.

Best services for writing your paper according to Trustpilot

Premium Partner
From $18.00 per page
4,8 / 5
4,80
Writers Experience
4,80
Delivery
4,90
Support
4,70
Price
Recommended Service
From $13.90 per page
4,6 / 5
4,70
Writers Experience
4,70
Delivery
4,60
Support
4,60
Price
From $20.00 per page
4,5 / 5
4,80
Writers Experience
4,50
Delivery
4,40
Support
4,10
Price
* All Partners were chosen among 50+ writing services by our Customer Satisfaction Team

 1.INTRODUCTION Asystem which handles the medical history of each individual of the country andprovides access to all registered hospitals to read or update the data. Thehospital which accesses the database must be registered and must have got alicense. The license number is used as a unique code to access the database.The details of the patients will be stored and an identification number will begenerated when their data are stored into the database for the first time afterthe implementation of the system.

Thereis no such system which manages the medical data of each individual in thecountry. Existing systems store the data of only a particular organization orgroup of organizations but not all. 1.1.

Objective of the work·        Storevast amount of medical data ·        Efficienttreatment through the data reference·        Reducethe difficulties to keep the data safe 1.2.exixting SystemCloud based health system’s mainfocus is the patient’s data collection, storage, access, analysis, and presentation etc.

Thecurrent patient data collection techniques are time consuming, inefficient,laborious. It is also obvious that currents technique is violating the realtime data access for monitoring the patients.In m-health caresocial networks, the personal health information is always shared among the patientslocated in respective social communities suffering from the same disease formutual support, and across distributed health care providers equipped withtheir own cloud servers for medical consultant. However, it also brings about aseries of challenges, especially how to ensure the security and privacy of thepatients personal health information from various attacks in the wirelesscommunication channel such as eavesdropping and tampering. 1.3.

Proposed SystemCloudbased health system solutionis based on the concept of “Cloud Computing” a distributed computing system where a pool of virtualized,dynamically-salable, managed computing power, storage, platforms, and servicesare delivered. This system provides an environment where patient’s records are stored and it will be referenced by the doctors toimprove the efficiency of the treatment. Thishandles the medical history of each individual of the country and providesaccess to all registered hospitals to read or update the data. The hospitalwhich accesses the database must be registered and must have got a license. Thelicense number is used as a unique code to access the database. The details ofthe patients will be stored and an identification number will be generated whentheir data are stored into the database for the first time after theimplementation of the system. Wheneverthey go for a treatment, their medical data will be stored into the databaseusing their identification number. For security reasons, any person who wantsto view their data will be allowed only to read the data.

They will not begiven access to update the database. For hospitals to update the database theyrequire the license number along with the identification number of the personwhose record has to be stored 2. MODULE DESCRIPTION   1. Admin Modules  2. Unique IdAnd Key verification  3. Reports Upload  4.

Doctor Counseling  5. User Entry Checking  6. Database ReportSearch 1.Admin Module. In this Module , an User must Authorised in anour application and there is a provider side must add the doctors and hospitalsfor the further counselling for Patients or Users. Even Doctor Profile, Doctorsonly able to known the Password for their view of Counselling Information.

 2. Unique Id And Key verification.In this module, when anevery provider must have an unique hospital details and doctor list.When anUser comes under in an application and accepts the Provider for furtherProceeding Comes under in the booked Provider alone..

 3. Reports Upload.In this module, When anUser booked his Provider along with Hospitality Functions and Doctor Specalistin an application.

..Once an User come back for further Process They made an counsellingto Particular Doctor.

 4.DoctorCounseling.  We consider the server to be semi-trusted,That means the server will try to find out as much secret information in thestored PHR files as possible, but they willhonestly follow the protocol in general.

On the other hand,some users will alsotry to access the files beyond their privileges. For example,a pharmacy maywant to obtain the prescriptions of patients for marketing and boosting itsprofits. 5.UserEntry Checking.In thisModule, we had implemented main goal of the Project it denotes security forviewing our personal information to all roles in an application.

To prevent thatwe had proposed to use Attribute Based Encryption Algorithm for the access toencrypt the Selected Details to Restrict to view By others. 6. Database Report Search.

                                  In this module, admin can able toview overall users report,Users personal Records and User Counselling Records.InSuch Case,user had made encrypted their information it will visualization in cipher text format. 3.IMPLEMENTATIONPROCEDUREImplementationis the stage of the project when the theoretical design is turned out into aworking system. Thus it can be considered to be the most critical stage inachieving a successful new system and in giving the user, confidence that thenew system will work and be effective. The implementation stage involvescareful planning, investigation of the existing system and it’s constraints onimplementation, designing of methods to achieve changeover and evaluation ofchangeover methods.

 4. ARCHITECTUREExisting System Diagram:  ProposedSystem Diagram: