1
|
Iacopino S, Fabiano G, Sorrenti PF, Filannino P, Artale P, Colella J, Statuto G, Di Vilio A, Campagna G, Peluso G, Fabiano E, Cecchini F, Speziale G, Petretta A. Utility of an innovative cloud-based storage software for ablation redo procedures: Initial experience. Heart Rhythm O2 2024; 5:246-250. [PMID: 38690141 PMCID: PMC11056462 DOI: 10.1016/j.hroo.2024.03.003] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 05/02/2024] Open
Affiliation(s)
- Saverio Iacopino
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Gennaro Fabiano
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | | | - Pasquale Filannino
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Paolo Artale
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Jacopo Colella
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Giovanni Statuto
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Alessandro Di Vilio
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Giuseppe Campagna
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Gianluca Peluso
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Emmanuel Fabiano
- Electrophysiology Department, Magna Graecia University of Catanzaro, Catanzaro, Italy
| | - Federico Cecchini
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| | - Giuseppe Speziale
- Electrophysiology Department, Anthea Hospital, GVM Care & Research, Bari, Italy
- Electrophysiology Department, San Carlo di Nancy Hospital, GVM Care & Research, Rome, Italy
| | - Andrea Petretta
- Electrophysiology Department, Maria Cecilia Hospital, GVM Care & Research, Cotignola, Italy
| |
Collapse
|
2
|
Du J, Dong G, Ning J, Xu Z, Yang R. Identity-based controlled delegated outsourcing data integrity auditing scheme. Sci Rep 2024; 14:7582. [PMID: 38555378 DOI: 10.1038/s41598-024-58325-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/08/2024] [Accepted: 03/27/2024] [Indexed: 04/02/2024] Open
Abstract
With the continuous development of cloud computing, the application of cloud storage has become more and more popular. To ensure the integrity and availability of cloud data, scholars have proposed several cloud data auditing schemes. Still, most need help with outsourced data integrity, controlled outsourcing, and source file auditing. Therefore, we propose a controlled delegation outsourcing data integrity auditing scheme based on the identity-based encryption model. Our proposed scheme allows users to specify a dedicated agent to assist in uploading data to the cloud. These authorized proxies use recognizable identities for authentication and authorization, thus avoiding the need for cumbersome certificate management in a secure distributed computing system. While solving the above problems, our scheme adopts a bucket-based red-black tree structure to efficiently realize the dynamic updating of data, which can complete the updating of data and rebalancing of structural updates constantly and realize the high efficiency of data operations. We define the security model of the scheme in detail and prove the scheme's security under the difficult problem assumption. In the performance analysis section, the proposed scheme is analyzed experimentally in comparison with other schemes, and the results show that the proposed scheme is efficient and secure.
Collapse
Affiliation(s)
- Jianming Du
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| | - Guofang Dong
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China.
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China.
| | - Juangui Ning
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| | - Zhengnan Xu
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| | - Ruicheng Yang
- School of Electrical and Information Technology, Yunnan Minzu University, Kunming, 650504, China
- Yunnan Key Laboratory of Unmanned Autonomous System, Yunnan Minzu University, Kunming, 650504, China
| |
Collapse
|
3
|
Altes GC, Ong AKS, German JD. Determining factors affecting Filipino consumers' behavioral intention to use cloud storage services: An extended technology acceptance model integrating valence framework. Heliyon 2024; 10:e26447. [PMID: 38404810 PMCID: PMC10884492 DOI: 10.1016/j.heliyon.2024.e26447] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/22/2023] [Revised: 02/09/2024] [Accepted: 02/13/2024] [Indexed: 02/27/2024] Open
Abstract
Cloud Storage (CS) is a service that digitally stores, remotely manages, backs up, and renders internet-accessible data. However, despite its known benefits compared to traditional storage devices, this service is not widely used in developing nations such as the Philippines. This study integrated the Valence Theoretical Framework into the Extended Technology Acceptance Model (ETAM) to evaluate the influence of twelve variables on Filipino consumers' behavioral intention (BI) toward adopting CS services. The data is gathered through an online survey. Structural Equation Modeling was employed to examine the responses of 431 cloud users, mainly students and working professionals. Results showed that Perceived Benefit and Perceived Usefulness were the strongest determinants of BI. The Job Relevance was also found to be a significant factor. Therefore, CS providers should find additional ways to make their offerings more beneficial for the daily tasks of students and working individuals. Furthermore, considering the substantial influence of Perceived Risk and Subjective Norms on BI, CS providers must strengthen their security measures to boost users' trust in their services. Consumers who receive excellent service are likely to give positive reviews, which can be helpful to individuals who might also be considering purchasing CS for their data. Although the focus of this study is CS services, this can also serve as a reference when analyzing the BI of consumers concerning the adoption of other novel technologies applied in various sectors, including education, e-commerce, healthcare, and more.
