You are on page 1of 7

A Review on various Cloud-based Electronic Health Record Maintenance

system for COVID-19 Patients


D.Palanivel Rajan1
1
Professor, Dept of CSE, CMR Engineering College, Hyderabad, Telangana, India,
palanivelrajan.d@gmail.com.

Abstract Cloud computing is an evolving technology to maintain the database of any system.
Data collected from any part of the system will be transferred to the cloud, and it will be
retrieved at any point in time. It plays a vital role in biomedical applications, where a huge
number of patient records are needed to be maintained. In recent years we faced an
unexpected pandemic condition due to COVID 19 diseases. Routine human life has turned
upside down due to it. This disease affects the various age groups of people, and the number
of patients affected is also growing exponentially, day after day, across the globe. The
treatment for this critical illness is not the same for patients of different age levels. Aged
people may be already affected by various diseases, whereas middle-aged and children may
not be. COVID 19 is getting more vulnerable, and the death rate is increasing. Diagnosing
this disease is a tedious task for doctors. Symptoms collected from patients of various ages
and the treatment methods offered to them should be appropriately maintained. This may ease
out ways to cure the upcoming affected patients. In this paper, we present an overall review
of various Cloud-based electronic health care recording methods, that are currently available.
Personal Health Records (PHRs) are stored on a remote cloud server using these approaches.
The selective information will be shared when needed by a physician for diagnosis and
treatment. Many new cloud-based systems are developed, which have more secure and safe
data transfer compared to the conventional client-server model. Security is the most
concerned parameter for the emerging cloud technologies as PHRs are to be maintained
confidentially. The various existing cloud-based models are reviewed in the aforementioned
aspect.

Keywords: COVID-19, Electronic Health Record, Cloud, Patient Health record, Security

1. Introduction: Doctors in different parts of the


The world is in the latest situation world need to monitor the people affected
with the outbreak of coronavirus disease with a coronavirus and also need to
2019. Since, December 2019, this disease provide care to them in different countries.
is causing serious impairment and threats Because it will assist them to give better
in more than 200 countries worldwide. treatment to the patients who are affected
This condition also reveals that many
with various severe symptoms. For this,
patients are asymptomatic, or only have
the physician needs to maintain the health
mild symptoms [1]. Patients with
asymptomatic symptoms caused by covid- record of a patient with a history of
19 have recovered by maintaining whether he/she has already been affected
quarantined and taking medicines in some by any other diseases or only affected by
cases, however, the incidence of morality this disease. To adopt this method
has increased due to patients suffering physician needs to create an Electronic
from serious coronavirus disease with Health Record (EHR) of the patient with
coagulopathy [2], and often COVID-19 incorporate cloud computing technology
also becomes problematic for patients for easy access of a record from anywhere
suffering from acute pulmonary embolism in the world by the physician, EHR system
and right-sided heart failure [3] which helps to the physicians to monitor
the flow of patient files inside a hospital symptoms, others have ARDS syndrome,
and also retrieve the information about the which is precipitated by a cytokine storm.
diseases around the world and provide
specific care to the patient's for getting
better lifecycle quality to maximize data,
and recovery processes [4]
At the same time, records that are
stored in cloud-based technology need to
be maintained in a secure way, and also
authenticated persons only access that data
whenever they need it. In order to
efficiently store and exchange PHRs and
eradicate patients' concerns about PHR
privacy, the secure cloud-based EHR
approach, ensures the protection and
security of data that is stored in the cloud,
is discussed using various techniques to Figure 1.1 Possibilities of a cause of
rely on cryptographic primitives. Infection

In Section 2 reviews corona 2.1. Possibilities of Transmission


diseases, different types of symptoms, how This type of disease that spread is
heavily influenced by age as four ranges
they spread to each other, comparison of
have been reported: 0 to 14, 15 to 44, 45 to
diseases in various countries like
64, and => 65 years [5]. Figure 2 shows
developing and developed countries, the age-wise distribution of cases affected
treatment given for a disease. In Section 3 in Mumbai. Mainly by small coughing,
discusses the importance of electronic sneezing, and talking droplets the virus is
health record, how it was designed and transmitted. Usually, the droplets are not
implemented in various countries with airborne. However, those in the immediate
help of cloud computing technology, and vicinity can inhale and get contagious.
also the various security concern People may get contaminated by rubbing
mechanism is used to maintain the data in and then pressing on their mouths. The
cloud computing are discussed. transfer can also be carried out by tiny
droplets, which can be suspended for
2 About Corona Virus: longer periods in the air in closed spaces.
Coronavirus 2019 is a transferrable There are three possibilities of
disease instigated by extreme ARS transmission as symptomatic, pre-
(SARS-CoV-2). This disease is identified symptomatic, and asymptomatic where
in Wuhan, China during December 2019 people can infect.
and now it has resulted in a current
epidemic. As of now, over 26.6 million in
188 countries and territories have been
registered with over 874,000 deaths, with
over 17.7 million recovered. As in Figure
1, various possibilities like Fever, cough,
fatigue, shortness of breath, and smell and
taste issues are among the most common
symptoms. While most people have mild Figure 2.1 Age-wise distribution
2.1.1Symptomatic transmission Coagulopathy is a common
The term "symptomatic complication of severe coronavirus disease
transmission" refers to transmission from a where disseminated intravascular
person who has symptoms. This type of coagulation (DIC) may cause more
virus is transmitted from patients who are number deaths. Many patients with severe
infected already to the people in the near diseases may be affected due to Third
distance by respiratory droplets, contact International Consensus Definitions for
with polluted objects and surfaces, and Sepsis for the evidence of virus infection
straight contact with infected persons. and respiratory dysfunction (Sepsis-3). In
2.1.2Pre-symptomatic transmission addition to these severe cases like long-
The interval between being term bed rest and hormone treatment raise
exposed to this type of virus (getting the risk of venous thromboembolism
infected) is on average of 5-6 days but can (VTE).
be up to 14 days. Some infected people Due to these reasons, it is
can be contagious during this phase, which recommended that individuals with severe
is also known as the "PR symptomatic" can take anticoagulants (such as heparin)
period. As a result, transmission from a on a regular basis. The International
pre-symptomatic illness might occur prior Society of Thrombosis and Haemostasis
to the emergence of symptoms. proposed a new approach known as
2.1.3Asymptomatic transmission “sepsis-induced coagulopathy" (SIC) to
In this, a virus is transmitted from analyze in an earlier stage of sepsis-
one person to another, who does not have associated DIC, and it has been confirmed
any symptoms. This disease is the most that patients who meet the diagnostic
contagious during the first three days after criteria for SIC benefit from anticoagulant
the beginning stage of symptoms, but it therapy. They used retrospective analysis
can spread before and in people who are for validating the effectiveness of the SIC
asymptomatic. score and other coagulation indicators in
2.3. Diagnosis Methods the screening of outpatients who could get
A nasopharyngeal swab is the basic benefit from anticoagulants.
diagnostic tool by reverse transcription- 3. Implementation of Electronic health
polymerase (RT-PCR). Chest CT imagery record
will benefit people with elevated fears of The implementation of Electronic
infection based on symptoms and risk health records with cloud computing
factors to be diagnosed. technology is simple and easy. It is a wide
technology that provides less cost for
2.4 Prevention Methods:
maintaining records, security, privacy,
Preventing infection risk
scalability, implementation. As listed in
minimizations includes staying in a house,
Table 3.1 It is platform-independent with
wearing a mask in public places,
reduced errors, improved quality,
maintaining a distance from others,
flexibility, exchange aid sharing ability.
avoiding crowded places, regularly
Owing to these features cloud computing
washing the hands for at least 20 seconds
technology can effectively provide the
with soap and water, proper respiratory
implementation support for the electronic
care, and avoid of touching eyes, nose, or
health record as shown in Figure 1.[6]
mouth without washing your hands. Let us
Table 3.1 Advantages of EHR in Cloud
see some reviews on this type of covid19
attack.
2.5 Literature related to Severe
coronavirus disease patients with
coagulopathy
which already given for him This
S.
Domain Uses electronic health record makes the
No
Reducing software, physician to get opinion from the other
hardware, physician in the form of mode of
1 Cost treatment, medicine, etc.
installation, and
maintenance costs
The EHR technique is particularly
Encryption and
useful in this current pandemic situation
decryption,
Security and Authentication, for the physician to make the decision for
2 Privacy Two-factor the patients affected by a covid-19 because
authentication, some patients are affected by
Confidentiality, asymptomatic symptoms and some have
Audit, other issues such as registration, heart
Provision of disease, hypertension, kidney failure and
resources at the time some of them are affected by a second
3 Scalability of demand, the covid-19. In this section we will examine
possibility of how to incorporate Electronic Health
development Record using cloud technology by
PC, Laptop, Mobile, providing of the patient record with the
Implementati Windows, SQL, various security aspects, such as privacy
4
on ORACLE, open
and confidentiality. Here discussions are
EHR
