Reference Hub12
Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique

Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique

Mamoon Rashid, Harjeet Singh, Vishal Goyal
Copyright: © 2019 |Volume: 10 |Issue: 4 |Pages: 12
ISSN: 1947-315X|EISSN: 1947-3168|EISBN13: 9781522566670|DOI: 10.4018/IJEHMC.2019100105
Cite Article Cite Article

MLA

Rashid, Mamoon, et al. "Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique." IJEHMC vol.10, no.4 2019: pp.54-65. http://doi.org/10.4018/IJEHMC.2019100105

APA

Rashid, M., Singh, H., & Goyal, V. (2019). Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique. International Journal of E-Health and Medical Communications (IJEHMC), 10(4), 54-65. http://doi.org/10.4018/IJEHMC.2019100105

Chicago

Rashid, Mamoon, Harjeet Singh, and Vishal Goyal. "Cloud Storage Privacy in Health Care Systems Based on IP and Geo-Location Validation Using K-Mean Clustering Technique," International Journal of E-Health and Medical Communications (IJEHMC) 10, no.4: 54-65. http://doi.org/10.4018/IJEHMC.2019100105

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cloud-based platforms are helping organizations like health care systems to improve conditions of patients and saving their lives. Medical professionals are making use of cloud technology to collect information regarding patients more than before and exchange it over different geographical regions. However, the exchange of patient data and information is taking place via complex systems with huge vulnerabilities and risks. In this article, the authors have outlined a model for preserving privacy in data storage used in health care systems by validating access to the data through IP based detection and geographical location-based security techniques. Later, the privacy is enabled by using k-mean clustering technique for validating the user access and avail subscriptions whenever consumer want to use the organization services. The authors also provide the concept of using constant key length encryption technique to secure data on cloud storage irrespective of the type of user.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.