Collapse
Affiliation(s)
- Gerlyn C. Altes
- School of Industrial Engineering and Engineering Management, Mapúa University, Manila, Philippines. 658 Muralla St., Intramuros, Manila, 1002, Philippines
- School of Graduate Studies, Mapúa University, Manila, Philippines. 658 Muralla St., Intramuros, Manila, 1002, Philippines
| | - Ardvin Kester S. Ong
- School of Industrial Engineering and Engineering Management, Mapúa University, Manila, Philippines. 658 Muralla St., Intramuros, Manila, 1002, Philippines
- E.T. Yuchengo School of Business, Mapúa University. 1191 Pablo Ocampo Sr. Ext., Makati, Metro Manila, 1205, Philippines
| | - Josephine D. German
- School of Industrial Engineering and Engineering Management, Mapúa University, Manila, Philippines. 658 Muralla St., Intramuros, Manila, 1002, Philippines
| |
Collapse
|
4
|
Recht MP, Donoso-Bach L, Brkljačić B, Chandarana H, Jankharia B, Mahoney MC. Patient-centered radiology: a roadmap for outpatient imaging. Eur Radiol 2023:10.1007/s00330-023-10370-3. [PMID: 38047974 DOI: 10.1007/s00330-023-10370-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/17/2023] [Revised: 08/16/2023] [Accepted: 08/31/2023] [Indexed: 12/05/2023]
Abstract
Creating a patient-centered experience is becoming increasingly important for radiology departments around the world. The goal of patient-centered radiology is to ensure that radiology services are sensitive to patients' needs and desires. This article provides a framework for addressing the patient's experience by dividing their imaging journey into three distinct time periods: pre-exam, day of exam, and post-exam. Each time period has aspects that can contribute to patient anxiety. Although there are components of the patient journey that are common in all regions of the world, there are also unique features that vary by location. This paper highlights innovative solutions from different parts of the world that have been introduced in each of these time periods to create a more patient-centered experience. CLINICAL RELEVANCE STATEMENT: Adopting innovative solutions that help patients understand their imaging journey and decrease their anxiety about undergoing an imaging examination are important steps in creating a patient centered imaging experience. KEY POINTS: • Patients often experience anxiety during their imaging journey and decreasing this anxiety is an important component of patient centered imaging. • The patient imaging journey can be divided into three distinct time periods: pre-exam, day of exam, and post-exam. • Although components of the imaging journey are common, there are local differences in different regions of the world that need to be considered when constructing a patient centered experience.
Collapse
Affiliation(s)
- Michael P Recht
- Department of Radiology, NYU Langone Health, New York, NY, USA.
| | - Lluís Donoso-Bach
- Hospital Clinic of Barcelona, University of Barcelona, Barcelona, Spain
| | - Boris Brkljačić
- Department of Radiology, University Hospital Dubrava Zagreb, University of Zagreb School of Medicine, Zagreb, Croatia
| | | | | | - Mary C Mahoney
- Department of Radiology, University of Cincinnati Medical Center, Cincinnati, USA
| |
Collapse
|
5
|
Kumar P, Raghavendran S, Silambarasan K, Kannan KS, Krishnan N. Mobile application using DCDM and cloud-based automatic plant disease detection. Environ Monit Assess 2022; 195:44. [PMID: 36302915 DOI: 10.1007/s10661-022-10561-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/05/2021] [Accepted: 12/31/2021] [Indexed: 06/16/2023]
Abstract
Farming has a plethora of difficult responsibilities, and plant monitoring is one of them. There is also an urgent need to increase the number of alternative techniques for detecting plant diseases, which is now lacking. The agriculture and agricultural support sectors in India provide employment for the great majority of the country's people. In India, the agricultural production of the country is directly connected to the country's economic growth rate. In order to sustain healthy plant development, a variety of processes must be followed, including consideration of environmental factors and water supply management for the optimal production of crops. It is inefficient and uncertain in its outcomes to use the traditional method of watering a lawn. The devastation of more than 18% of the world's agricultural produce is caused by disease attacks on an annual basis. Because it is difficult to execute these activities manually, identifying plant diseases is essential to decreasing losses in the agricultural product business. In addition to diagnosing a wide range of plant ailments, our method also includes the identification of infections as a prophylactic step. Below is a detailed description of a farm-based module that includes numerous cloud data centers and data conversion devices for accurately monitoring and managing farm information and environmental elements. This procedure involves imaging the plant's visually obvious signs in order to identify disease. It is recommended that the therapy be used in conjunction with an application to minimize any harm. Increased productivity as a result of the suggested approach would help both the agricultural and irrigation sectors. The plant area module is fitted with a mobile camera that captures images of all of the plants in the area, and all of the plants' information is saved in a database, which is accessible from any computer with Internet access. It is planned to record information on the plant's name, the type of illness that has been afflicted, and an image of the plant. In a wide range of applications, bots are used to collect images of various plants as well as to prevent disease transmission. To ensure that all information given is retained on the Internet, data is collected and stored in cloud storage as it becomes essential to regulate the condition. According to our findings from our research on wide images of healthy and ill fruit and plant leaves, real-time diagnosis of plant leaf diseases may be done with 98.78% accuracy in a laboratory environment. We utilized 40,000 photographs and then analyzed 10,000 photos to construct a DCDM deep learning model, which was then used to train additional models on the data set. Using a cloud-based image diagnostic and classification service, consumers may receive information about their condition in less than a second on average, with the process requiring only 0.349 s on average.
Collapse
Affiliation(s)
- Parasuraman Kumar
- Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Abishekaptti, Tirunelveli, Tamilnadu, 627 012, India
| | - Srinivasan Raghavendran
- Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Abishekaptti, Tirunelveli, Tamilnadu, 627 012, India.
- Department of Computer Science and Engineering, Vel Tech Rangarajan Dr, Sagunthala R&D Institute of Science and Technology, Chennai, Tamilnadu, 600 062, India.
| | - Karunagaran Silambarasan
- Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Abishekaptti, Tirunelveli, Tamilnadu, 627 012, India
| | | | - Nallaperumal Krishnan
- Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Abishekaptti, Tirunelveli, Tamilnadu, 627 012, India
| |
Collapse
|
6
|
Wegner T, Lassnig M, Ueberholz P, Zeitnitz C. Simulation and Evaluation of Cloud Storage Caching for Data Intensive Science. Comput Softw Big Sci 2022; 6:5. [PMID: 36620727 PMCID: PMC9805534 DOI: 10.1007/s41781-021-00076-w] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/11/2020] [Accepted: 11/29/2021] [Indexed: 01/10/2023]
Abstract
A common task in scientific computing is the data reduction. This workflow extracts the most important information from large input data and stores it in smaller derived data objects. The derived data objects can then be used for further analysis. Typically, these workflows use distributed storage and computing resources. A straightforward setup of storage media would be low-cost tape storage and higher-cost disk storage. The large, infrequently accessed input data are stored on tape storage. The smaller, frequently accessed derived data is stored on disk storage. In a best-case scenario, the large input data is only accessed very infrequently and in a well-planned pattern. However, practice shows that often the data has to be processed continuously and unpredictably. This can significantly reduce tape storage performance. A common approach to counter this is storing copies of the large input data on disk storage. This contribution evaluates an approach that uses cloud storage resources to serve as a flexible cache or buffer, depending on the computational workflow. The proposed model is explored for the case of continuously processed data. For the evaluation, a simulation tool was developed, which can be used to analyse models related to storage and network resources. We show that using commercial cloud storage can reduce on-premises disk storage requirements, while maintaining an equal throughput of jobs. Moreover, the key metrics of the model are discussed, and an approach is described, which uses the simulation to assist with the decision process of using commercial cloud storage. The goal is to investigate approaches and propose new evaluation methods to overcome future data challenges.
