Assessing Threats and Vulnerable Attacks of Health Care Data in Cloud-Based Environment
L. Abirami1, J. Karthikeyan2 

1Abirami. L, She Received His UG and PG Degree in Computer Science Discipline.
2Karthikeyan J, Assistant Professor in School of Information Technology and Engineering, VIT, Vellore.

Manuscript received on 01 March 2019 | Revised Manuscript received on 04 March 2019 | Manuscript published on 30 July 2019 | PP: 568-573 | Volume-8 Issue-2, July 2019 | Retrieval Number: B1610078219/19©BEIESP | DOI: 10.35940/ijrte.B1610.078219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract:  Healthcare industries have been unified with the advent of cloud computing and Internet of Medical Things in recent past. How: As simplicity in access and transfer of medical reports increased, so does the impact of losing potential information. Adopting a cloud environment has eased the work of medical practitioners and provided world class medical attention to patients from remote corners of a nation. It has added the responsibility of cloud service providers to improvise the existing standards for protecting information in a virtual platform. A number of benefits not limitedto universal access, advice from renowned medical experts for deciding on diagnosis plan, alerting patients and hospitals in real timeand reducing the workload of labor are achieved by cloud environments. Hospital Information Systems (HIS) are the evolved data forms maintained manually in medical institutions and they are preferred in a cloud platform to improve interoperability. The information carried in such medical systems possesses critical information about patients that need to be protected over transmission between independent environments. This becomes a mandatory requirement for designing and implementing an access control mechanism to identify intention of users who enter into the environment. Relaxations in access control architectures will compromise the security of entire architecture and practice. Why: Intention – Demand Tree is proposed in this paper to limit the access rights of users based on their roles, requirements and permissions to monitor the usage of Health Information Systems. Investigative results illustrate that the risks of losing credible information has been limited and convenient than previous standards.
Index Terms: Public Healthcare, Risk Analysis, Access Control, Privacy, Information Systems.

Scope of the Article: Healthcare Informatics