A Cloud-Based Watermarking Method for Health Data and Image Security
Kavita Athnikar , Prajakta Shirke , Snehal Tajave , Mukta Tarkasband. "A Cloud-Based Watermarking Method for Health Data and Image Security". International Journal of Computer Trends and Technology (IJCTT) V16(3):119-120, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract -
The individual health information given to the medical institutions, they keep the record on the internet. Record is kept as an electronic health record which is accessed by cloud computing. About all the security matter of the patient health information is control by cloud computing. Here we are proposing a watermarking method in the architecture of cloud computing. It is design for the purpose of mitigate the risk of insider disclosures. Our design represents all the requirement of the cloud oriented architecture framework.
References
[1]Zhiwei Yu, Clark Thomborson, Chaokun Wang, Jianmin Wang, and Rui Li,“A Cloud-Based Watermarking Method for Health Data Security.” [2] S. Gao, D. Mioc, X. Yi, F. Anton, E. Oldfield, and D. Coleman, “Towards
Web-based representation and processing of health information,” International Journal of Health Geographics, vol. 8, no. 1, p. 3, 2009.
[3] T. C. Rindfleisch, “Privacy, information technology, and health care,”communications of The ACM, vol. 40, no. 8, pp. 93–100, Aug.1997.
[4] M. Armbrust, A. Fox, R. Griffith, A. Joseph, R. Katz, A. Konwinski,G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Abovethe clouds: A Berkeley view of cloud computing,” EECS Department,University of California, Berkeley, Tech. Rep., Feb. 2009.
[5] A. Brown and B. Weihl, “An update on Google Health andGoogle PowerMeter, “Jun.2011.[Online].Available:http://googleblog.blogspot.co.nz/2011/06/update-on-google-health-and-google.html
[6]S. H. Kwok, “Watermark-based copyright protection system security,”Commun. ACM, vol. 46, no. 10, pp. 98–101, 2003.
[7] Identity Theft Resource Center, “2010 data breach insider theft category summary,” Dec. 2010.[Online].Available: http://www.idtheftcenter.org/ artman2/publish/lib survey/ITRC 2008 Breach List.shtml.
[8] N. Gohring, “Microsoft says HealthVault still going strong,” Computer- World, Jun. 2011. [Online]. Available: http://www.computerworld.com/ s/article/9217970/Microsoft says HealthVault still going strong.
Keywords
watermarking, cloud computing, health data security.