Collapse
Affiliation(s)
| | - Mario Lassnig
- European Organization for Nuclear Research (CERN), Meyrin, Switzerland
| | | | | |
Collapse
|
7
|
Sowmiya B, Abhijith V, Sudersan S, Sakthi Jaya Sundar R, Thangavel M, Varalakshmi P. A Survey on Security and Privacy Issues in Contact Tracing Application of Covid-19. SN Comput Sci 2021; 2:136. [PMID: 33728414 PMCID: PMC7951128 DOI: 10.1007/s42979-021-00520-z] [Citation(s) in RCA: 17] [Impact Index Per Article: 5.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/11/2020] [Accepted: 02/11/2021] [Indexed: 12/13/2022]
Abstract
In response to the coronavirus (COVID-19) pandemic, Government and public health authorities around the world are developing contact tracing apps as a way to trace and slow the unfold of the virus. There is major divergence among nations, however, between a "privacy-first" approach that protects citizens' information at the price of very restricted access for public health authorities and a "data-first" approach that stores massive amounts of knowledge that, whereas of immeasurable price to epidemiologists. Contact tracing apps work by gathering information from people who have tested positive for the virus and so locating and notifying individuals with whom those people are in shut contact, oftentimes by use of GPS, Bluetooth, or wireless technology. All of the user's information is employed and picked up, the study found that users' information would be created anonymous, encrypted, secured, and can be transmitted on-line and stored solely in an aggregated format. Contact tracing apps use either a centralized or a decentralized approach to work the user's information. Apps that use a centralized approach have high privacy risks. In this paper, the researcher's contributions related to the security and privacy of Contact tracing apps have been discussed and, later research gaps have been identified with proposed solutions.
Collapse
Affiliation(s)
- B. Sowmiya
- Department of Information Technology, Thiagarajar College of Engineering, Madurai, Tamilnadu India
| | - V.S. Abhijith
- Department of Information Technology, Thiagarajar College of Engineering, Madurai, Tamilnadu India
| | - S. Sudersan
- Department of Information Technology, Thiagarajar College of Engineering, Madurai, Tamilnadu India
| | - R. Sakthi Jaya Sundar
- Melmaruvathur Adhiparasakthi Institute of Medical Sciences and Research, Melmaruvathur, India
| | - M. Thangavel
- Department of Computer Science and Engineering, Siksha ‘O’ Anusandhan Deemed to be University, Bhubaneswar, Odisha India
| | - P. Varalakshmi
- Department of Computer Technology, Madras Institute of Technology, Anna University, Chennai, Tamilnadu India
| |
Collapse
|
8
|
Kapil G, Agrawal A, Attaallah A, Algarni A, Kumar R, Khan RA. Attribute based honey encryption algorithm for securing big data: Hadoop distributed file system perspective. PeerJ Comput Sci 2020; 6:e259. [PMID: 33816911 PMCID: PMC7924543 DOI: 10.7717/peerj-cs.259] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/22/2019] [Accepted: 01/21/2020] [Indexed: 05/30/2023]
Abstract
Hadoop has become a promising platform to reliably process and store big data. It provides flexible and low cost services to huge data through Hadoop Distributed File System (HDFS) storage. Unfortunately, absence of any inherent security mechanism in Hadoop increases the possibility of malicious attacks on the data processed or stored through Hadoop. In this scenario, securing the data stored in HDFS becomes a challenging task. Hence, researchers and practitioners have intensified their efforts in working on mechanisms that would protect user's information collated in HDFS. This has led to the development of numerous encryption-decryption algorithms but their performance decreases as the file size increases. In the present study, the authors have enlisted a methodology to solve the issue of data security in Hadoop storage. The authors have integrated Attribute Based Encryption with the honey encryption on Hadoop, i.e., Attribute Based Honey Encryption (ABHE). This approach works on files that are encoded inside the HDFS and decoded inside the Mapper. In addition, the authors have evaluated the proposed ABHE algorithm by performing encryption-decryption on different sizes of files and have compared the same with existing ones including AES and AES with OTP algorithms. The ABHE algorithm shows considerable improvement in performance during the encryption-decryption of files.
