Implementation of Secure Sharing of PHR’s with IoMT Cloud
Swatee S. Nikam1, Jyoti P. Kshirsagar2

1Ms. Swatee S. Nikam, Department of Computer Engineering, JSPM’s RSCOE, Thatwade, Pune, INDIA.
2Ms. Jyoti P. Kshirsagar, Department of Computer Engineering, JSPM’s RSCOE, Thatwade, Pune, INDIA.

Manuscript received on 5 August 2019. | Revised Manuscript received on 13 August 2019. | Manuscript published on 30 September 2019. | PP: 599-602 | Volume-8 Issue-3 September 2019 | Retrieval Number: B2192078219/19©BEIESP | DOI: 10.35940/ijrte.B2192.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Healthcare area have been introduced to cloud services. The broad acknowledgment of these services in the healthcare area has achieved useful and supportive exchange of Personal Health Records (PHR’s). Keeping the information related to health of any individual into cloud servers is vulnerable to disclosure or burglary and requires the enhanced methods that ensure the security of this information. Here we are implementing a methodology for first securing the information and then sharing the same in the cloud, we have also implemented the same with help of using IoMT. This scheme not only guarantees access of control to individuals who are patients where data is stored on the PHR’s but also makes use of latest technology to read data of patients with IoMT devices. The patients store the encoded PHR’s on the cloud servers and explicitly give access to distinct segments of PHR’s to diverse sorts of people other than patient himself. The system includes the use of IoMT (Internet of Medical Things) to capture the live data of patient through WSN (Wireless Sensor Network). This data is encrypted with help of Java Libraries to give encryption at IoT end only thus providing security with IoMT data.
Index Terms: Health Care Services, IoMT, IoT, Privacy, Security, Encryption.

Scope of the Article: IoT