ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Data Flow Modelling for Effective Protection of Electronic Health Records (EHRs) in Cloud

V.M.Prabhakaran1, Prof.S.Balamurugan2, S.Charanyaa3
  1. PG Scholar, Department of CSE, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India
  2. Assistant Professor, Department of IT, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India
  3. Senior Software Engineer Mainframe Technologies Former, Larsen & Tubro (L&T) Infotech, Chennai, TamilNadu
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

This paper proposes various data flow models efficiently guard Electronic Health Records (EHRs). Personal Health Records (PHRs) should remain the long-term property of patients data. MyPHRMachines a patient centric system that takes a radically new architectural solution to health record interoperability. Patients Can View their Medical data and they can access and share through remote Virtual machine. Multi authority based encryption with My PHR system (MA-My PHR) is defined to solve the Key generation issues. Finally we illustrate how a prototype of MyPHRMachines supports the use case of a real world patient.

Keywords

Electronic Health Records(EHRs0, Privacy, Microdata, Medical Healthcare System, Database Security.

INTRODUCTION

Scientific communities in areas such as high energy physics, gravitational wave physics, geophysics, astronomy and bioinformatics involve the use of distributed data sources. Hence analysis of their datasets is represented and structured as scientific workflows. Scientific workflows usually need to process large amount of data and computationally intensive activities. Cloud computing is new paradigm for distributed computing which delivers Infrastructure AS A Service (IaaS), Platform as a Service (PaaS), and Software as a Service(SaaS) and are made available as subscriptionbased services in a pay-as-you-go model to consumers computing on to the cloud IoanCristianTrelea [2003]. It aids customers to dynamically provision computing resources around the globe, and also a. Among the various challenges faced in emerging cloud as a successful technology, the major challenge identified is scheduling tasks on to resources. Tasks identified and placed in the cloud may be static or dynamic in nature. In order to efficiently and cost effectively schedule the tasks and data of applications onto these cloud computing environments, application schedulers have different policies that vary according to the objective function: minimize total execution time Osman I .Li [1993] H. EI. Rewini and T.G. Lewrs and H. H. Ali [1994] , minimize total cost to execute, balance the load on resources used while meeting the deadline constraints of the application, and so forth.
The remainder of the paper is organized as follows. Section 2 deals about Survey of Literature of Techniques prevailing to protect EHRs. Basic Primitives and Terminologies are discussed in Section 3. Section 4-6 depicts the various levels of data flow models ranging from 0 to 2. A sample code snippet for cloudlet creation is discussed in Section 7. Section 8 concludes the paper and outlines the direction for Future Work.

II. LITERATURE SURVEY

P.-Y. Yin, S.-S. Yu and Y.-T. Wang (2006) presented a hybrid particle swarm optimization algorithm for finding the near optimal task assignment with reasonable time. The experimental result shows that the HPSO outperforms the GA and the cost difference between the two approaches is statistically significant. Also, the convergence and the worstcase analyses of the HPSO have been empirically conducted. A. E. M. Zavala, A. H. Aguirre, E. R. Villa Diharce, and S. B. Rionda (2008) presented a new constrained optimization algorithm based on a particle swarm optimization (PSO) algorithm approach. Hybrid approach based on a modified ring neighborhood with two new perturbation operators designed to keep diversity is proposed. The paper shows that it is possible to improve PSO and keeping the advantages of its social interaction through a simple idea: perturbing the PSO memory. The proposed algorithm shows a competitive performance against the state-of-the-art constrained optimization algorithms. The proposed algorithm can be used to solve single objective problems with linear or non-linear functions and subject to both equality and inequality constraints which can be linear and non-linear
The task of scheduling a group of dependent or independent tasks among heterogeneous computing environment is a well-established investigational area. The traditional techniques for solving Task Assignment Problem, such as dynamic programming, branch and bound, and divide and conquer has mainly two disadvantages namely the long time consumption and lack of applicability for real-time scheduling applications. Reuy Maw Chen [2001] derived an optimal task assignment scheduling algorithm, to minimize the execution and communication cost and substantiated the algorithm using simulation results. Many heuristic techniques employ certain graphical representation such as Max Flow / Mincut Algorithm to determine the optimal assignment of tasks to processors so as to minimize the total execution and communication cost. This concludes that traditional methods employed, to obtain optimal task assignment are fast, deterministic and tends to produce accurate results, but greatest disadvantage is that it often gets stuck in local optima. Another disadvantage of employing traditional optimization algorithms in solving task assignment problems is the time complexity involved which may be exponential or polynomial. These compelling disadvantages have led to employ modern heuristic approaches such as simulated Annealing algorithm, Genetic Algorithm and Ant colony algorithms. Edwin S.H. Hou et.al.(1994). Applied the heuristic approach, Genetic Algorithms for Multiprocessor scheduling. Annie S.hu et.al.(2004) . Researched on proposing an Incremental Genetic Algorithm Approach to for multiprocessor Scheduling. Graham Ritchie (2003) focused on developing a static multiprocessor scheduling algorithm with ant colony optimization and local search techniques. Reng-Yang et-al [22] proposed a hybrid particle swarm optimization algorithm with Hillchmbing heuristic as the local search method for optimal task assignment in distributed system.
P.Visalakshi et.al. (2009), developed a new hybrid approximation algorithm and also a new parallel version of particle swarm optimization to solve the task assignment problem. The hybrid heuristic model developed, involves Particle Swarm optimization algorithm and Simulated Annealing Algorithm, which performs static allocation of tasks in a heterogeneous distributed computing system in a manner that is designed for cost minimization. The parallel version of Particle Swarm optimization which involves data parallelism is also experimented. The research has led to a conclusion that among the two methods proposed, hybrid approximation algorithm and parallel version of Particle Swarm optimization, the parallel version turned out be more effective and efficient in finding near optimal solutions.
P.Visalakshi et.al. (2009) presented a Hybrid Particle Swarm optimization (HPSO) method for solving task assignment problem, which is np-hard in nature. An algorithm was developed based on Particle Swarm optimization PSO, a recently developed population based heuristic optimization technique to dynamically schedule heterogeneous task on to heterogeneous processors in a distributed environment. The major issue in task scheduling is load balancing is taken into consideration and the nature of the tasks that are to be scheduled are assumed to be independent and nonpreemptor simulation results ensure that hybrid PSO yields a better result when compared to normal PSO , when employed to solve a task assignment problem. The result of HPSO is also compared with another popular heuristic optimization technique, Genetic Algorithms, and result of the research indicated that PSO outperforms GA. P.Visalakshi et.al. (2007) proposed a Hybrid Particle Swarm Optimization Algorithm with Dynamically varying inertia and employed it for multiprocessor scheduling problem. The proposed hybrid heuristic model involved. Particle Swarm Optimization Algorithm and simulated Annealing algorithm PSO with dynamically varying inertial parameter was also implemented and proved to be efficient and effective in finding near optimal solutions when compared to fixed inertia.

III. BASIC PRIMITIVES AND TERMINOLOGIES

Cloud environment may describe a company, organization or an individual who uses a Web based application for every mission rather than installing software and storing data on a computer. Cloud environment involves in provide a functionality to outsource and encrypt the data. Cloud storage service is accessed through the cloud computer service, web service application programming interface or by a cloud storage gateway. The cloud based workspace is centralized providing easy functionality to share. The cloud environment can provide improvements in system efficiency & density. Cloud environment solve the problem of complicated configuration management, Decreased productivity, Limited accessibility and Poor collaboration. It has the capability to access all work, databases and other information from any device. Cloud environment involves in providing some basic network model for storage of data in the cloud. The basic network model for the cloud data storage and three different network entities are
1. User
2. Cloud storage server
3. Cloud service provide
a. User: An entity which has large data files to be stored in the cloud and relies on the cloud for data maintenance and computation can be either individual consumers or organizations.
b. Cloud Storage Server (CSS): An entity which is managed by Cloud service provider. Cloud storage is a subgroup of cloud computing. Cloud computing organizations offer users access to not only storage, but also processing power and computer applications mounted on a remote network. Cloud storage provides users with instant access to a wide ranging of resources and applications hosted in the infrastructure of another organization through a web service interface. Security of stored data and data transfer may be a concern during storing the sensitive data at a cloud storage provider.
c. Cloud Service Provider (CSP):A cloud provider is a company that compromises some constituent of cloud computinghas significant storage space and computation resource to maintain the user data. The Data owner encrypted some keywords about his data, and service provider supported the owner to retrieve his data by keywords and not allow others to retrieve. When supposing the role of cloud provider, an organization is accountable for making cloud services available to cloud customers.

IV. LEVEL 0 DATA FLOW DIAGRAM

image

VI. LEVEL 2 DATA FLOW DIAGRAM

image

VII. SAMPLE CODE SNIPPET FOR CLOUDLET CREATION

image
image

VIII. CONCLUSION AND FUTURE WORK

Portability of critical clinical data, sharing information securely and accessibility of data from different healthcare centers for treatment process can simplify the whole healthcare service. MyPHRMachines allows also the controlled sharing of application software that is required to view or analyze health records. The multi-authority attribute based encryption which it will have many attribute authority for handling the different set of users from various domainsIn this paper, the issue of outsourcing of data in cloud is addressed by the method of key generation for cloud user. Cloud computing, besides providing a maximized effectiveness of shared resources, also provides an easy way of storing and retrieving data. Personal Health Records (PHRs) are designed to maintain lifelong details of patients. Automated Patient Identifier and Patient Care System is designed to count hospitalized patients based on the concept of Current Procedure Terminology (CPT) manager. Cloud storage service is accessed through the cloud computer service, web service application programming interface or by a cloud storage gateway. The cloud based workspace is centralized providing easy functionality to share. The cloud environment can provide improvements in system efficiency & density. As a part of future work, we have planned design the UML diagrams to look into the problem and to increase the clarity and to implement the uploading of encrypted medical data in cloud and in the process of creating individual cloudlets for preventing unauthorized user.

References

  1. Pieter Van Gorp and Marco Comuzzi “Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud” IEEE Journal of Biomedical and Healthcare Informatics, Vol. 18, No. 1, Jan 2014
  2. Lichtenstein Eric Stefan 1984 a, Computer control medical care system US4464172.
  3. ARalph R.Frerichs, Dr. PH.Robert A. Miller 1985, Introduction of a Microcomputer for Health Research in a Developing Country.
  4. Steven P.Brown 1986, Combinational Medical Data, Identification and health Insurance card.
  5. Peter P. Gombrich, Richard J. Beard, Richard A. Griffee, Thomas R. Wilson, Ronald E. Zook, Max S. Hendrickson 1989,A Patient care system,US4835372 A.
  6. Neil Bodick, Andre L. Marquis1990, Interactive system and method for creating and editing a knowledge base for use as a computerized aid to the cognitive process of diagnosis,US4945476 A.
  7. Angela M. Garcia, Dr.,Boca Raton 1991 a, System and Method for scheduling and Reporting Patient related services including prioritizing services,US5974389 A.
  8. Clark Melanie Ann, John Finley, Huska; Michael Edward, Kabel; Geoffrey Harold, Graham, Marc Merrill 1991 b,System and Method for scheduling and Reporting Patient Related services.
  9. Robert W. Kukla1992,Patient care communication system, US5101476 A
  10. Mark C. Sorensen 1993, Computer aided medical diagnostic method and apparatus, US5255187 A.
  11. Edward J. Whalen, San Ramon, Olive Ave Piedmont 1994,Computerized file maintenance System for managing medical records including narrative patent documents reports.v
  12. Desmond D. Cummings 1994b,All care health management system, US5301105 A.
  13. Woodrow B. Kesler Rex K Kesslerin 1994 c,Medical data draft for tracking and evaluating medical treatment.
  14. Joseph P. Tallman, Elizabeth M. Snowden, Barry W. Wolcott 1995, Medical network management system and process, US5471382 A.
  15. Peter S. Stutman, J. Mark Miller 1996,Medical alert distribution system with selective filtering of medical information
  16. Edwin C. Iliff1997,computerized medical diagnostic system including re-enter function and sensitivity factors, US5594638 A.
  17. Timothy Joseph Graettinger, Paul Alton DuBose 1998, Computer-based neural network system and method for medical diagnosis and interpretation. US5839438 A.
  18. Melanie Ann Clark, John Finley Gold, Michael Edward Huska, Geoffrey Harold Kabel, Marc Merrill Graham1999,Medical record management system and process with improved workflow features, US5974389 A.
  19. Richard S. Surwit, Lyle M. Allen, III, Sandra E. Cummings 2000 a, Systems, methods and computer program products for monitoring, diagnosing and treating medical conditions of remotely located patients, US6024699 A.
  20. Jeffrey J. Clawson 2000 b, Method and system for giving remote emergency medical counsel to choking patients, US6010451 A.
  21. Marc Edward Chicorel 2001, Computer keyboard-generated medical progress notes via a coded diagnosis-based language, US6192345 B1. [22] Charlyn Jordan2002, Health analysis and forecast of abnormal conditions.
  22. Jeffrey J. Clawson2003, Method and system for an improved entry process of an emergency medical dispatch system
  23. PekkaRuotsalainen 2004, A cross-platform model for secure Electronic Health Record communication.
  24. Roger J. Quy2005, Method and apparatus for health and disease management combining patient data monitoring with wireless internet connectivity, US6936007 B2.
  25. Avner Amir, Avner Man2006 a, System and method for administration of on-line healthcare, WO2006006176 A2.
  26. Paul C.Tang, Joan S. Ash, David W. Bates, J. Marc overhage and Daniel Z.Sands 2006 b, Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption.
  27. Christopher Alban, KhiangSeow2007, Clinical documentation system for use by multiple caregivers.
  28. Brian A. Rosenfeld, Michael Breslow2008, System and method for accounting and billing patients in a hospital environment.
  29. Jacquelyn Suzanne Hunt, Joseph Siemienczuk 2009, Process and system for enhancing medical patient care.
  30. Richard J. Schuman2010, Health care computer system, US7831447 B2.
  31. Kanagaraj, G.Sumathi, A.C.2011,Proposal of an open-source Cloud computing system for exchanging medical images of a Hospital Information System
  32. AvulaTejaswi, NelaManoj Kumar, GudapatiRadhika, SreenivasVelagapudi 2012 a, Efficient Use of Cloud Computing in Medical Science.
  33. J. Vidhyalakshmi, J. Prassanna 2012 b, Providing a trustable healthcare cloud using an enhanced accountability framework.
  34. Carmelo Pino and Roberto Di Salvo 2013, A Survey of Cloud Computing Architecture and Applications in Health.