made on the aspects of privacy preserving-
Use of multiple and
5 Flexibility separate sites, use attribute based, fuzzy keyword search over
for all shareholders encrypted data and attribute-based
Fast transfer, time encryption.
Exchange and dependent,
6
sharing ability permission of file
owners
Reducing takes in
exchanges,
Reducing
increasing access
errors and
7 speed, integrating
improving the
the multiple types of
quality
electronic health
Figure 3.1 Accessing a record in cloud
records
3.1 Attribute Based Encryption
It is otherwise known as fuzzy
Moreover, Electronic Health identity-based encryption. Key-policy
Record is the digital version of patient attribute-based encryption (KP-ABE) and
medical history which overcomes the ciphertext-policy attribute-based
record maintaining in the paper. The main encryption (CP-ABE) were defined as two
objective of creating and maintaining of different and complementing conceptions
EHR is it helps physicians to make of ABE in this method (CP-ABE). A
decision and disease diagnosis about the construction of KP-ABE was provided in
patients. [13] When he arrives with any the same paper [7,8], while the first CP-
disease, the physician needs to check the APE construction supported for tree-based
previous record information such lab access method in a generic group model.
results, scan images and the prescription Subsequently, a number of alternatives of
ABE schemes have been proposed since its The proposed model is categorized into
introduction. two stages. During the First Stage, the
Its features are being expanded, access control is performed by using the
and schemes with stronger security are XACML language. It determines if the
being proposed. This scheme is an user has been granted permission to obtain
example, of accepting any type of access the medical document. If permission is
structure. The common thing in this granted for the user to access the patient's
approach is to use a technique to delegate records after access control has been
overhead computing with secure completed. In the second stage, it protects
outsourcing for encryption/decryption/key- the patient's privacy by sending the
issuing to the third parties, which reduces documents which are requested by the user
the amount of the calculation done locally. in partial encryption and digital signatures.
This strategy aids us to develop an 3.3 Fuzzy based keyword Search in
outsourcing paradigm for achieving document
efficient local decryption. [9] In This method, the query has been
provided over the encrypted data with the
3.2 Privacy-preserving attribute-based help of keywords. To achieve, this the data
Mechanism owner needs to encode the keywords and
In this paper, the authors discussed the upload the ciphertexts to the cloud server.
extensible access control mark-up By providing a trapdoor of a keyword
language used in a cloud-based EHR users can able to get the data that is used to
model for performing the attribute-based search in the encrypted index in the cloud
access control which focuses on server [11]. There are two methods of
performing partial encryption, security, searchable encryption namely Symmetric
Searchable Encryption (SSE) and Public
and using electronic signatures when a
Encryption Keyword Search (PEKS)] [12].
patient’s document is sent to a document
Keyword search in a multi-user
requester. XML encryption and XML setup is a more prevalent case in a cloud
digital signature technology were utilized, environment, where the files are shared by
as demonstrated in Figure 2. This method a data owner with a group of authorized
is effective because it sends only the users. The persons who have access rights
information which is required to the are able to create legitimate trapdoors and
requesters who are authorized to treat the search the shared files for keywords.
patient. Through keyword search, a fine-grained
access control method is created with the
help of the ABE method. Through
keyword search, ABE is used to provide
fine-grained access control. The concept of
"multi-key searchable encryption"
(MKSE) is proposed as a conceivable
approach for solving the scalability issue.
To search a trapdoors keyword in
the encrypted document with different
Figure 3.2. Accessing records based on keys the MKSE provides a single keyword
XML encryption trapdoor to the user for search over in the
server. By using a different keys search
This model provides the with a keyword trapdoor, it will not
information to the authorized persons who increase the number of trapdoors that
have access to medical records without relate to the number of documents. To
jeopardizing the confidentiality of patients. overcome this issue the edit distance in the
encrypted keywords has been presented as and document retrieval in a better way.
a new technique called fuzzy keyword Modified ring-based completely
search over encrypted data is identified. homomorphic encryption is used to
But it can’t address how the structure encrypt the files. This approach delivers 80
would work in a multi-user system with to 86 percent throughput for encrypted and
changes in searching privileges. decrypted files respectively with indexing
time in less for indexing the files than
3.4 Dynamic multi-keyword-based existing approaches.[6]
search in Cloud
4. Conclusion:
The storing and searching of data
In this, we investigated the
in the electronic health record is the most
epidemiological features and preventative
important criteria to perform the task that
approaches of patients with an
needs to do. As shown in Figure 3.3 a
asymptomatic infection of COVID-19 are
secure way in this Cloud provides
identified. However, there is a paucity of
adequate storage facilities for enterprises
scientific evidence, and the specific
to move their precious
features of silent infections need to be
information/documents to the Cloud. So,
clarified. Then we discussed the
the user can transfer the valued data to the
cloud. But in this transformation security importance of the design and development
is a major concern between the storage of a novel EHR system that should be
service provider and the user. implanted based on cloud technology for
physicians with easy access to records of
patient history with the various security
mechanism. As part of our review, works
need to be taken with the design to provide
an interactive tool in a secure manner to be
taken.