Collapse
Affiliation(s)
- Gayatri Kapil
- Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
| | - Alka Agrawal
- Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
| | - Abdulaziz Attaallah
- Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
| | - Abdullah Algarni
- Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia
| | - Rajeev Kumar
- Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
| | - Raees Ahmad Khan
- Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow, Uttar Pradesh, India
| |
Collapse
|
9
|
Savari GF, Krishnasamy V, Sathik J, Ali ZM, Abdel Aleem SHE. Internet of Things based real-time electric vehicle load forecasting and charging station recommendation. ISA Trans 2020; 97:431-447. [PMID: 31400820 DOI: 10.1016/j.isatra.2019.08.011] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/19/2019] [Revised: 08/04/2019] [Accepted: 08/04/2019] [Indexed: 06/10/2023]
Abstract
Electric vehicles (EVs) are emerging as a favorable strategy to meet the increasing environmental concerns and energy insufficiency, and this trend is expected to grow in the near future. However, the inadequate charging infrastructure is becoming a major barrier to the wide acceptance of EVs. Deployment of this infrastructure is expected to maximize the adoption of EVs to facilitate users' range anxiety. Therefore, connectivity between the charging stations (CS) is mandatory. Understanding the real-time status of CSs can provide valuable information to users such as availability of charging provisions, reserves and the time to reach the CS. The intent of this paper is to provide a better EV charging system by utilizing the advantages of the Internet of Things (IoT) technology. The IoT paradigm offers the present facilities a real-time interactional view of the physical world by a variety of sensors and broadcasting tools. This research article proposes a real-time server-based forecasting application: i) to provide scheduling management to avoid waiting time; and ii) to provide a real-time CS recommendation for EVs with an economic cost and reduced charging time. In addition, the proposed scheme avoids third-party intervention and protects EV user privacy and complex information exchange between the user and CS. The end users can easily use the CS based on their requirements. This synergetic application is built up through the PHP programming language in the Linux UBUNTU 16.04 LTS operating system, and all relevant information is processed and managed through Cloud Structured Query Language (CSQL) from a Google cloud platform. The effectiveness of this application is also validated through a low-cost test system using LTC 4150, ESP 8266 Wi-Fi module and Arduino.
Collapse
Affiliation(s)
- George F Savari
- SRM Institute of Science and Technology, Chennai 603-203, India
| | | | - Jagabar Sathik
- SRM Institute of Science and Technology, Chennai 603-203, India
| | - Ziad M Ali
- Electrical Engineering Department, College of Engineering at Wadi Addawaser, 11991, Prince Sattam bin Abdulaziz University, Saudi Arabia; Electrical Engineering Department, Aswan faculty of Engineering, 81542, Aswan University, Egypt
| | - Shady H E Abdel Aleem
- 15th of May Higher Institute of Engineering, Mathematical and Physical Sciences, Helwan, Cairo, Egypt.
| |
Collapse
|
10
|
Hettige S, Dasanayaka E, Ediriweera DS. Usage of cloud storage facilities by medical students in a low-middle income country, Sri Lanka: a cross sectional study. BMC Med Inform Decis Mak 2020; 20:10. [PMID: 31992273 PMCID: PMC6986067 DOI: 10.1186/s12911-020-1029-z] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/27/2019] [Accepted: 01/20/2020] [Indexed: 11/10/2022] Open
Abstract
Background Cloud storage facilities (CSF) has become popular among the internet users. There is limited data on CSF usage among university students in low middle-income countries including Sri Lanka. In this study we present the CSF usage among medical students at the Faculty of Medicine, University of Kelaniya. Methods We undertook a cross sectional study at the Faculty of Medicine, University of Kelaniya, Sri Lanka. Stratified random sampling was used to recruit students representing all the batches. A self-administrated questionnaire was given. Results Of 261 (90.9%) respondents, 181 (69.3%) were females. CSF awareness was 56.5% (95%CI: 50.3–62.6%) and CSF usage was 50.8% (95%CI: 44.4–57.2%). Awareness was higher in males (P = 0.003) and was low in senior students. Of CSF aware students, 85% knew about Google Drive and 70.6% used it. 73.6 and 42.1% knew about Dropbox and OneDrive. 50.0 and 22.0% used them respectively. There was no association between CSF awareness and pre-university entrance or undergraduate examination performance. Inadequate knowledge, time, accessibility, security and privacy concerns limited CSF usage. 69.8% indicated that they would like to undergo training on CSF as an effective tool for education. Conclusion CSF awareness and usage among the students were 56.5 and 50.8%. Google drive is the most popular CSF. Lack of knowledge, accessibility, concerns on security and privacy limited CSF usage among students. Majority were interested to undergo training on CSF and undergraduate Information Communication Technology (ICT) curricula should introduce CSF as effective educational tools.
