Skip to main content

A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11342))

Abstract

Healthcare systems are designed to facilitate the end users in order to maintain the good health and predicting the future trends for safety measures. Most of the systems running right now are assisting the users with the number of services like m-health, e-health. Although, many of the systems are operative, but still a lot of problems are to be addressed. The data related to healthcare industry is extremely sensitive, that could not be altered or edited by any source, and likely many problems of privacy and security are still maintained in the current systems. Though, many systems are still working on the security challenges but they are struggling to resolve the related issues. To secure patients data is the biggest deal to solve. We will try to overcome the problem related to security by proposing a framework, named as Service Oriented Architecture for Health care based on cloud computing (SOHA-CC). This framework contains four layers, specifically, Application layer, Cloud application and Service layer, Network computing layer and, finally Healthcare layer.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Arif, M., Abdullah, N.A., Phalianakote, S.K., Ramli, N., Elahi, M.: Maximizing information of multimodality brain image fusion using curvelet transform with genetic algorithm. In: 2014 International Conference on Computer Assisted System in Health (CASH), pp. 45–51. IEEE (2014)

    Google Scholar 

  2. Arif, M., Wang, G., Balas, V.E.: Secure vanets: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235–246 (2018)

    Google Scholar 

  3. Arif, M., Wang, G., Chen, S.: Deep learning with non-parametric regression model for traffic flow prediction. In: Proceedings of IEEE 16th International Conference on Dependable, Autonomic & Secure Computing, 16th International Conference on Pervasive Intelligence & Computing, 4th International Conference on Big Data Intelligence & Computing, and 3rd Cyber Science & Technology Congress, pp. 681–688. IEEE, August 2018

    Google Scholar 

  4. Arif, M., Wang, G., Peng, T.: Track me if you can? Query based dual location privacy in VANETs for V2V and V2I. In: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science And Engineering (TrustCom/BigDataSE), pp. 1091–1096. IEEE (2018)

    Google Scholar 

  5. Bate, S.P., Robert, G.: Knowledge management and communities of practice in the private sector: lessons for modernizing the national health service in England and Wales. Public Adm. 80(4), 643–663 (2002)

    Article  Google Scholar 

  6. Benvenuto, C.J.: Galois field in cryptography. University of Washington (2012)

    Google Scholar 

  7. Blumenthal, D., Hsiao, W.: Privatization and its discontents the evolving Chinese health care system (2005)

    Article  Google Scholar 

  8. Conti, M., Lal, C.: A survey on context-based co-presence detection techniques. arXiv preprint arXiv:1808.03320 (2018)

  9. DeCamp, M.: Physicians, social media, and conflict of interest. J. Gen. Intern. Med. 28(2), 299–303 (2013)

    Article  Google Scholar 

  10. Ginter, P.M., Duncan, W.J., Swayne, L.E.: The Strategic Management of Health Care Organizations. Wiley, Hoboken (2018)

    Google Scholar 

  11. Grannis, S.J., Stevens, K.C., Merriwether, R.: Leveraging health information exchange to support public health situational awareness: the Indiana experience. Online J. Public Health Inform. 2(2), 335–344 (2010)

    Article  Google Scholar 

  12. Hande, A., Polk, T., Walker, W., Bhatia, D.: Self-powered wireless sensor networks for remote patient monitoring in hospitals. Sensors 6(9), 1102–1117 (2006)

    Article  Google Scholar 

  13. Hao, H.: The development of online doctor reviews in China: an analysis of the largest online doctor review website in China. J. Med. Internet Res. 17(6), e134 (2015)

    Article  Google Scholar 

  14. Javaid, Q., Arif, M., Shah, M.A., Nadeem, M., et al.: A hybrid technique for de-noising multi-modality medical images by employing cuckoo’s search with curvelet transform. Mehran Univ. Res. J. Eng. Technol. 37(1), 29 (2018)

    Article  Google Scholar 

  15. Kretzschmar, U.: Aes128-ac implementation for encryption and decryption. TI-White Paper (2009)

    Google Scholar 

  16. Lee, H., Lee, K., Shin, Y.: AES implementation and performance evaluation on 8-bit microcontrollers. arXiv preprint arXiv:0911.0482 (2009)

  17. Leijdekkers, P., Gay, V.: Personal heart monitoring and rehabilitation system using smart phones. In: International Conference on Mobile Business, ICMB 2006, p. 29. IEEE (2006)

    Google Scholar 

  18. Mai, L., et al.: NetAgg: using middleboxes for application-specific on-path aggregation in data centres. In: Proceedings of the 10th ACM International on Conference on Emerging Networking Experiments and Technologies, pp. 249–262. ACM (2014)

    Google Scholar 

  19. Manogaran, G., Varatharajan, R., Lopez, D., Kumar, P.M., Sundarasekar, R., Thota, C.: A new architecture of internet of things and big data ecosystem for secured smart healthcare monitoring and alerting system. Future Gen. Comput. Syst. 82, 375–387 (2018)

    Article  Google Scholar 

  20. Mousannif, H., Khalil, I., Al Moatassime, H.: Cooperation as a service in VANETs. J. UCS 17(8), 1202–1218 (2011)

    Google Scholar 

  21. Muhammad, A., Guojun, W.: Segmentation of calcification and brain hemorrhage with midline detection. In: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), pp. 1082–1090. IEEE (2017)

    Google Scholar 

  22. Piai, S., Claps, M.: Bigger data for better healthcare. IDC Health Insights (2013)

    Google Scholar 

  23. Pramanik, M.I., Lau, R.Y., Demirkan, H., Azad, M.A.K.: Smart health: big data enabled health paradigm within smart cities. Expert Syst. Appl. 87, 370–383 (2017)

    Article  Google Scholar 

  24. Selmane, N., Guilley, S., Danger, J.L.: Practical setup time violation attacks on AES. In: Seventh European Dependable Computing Conference, EDCC 2008, pp. 91–96. IEEE (2008)

    Google Scholar 

  25. Wicks, P., et al.: Sharing health data for better outcomes on PatientsLikeMe. J. Med. Internet Res. 12(2), e19 (2010)

    Article  Google Scholar 

  26. Zhang, Y., Qiu, M., Tsai, C.W., Hassan, M.M., Alamri, A.: Health-CPS: healthcare cyber-physical system assisted by cloud and big data. IEEE Syst. J. 11(1), 88–95 (2017)

    Article  Google Scholar 

  27. Zhu, C., Wang, G., Sun, K.: Cryptanalysis and improvement on an image encryption algorithm design using a novel chaos based S-Box. Symmetry 10(9), 399 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

This work was supported in part by the National Natural Science Foundation of China under Grant 61632009, Grant 61472451 and Grant 61872097, in part by the Guangdong Provincial Natural Science Foundation under Grant 2017A030308006, and in part by the High-Level Talents Program of Higher Education in Guangdong Province under Grant 2016ZJ01.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guojun Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rizvi, S.Q.A., Wang, G., Chen, J. (2018). A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing. In: Wang, G., Chen, J., Yang, L. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2018. Lecture Notes in Computer Science(), vol 11342. Springer, Cham. https://doi.org/10.1007/978-3-030-05345-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-05345-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-05344-4

  • Online ISBN: 978-3-030-05345-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics