B. Devi, V. Vijayakumar, G. Suseela, B. P. Kavin, S. Sivaramakrishnan, Joel Rodrigues
{"title":"AN IMPROVED SECURITY FRAMEWORK IN HEALTH CARE USING HYBRID COMPUTING","authors":"B. Devi, V. Vijayakumar, G. Suseela, B. P. Kavin, S. Sivaramakrishnan, Joel Rodrigues","doi":"10.22452/mjcs.sp2022no1.4","DOIUrl":null,"url":null,"abstract":"Cloud computing is a new category of service that gives each customer access to a large-scale computing network. Since most cloud computing platforms provide services to a large number of people who aren't considered to be trustworthy, various cyber attacks may potentially target them. As a result, a cloud computing system must provide a security monitoring mechanism to protect the Virtual Machine from attacks. In this case, there is a tradeoff between the security level of the security system and its performance. If we need strong security, we'll need more laws or patterns, which means we'll need a lot more computational resources in proportion to the strength of security. As a result of the declining number of resources allocated to customers, we will add a new protection scheme in cloud environments to the VM in this report. Hence, the proposed system Proposed Elliptic curve – Diffie Hellman EC(DH)2 Algorithm is designed and deployed to improve the security in healthcare domain using hybrid computing. The most popular and recent technologies such as cloud computing and fog computing are integrated to explore data movement and stable medical data health-care information. Based on the experimental results, it is inferred that the proposed system offers high security and less operating time while handling the data making its deployment in the healthcare domain.","PeriodicalId":49894,"journal":{"name":"Malaysian Journal of Computer Science","volume":" ","pages":""},"PeriodicalIF":1.1000,"publicationDate":"2022-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Malaysian Journal of Computer Science","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.22452/mjcs.sp2022no1.4","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 3
Abstract
Cloud computing is a new category of service that gives each customer access to a large-scale computing network. Since most cloud computing platforms provide services to a large number of people who aren't considered to be trustworthy, various cyber attacks may potentially target them. As a result, a cloud computing system must provide a security monitoring mechanism to protect the Virtual Machine from attacks. In this case, there is a tradeoff between the security level of the security system and its performance. If we need strong security, we'll need more laws or patterns, which means we'll need a lot more computational resources in proportion to the strength of security. As a result of the declining number of resources allocated to customers, we will add a new protection scheme in cloud environments to the VM in this report. Hence, the proposed system Proposed Elliptic curve – Diffie Hellman EC(DH)2 Algorithm is designed and deployed to improve the security in healthcare domain using hybrid computing. The most popular and recent technologies such as cloud computing and fog computing are integrated to explore data movement and stable medical data health-care information. Based on the experimental results, it is inferred that the proposed system offers high security and less operating time while handling the data making its deployment in the healthcare domain.
期刊介绍:
The Malaysian Journal of Computer Science (ISSN 0127-9084) is published four times a year in January, April, July and October by the Faculty of Computer Science and Information Technology, University of Malaya, since 1985. Over the years, the journal has gained popularity and the number of paper submissions has increased steadily. The rigorous reviews from the referees have helped in ensuring that the high standard of the journal is maintained. The objectives are to promote exchange of information and knowledge in research work, new inventions/developments of Computer Science and on the use of Information Technology towards the structuring of an information-rich society and to assist the academic staff from local and foreign universities, business and industrial sectors, government departments and academic institutions on publishing research results and studies in Computer Science and Information Technology through a scholarly publication. The journal is being indexed and abstracted by Clarivate Analytics'' Web of Science and Elsevier''s Scopus