Personalized Retrieval in E – Health Using Cloud
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2015, Vol 3, Issue 6
Abstract
Electronic patient health records encompass valuable information about patient’s medical problems, diagnoses, and treatments offered including their outcomes. However, a problem for medical professionals is an ability to efficiently access the information that are documented in the form of free-text. A multitude of systems are now available through which the vision of access to distributed data for personalised medicine or e-Health is now very much a reality , but retrieving these private data’s are very much in question. Private Information Retrieval (PIR) allows a user to retrieve bits from a database while hiding the user’s access pattern. The goal of Private Information Retrieval (PIR) is for a client to query a database in such a way that no one, including the database operator, can determine any information about the desired database record. This can be applied for retrieving useful data’s of patients affected by cancer across the world., while the information is stored in cloud database for each region connected through network. This paper discusses more about hybrid cloud in trust building knowledge discovery for Private informational retrieval. Existing processes for patients’ vital data collection require a great deal of labour work to collect, input and analyse the information. Privacy is also a major issue. Creating and updating these cloud databases also proves to be a difficult task, with major improvement in cancer treatments day by day, offering a solution to the needful users with private dealing is almost welcoming.
Authors and Affiliations
Ms. C. Pabitha
Comparison Of Various Kernels Of Support Vector Machine
As we know, classification plays an important role in every field. Support vector machine is the popular algorithm for classification and prediction. For classification and prediction by support vector machine, LIBSVM i...
Multi-level Security: Data Sharing Using Cryptography and Steganography in Cloud Computing
In cloud computing, sharing of data is considered as a challenging security problem. The sharing of the user’s critical data on a third party cloud server does not guarantee the promised level of security and there is a...
Vehicle Accident Prevention System Embedded with Alcohol Detector
the main aim of this project is to develop a system that can detect the alcohol content in the air exhaled by the driver and automatically turn off the car if alcohol percentage exceeds the limit. In this project we are...
Optimization of Co-ordination Control of FACTS Devices by Using Fuzzy Lead-Lag Controller
Power system stability control is an important task in power system operation. Several factors, such as external disturbances or internal mechanical torques, may easily affect the power system stability. Hence, the stru...
Comparative Analysis of Multi Storey Buildings with Seismic and Pushover Methods
With the immense loss of life and property witnessed in the last couple of decades alone in India, due to failure of structures caused by earthquakes, attention is now being given to the evaluation of strength in framed...