REFERENCES:
1. Zhiru Gao et. al.,” A systematic review
Figure 3.3. Cloud data security scheme of asymptomatic infections with COVID-
In this cryptographic technique is 19”, Journal of Microbiology,
used for the searchable encryption-based Immunology and Infection, May 2020.
document because it ensures security. The 2. Ning Tang1 et. al.,” Anticoagulant
Dynamic multi keyword-based search treatment is associated with decreased
Algorithm, which includes modified mortality in severe coronavirus disease
completely homomorphic encryption and 2019 patients with coagulopathy”,
prims Algorithm, is proposed here. In this International Society on Thrombosis
Keywords are sorted and a searchable and Haemostasis, Wiley online, March
index for keywords and files is produced 2020.
based on the keyword frequency contained 3. Waqas Ullah, MD et. al.,” COVID-19
in the document. Complicated by Acute Pulmonary
Embolism and Right-Sided Heart
To construct the dynamic tree Failure”, ELSEVIER, April 2020.
based on keywords and a file Prim's 4. Victoria Samuel et. al.,” Design and
approach is used. By using a two-way hash Development of a Cloud-based Electronic
table, the encrypted files in the tree are Medical Records (EMR) System, Data,
indexed which provides efficient search Engineering and Applications, April 2019,
pp.25-31.
5. Zhao et al.,” A five-compartment model encryption and Prim’s algorithm”, Cloud
of age-specific transmissibility of SARS- Computing Springer, November 2017
CoV-2”, Infectious Diseases of Poverty,
(2020) 9:117
6. Lia van der Hoek et al.,” Identification
of a new human coronavirus”, Nature
Medicine Volume 10, issue 4, April 2004.
7. Goyal V, Pandey O, Sahai A, Waters B
(2006) Attribute-based encryption for fine-
grained access control of encrypted data.
In: Proceedings of the 13th ACM
conference on computer and
communications security. ACM, pp 89–98
8. Maryam Ahmadi, Nasim Aslani,”
Capabilities and Advantages of Cloud
Computing in the Implementation of
Electronic Health Record”, ACTA
INFORM MED, Volume 26, issue 1,
February 2018 24-28.
9. Fatos Xhafa et. al.,” Designing cloud-
based electronic health record system with
attribute-based encryption”, Multimedia
Tools Appl,2014.
10. Kwangsoo Seol et. al.,” Privacy-
Preserving Attribute-Based Access Control
Model for XML-Based Electronic Health
Record System”, IEEE.Translations and
content mining, Volume 6, March 2018.
11. Zheli Liu1 et. al.,” Cloud-based
electronic health record system supporting
fuzzy keyword search”, Springer
Methodologies and Applications, May
2015
12. Christian Esposito et. al.,” Smart
Cloud Storage Service Selection Based on
Fuzzy Logic, Theory of Evidence and
Game Theory”, IEEE Transactions on
Computers, Dec 2014.
13. Vasee Moorthy et. al.,” Data sharing
for novel coronavirus (COVID-19): Bull
World Health Organ 2020.
14. Cao, N., Wang, C., Li, M., Ren, K.,
Lou, W.: Privacy-preserving multi-
keyword ranked search over encrypted
cloud data. IEEE Trans. Parallel Distrib.
Syst. 25(1), 222–233 (2014)
15.D. Palanivel Rajan et. al.,” Dynamic
multi-keyword-based search algorithm
using modified based fully homomorphic

You might also like