  35. K.S. Aswathy, G. Venifa Mini 2014 a, Secure Alternate Viable Technique of Securely Sharing the Personal Health Records in Cloud. [37] Abhishek Kumar Gupta, Kulvinder Singh Mann 2014 sharing of Medical Information on Cloud Platform.
  36. D. C. Kaelber, A. K. Jha, D. Johnston, B. Middleton, and D. W. Bates, "Viewpoint paper: research agenda for personal health records (PHRs),”J. Amer. Med. Inform. Assoc., vol. 15, no. 6, pp. 729–736, 2008.
  37. J. Ahima, “Defining the personal health record,” vol. 76, no. 6, pp. 24–25, Jun. 2005.
  38. W. Currie and M. Guah. "Conflicting institutional logics: a national programme for it in the organizational field of healthcare:, Journal of Information Technology, 22:235–247,2007.
  39. M. Gysels, A. Richardson, and J. I. Higginson "Does the patient-held record improve continuity and related outcomes in cancer care: a systematic review", Health Expectations,10(1):75–91, Mar. 2007.
  40. International Organization for Standardization. ISO TR20514:2005 Health Informatics - Electronic Health Record Definition, Scope and Context Standard. International Organization for Standardization (ISO). Geneva, Switzerland,2005.
  41. R.Buyya, “Higher Performance Cluster Computing-Architecture and Systems”, Volume, Pearson Education, 1990, ISBN 81-317-1693-7.
  42. M.Consard and M.Loi Automatic task Graph Generation Techniques Parallel Processing letters volume 5(4), pages 527-538, December 1995.
  43. M.Y. Wu and DD.Gajski, Hypertool: A Programming Aid for Message Passing Systems. IEEE Transactions on Parallel and Distributed Systems, volume 1 (3), page 330-343, July 1990.
  44. H. EI. Rewini and T.G. Lewrs and H. H. Ali Task Scheduling in Parallel and Distributed Systems, Eaglewood Cliffs, New Jersey Prentice Hall, 1994.
  45. J.Yu, R.Buyya, and Ramamanohararao, Workflow Scheduling Algorithms for Grid Computing, Volume 146/ 2008, Chapter 7, Page 173-214, Springer Berlin/ Heidelberg, 2008.
  46. Behrouz A. Forouzan, Sophia Chung Fegan, “Data Communication and Networking” Fourth Edition, Tata McGrawHill, 2006, page 254-256. [49] Dawna Travis Dewire “Client Server Computing”, Tata McGraw Hill Education Pvt. Ltd, New Delhi.
  47. FatchTasgetinen M and Yun-Chia Liang” A Binary PSO Algorithm for Lot Sizing Problem”, Journal of Economic and social Research, Volume 5, No.2(2004) page 1-20.
  48. S.N. Sivanandam, P.Visalakshi and A. Bhuvaneswari, “Multiprocessor Scheduling using Particle Swarm Optimization”, International Journal of the Computer, the Internet and Management, Volume 17, NO 3, (September-December, 2009) page 11-24.
  49. P.Visalakshi, S.N. Sivanandam, “Dynamic Task Scheduling with Load Balancing using Hybrid Particle Swarm Optimization”, International Journal of open problems in Computer Science and Mathematics, Volume 2, No 3, September 2009, page 475-488.
  50. S.N. Sivanandam, P.Visalakshi and A. Bhuvaneswari“Multiprocessor Scheduling using Hybrid Particle Swarm Optimization with Dynamically Varying Inertia”, International Journal of Computer Science and Applications, volume 4, Issue 3, page 95- 106, 2007 .
  51. Ruey –Maw Chen, Yueh- Min Haang (2001), “Multiprocessor task Assignment with Fuzzy Hopfield Neural Network clustering Techniques”, Journal of Neural Computing and applications, Volume 10, No.1.
  52. Dar-TzenReng, Kang G.Shin, Tarek F. Abdelzaher(1997), “Assignment and scheduling Communicating Periodic Tasks in Distributed Real time Systems, IEEE Transactions on Software Engineering, Volume 23,No.12.
  53. Annie S Wu, Shiyun Jin Kuo- ChiLin and Guy Schiavone(2004), “Incremental Genetic Algorithm Approach to Multi processor Schedulling”, IEEE Transactions on Parallel and Distributed Systems.
  54. Virginia Maylo (1998, “Heuristic Algoriths for Task Assignment sn Distributed Systems”, IEEE Transactions on Computers, Volume 37 ,No.11 page 1384-1391.
  55. IoanCristianTrelea (2003), “The particle Swarm optimization algorithm; convergence analysis and parameter collection”, Information Processing Letters , Volume 85 page 317-325.
  56. S. Batainah and M.AI-Ibrahim(1998),”Load Management in loosely coupled MicroprocessorSystems”,Journal of Dynamic and control, Volume 8, No.1, page 107-116.
  57. Osman I .Li(1993), “Metastrategy Simulated annealing and tabu search algorithms for vehicle routing problems”, Annals of operations Research, Volume 41, No.4, page 421-451.
  58. Edwin. S.H. Hou, NinvanAnsan and Hong Ren(1994), “A genetic Algorithm for Multiprocessor Scheduling”, IEEE Transactions on Parallel and Distributed Systems, Volume 5, No.2.