Collapse
Affiliation(s)
- Samankumara Hettige
- Centre for Health Informatics, Biostatistics and Epidemiology, Faculty of Medicine, University of Kelaniya, Ragama, Sri Lanka.
| | - Eshani Dasanayaka
- Centre for Health Informatics, Biostatistics and Epidemiology, Faculty of Medicine, University of Kelaniya, Ragama, Sri Lanka
| | - Dileepa Senajith Ediriweera
- Centre for Health Informatics, Biostatistics and Epidemiology, Faculty of Medicine, University of Kelaniya, Ragama, Sri Lanka
| |
Collapse
|
11
|
Wang H, Song Y. Secure Cloud-Based EHR System Using Attribute-Based Cryptosystem and Blockchain. J Med Syst 2018; 42:152. [PMID: 29974270 DOI: 10.1007/s10916-018-0994-6] [Citation(s) in RCA: 89] [Impact Index Per Article: 14.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/03/2018] [Accepted: 06/12/2018] [Indexed: 10/28/2022]
Abstract
To achieve confidentiality, authentication, integrity of medical data, and support fine-grained access control, we propose a secure electronic health record (EHR) system based on attribute-based cryptosystem and blockchain technology. In our system, we use attribute-based encryption (ABE) and identity-based encryption (IBE) to encrypt medical data, and use identity-based signature (IBS) to implement digital signatures. To achieve different functions of ABE, IBE and IBS in one cryptosystem, we introduce a new cryptographic primitive, called combined attribute-based/identity-based encryption and signature (C-AB/IB-ES). This greatly facilitates the management of the system, and does not need to introduce different cryptographic systems for different security requirements. In addition, we use blockchain techniques to ensure the integrity and traceability of medical data. Finally, we give a demonstrating application for medical insurance scene.
Collapse
|
12
|
Voigt LP, Reynolds K, Mehryar M, Chan WS, Kostelecky N, Pastores SM, Halpern NA. Monitoring sound and light continuously in an intensive care unit patient room: A pilot study. J Crit Care 2016; 39:36-39. [PMID: 28167378 DOI: 10.1016/j.jcrc.2016.12.020] [Citation(s) in RCA: 15] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 09/15/2016] [Revised: 12/09/2016] [Accepted: 12/21/2016] [Indexed: 12/01/2022]
Abstract
PURPOSE To determine the feasibility of continuous recording of sound and light in the intensive care unit (ICU). MATERIALS AND METHODS Four 1-hour baseline scenarios in an empty ICU patient room by day and night (doors open or closed and maximal or minimal lighting) and two daytime scenarios simulating a stable and unstable patient (quiet or loud devices and staff) were conducted. Sound and light levels were continuously recorded using a commercially available multisensor monitor and transmitted via the hospital's network to a cloud-based data storage and management system. RESULTS The empty ICU room was loud with similar mean sound levels of 45 to 46 dBA for the day and night simulations. Mean levels for maximal lighting during day and night ranged from 1306 to 1812 lux and mean levels for minimum lighting were 1 to 3 lux. The mean sound levels for the stable and unstable patient simulations were 61 and 81 dBA, respectively. The mean light levels were 349 lux for the stable patient and 1947 lux for the unstable patient. CONCLUSIONS Combined sound and light can be continuously and easily monitored in the ICU setting. Incorporating sound and light monitors in ICU rooms may promote an enhanced patient- and staff-centered healing environment.
Collapse
Affiliation(s)
- Louis P Voigt
- Critical Care Medicine Service, Department of Anesthesiology and Critical Care Medicine, Memorial Sloan Kettering Cancer Center, New York, NY.