  59. Annie S.Wu, Shiyun Jin, Kuo Chilin and Guy Schiavone (2004),”Incremental Genetic Algorithm Approach Multiprocessor Schedulling”, IEEE Transaction Parallel and Distributed Systems.
  60. Graham Rilchie (2003) “Static Multiprocessor Scheduling with Ant Colony optimization and Local search”, Master of search”, Master of science Thesis, University of EdiEdinburgh.
  61. Reng-Yeng Yin, Shiuh- Shengyu, Rei-Pei Wang, Yi-Te Wang (2006), “A hybrid Particle Swarm optimization Algorithm for optimal task assignment in distributed Systems”, Computer Standards and Interface, Volume 28,page 441-450.
  62. B.Powmeya , Nikita Mary Ablett ,V.Mohanapriya,S.Balamurugan,”An Object Oriented approach to Model the secure Health care Database systems,”In proceedings of International conference on computer , communication & signal processing(IC3SP)in association with IETE students forum and the society of digital information and wireless communication,SDIWC,2011,pp.2-3
  63. Balamurugan Shanmugam, Visalakshi Palaniswami, “Modified Partitioning Algorithm for Privacy Preservation in Microdata Publishing with Full Functional Dependencies”, Australian Journal of Basic and Applied Sciences, 7(8): pp.316-323, July 2013
  64. Balamurugan Shanmugam, Visalakshi Palaniswami, R.Santhya, R.S.Venkatesh “Strategies for Privacy Preserving Publishing of Functionally Dependent Sensitive Data: A State-of-the-Art-Survey”, Australian Journal of Basic and Applied Sciences, 8(15) September 2014.
  65. S.Balamurugan, P.Visalakshi, V.M.Prabhakaran, S.Chranyaa, S.Sankaranarayanan, "Strategies for Solving the NP-Hard Workflow Scheduling Problems in Cloud Computing Environments", Australian Journal of Basic and Applied Sciences, 8(15) October 2014.
  66. Charanyaa, S., et. al., , A Survey on Attack Prevention and Handling Strategies in Graph Based Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 2(10): 5722-5728, 2013.
  67. Charanyaa, S., et. al., Certain Investigations on Approaches forProtecting Graph Privacy in Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 1(8): 5722-5728, 2013.
  68. Charanyaa, S., et. al., Proposing a Novel Synergized K-Degree L-Diversity T-Closeness Model for Graph Based Data Anonymization. International Journal of Innovative Research in Computer and Communication Engineering, 2(3): 3554-3561, 2014.
  69. Charanyaa, S., et. al., , Strategies for Knowledge Based Attack Detection in Graphical Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 3(2): 5722-5728, 2014.
  70. Charanyaa, S., et. al., Term Frequency Based Sequence Generation Algorithm for Graph Based Data Anonymization International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
  71. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Certain Investigations on Strategies for Protecting Medical Data in Cloud", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
  72. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud ", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
  73. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud" , International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
  74. P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, "Investigations on Evolution of Strategies to Preserve Privacy of Moving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
  75. P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Certain Investigations on Securing Moving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
  76. P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Survey on Approaches Developed for Preserving Privacy of Data Objects" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
  77. S.Jeevitha, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Privacy Preserving Personal Health Care Data in Cloud" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014.
  78. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "Investigations on Methods Evolved for Protecting Sensitive Data", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
  79. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "A Survey on Approaches Developed for Data Anonymization", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
  80. S.Balamurugan, S.Charanyaa, "Principles of Social Network Data Security" LAP Verlag, Germany, ISBN: 978-3-659-61207-7, 2014
  81. S.Balamurugan, S.Charanyaa, "Principles of Scheduling in Cloud Computing" Scholars' Press, Germany,, ISBN: 978-3-639-66950-3, 2014
  82. S.Balamurugan, S.Charanyaa, "Principles of Database Security" Scholars' Press, Germany, ISBN: 978-3-639-76030-9, 2014