| | - Kelly Reynolds
- Critical Care Medicine Service, Department of Anesthesiology and Critical Care Medicine, Memorial Sloan Kettering Cancer Center, New York, NY
| | - Maryam Mehryar
- Biomedical Engineering Service, Department of Medical Physics, Memorial Sloan Kettering Cancer Center, New York, NY
| | - Wai Soon Chan
- Rowan University School of Osteopathic Medicine, Stratford, NJ
| | - Natalie Kostelecky
- Critical Care Medicine Service, Department of Anesthesiology and Critical Care Medicine, Memorial Sloan Kettering Cancer Center, New York, NY
| | - Stephen M Pastores
- Critical Care Medicine Service, Department of Anesthesiology and Critical Care Medicine, Memorial Sloan Kettering Cancer Center, New York, NY
| | - Neil A Halpern
- Critical Care Medicine Service, Department of Anesthesiology and Critical Care Medicine, Memorial Sloan Kettering Cancer Center, New York, NY
| |
Collapse
|
13
|
Zhou X, Lin F, Yang L, Nie J, Tan Q, Zeng W, Zhang N. Load balancing prediction method of cloud storage based on analytic hierarchy process and hybrid hierarchical genetic algorithm. Springerplus 2016; 5:1989. [PMID: 27917360 PMCID: PMC5114220 DOI: 10.1186/s40064-016-3619-x] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/21/2016] [Accepted: 10/28/2016] [Indexed: 11/15/2022]
Abstract
With the continuous expansion of the cloud computing platform scale and rapid growth of users and applications, how to efficiently use system resources to improve the overall performance of cloud computing has become a crucial issue. To address this issue, this paper proposes a method that uses an analytic hierarchy process group decision (AHPGD) to evaluate the load state of server nodes. Training was carried out by using a hybrid hierarchical genetic algorithm (HHGA) for optimizing a radial basis function neural network (RBFNN). The AHPGD makes the aggregative indicator of virtual machines in cloud, and become input parameters of predicted RBFNN. Also, this paper proposes a new dynamic load balancing scheduling algorithm combined with a weighted round-robin algorithm, which uses the predictive periodical load value of nodes based on AHPPGD and RBFNN optimized by HHGA, then calculates the corresponding weight values of nodes and makes constant updates. Meanwhile, it keeps the advantages and avoids the shortcomings of static weighted round-robin algorithm.
Collapse
Affiliation(s)
- Xiuze Zhou
- Software School, Xiamen University, Xiamen, China
| | - Fan Lin
- Software School, Xiamen University, Xiamen, China
| | - Lvqing Yang
- Software School, Xiamen University, Xiamen, China
| | - Jing Nie
- Xiamen Institute of Software Technology, Xiamen, China
| | - Qian Tan
- Software School, Xiamen University, Xiamen, China
| | - Wenhua Zeng
- Software School, Xiamen University, Xiamen, China
| | - Nian Zhang
- Xiamen Institute of Software Technology, Xiamen, China
| |
Collapse
|
14
|
Wu Y, Lu X, Su J, Chen P. An Efficient Searchable Encryption Against Keyword Guessing Attacks for Sharable Electronic Medical Records in Cloud-based System. J Med Syst 2016; 40:258. [PMID: 27722976 DOI: 10.1007/s10916-016-0609-z] [Citation(s) in RCA: 32] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/28/2016] [Accepted: 09/13/2016] [Indexed: 11/30/2022]
Abstract
Preserving the privacy of electronic medical records (EMRs) is extremely important especially when medical systems adopt cloud services to store patients' electronic medical records. Considering both the privacy and the utilization of EMRs, some medical systems apply searchable encryption to encrypt EMRs and enable authorized users to search over these encrypted records. Since individuals would like to share their EMRs with multiple persons, how to design an efficient searchable encryption for sharable EMRs is still a very challenge work. In this paper, we propose a cost-efficient secure channel free searchable encryption (SCF-PEKS) scheme for sharable EMRs. Comparing with existing SCF-PEKS solutions, our scheme reduces the storage overhead and achieves better computation performance. Moreover, our scheme can guard against keyword guessing attack, which is neglected by most of the existing schemes. Finally, we implement both our scheme and a latest medical-based scheme to evaluate the performance. The evaluation results show that our scheme performs much better performance than the latest one for sharable EMRs.
Collapse
Affiliation(s)
- Yilun Wu
- College of Computer, National University of Defense Technology, Changsha, Hunan, People's Republic of China.
| | - Xicheng Lu
- National Key Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, Hunan, People's Republic of China
| | - Jinshu Su
- National Key Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, Hunan, People's Republic of China
| | - Peixin Chen
- College of Computer, National University of Defense Technology, Changsha, Hunan, People's Republic of China
| |
Collapse
|