ISSN ONLINE(2320-9801) PRINT (2320-9798)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Sequence Flow Modelling for Efficient Protection of Personal Health Records (PHRs) in Cloud

V.M.Prabhakaran1, Prof.S.Balamurugan2, S.Charanyaa3
  1. PG Scholar, Department of CSE, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India
  2. Assistant Professor, Department of IT, Kalaignar Karunanidhi Institute of Technology, Coimbatore, TamilNadu, India
  3. Senior Software Engineer Mainframe Technologies Former, Larsen & Tubro (L&T) Infotech, Chennai TamilNadu, India
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Innovative Research in Computer and Communication Engineering

Abstract

This paper proposes various sequence flow models efficiently guard Electronic Health Records (EHRs). Privacy-An important factor need to be considered while we publishing the microdata. Usually government agencies and other organization used to publish the microdata. On releasing the microdata, the sensitive information of the individuals are being disclosed. This constitutes a major problem in the government and organizational sector for releasing the microdata. In order to sector or to prevent the sensitive information, we are going to implement certain algorithms and methods. Normally there two types of information disclosures they are: Identity disclosure and Attribute disclosure. Identity disclosure occurs when an individual's linked to a particular record in the released Attribute disclosure occurs when new information about some individuals are revealed. This paper aims to discuss the existing techniques present in literature for preserving, incremental development, sequence flow model of the system proposed.

Keywords

Electronic Health Records(EHRs0, Privacy, Microdata, Medical Healthcare System, Database Security.

INTRODUCTION

In the present world people suffer from various health problems. They frequently go to different hospitals to get guidance and get their treatments. However they also hurt from health problems they do not wish to share with anyone about their health problems and treatments. So they are in need of a new system to know about their health conditions. Cloud environment provides one such service. Cloud Computing has been intended as the next generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centres, where the management of the data and services may not be fully trustworthy. When the information is maintained in cloud it has various advantages patient no need to carry medical records where ever they go they can access from any desired place. It also minimizes the stress of the patient and the time.
The remainder of the paper is organized as follows. Section 2 deals about Survey of Literature of Techniques prevailing to protect EHRs. Architectural representation of the proposed system is discussed in Section 3. Section 4 discusses about the existing and proposed techniques for securing PHR. The Sequence Flow Modeling of Key Generation is discussed in Section 5. Section 6 discusses about Sequence Flow Modeling of Data Uploading Process. The Sequence Flow Modeling of Data Retrieval Process is depicted in Section 7. Section 8 discusses the Sequence Flow Modeling of Data Sharing Process. Section 9 concludes the paper and outlines the direction for Future Work.

II. LITERATURE SURVEY

PekkaRuotsalainen (2004) [24] in “A cross-platform model for secure Electronic Health Record communication”. Enhanced cross security platform is proposed which support a platform for communication through the adhoc network to access the distributed electronic health records. Roger J. Quy (2005) [25] in “Method and apparatus for health and disease management combining patient data monitoring with wireless internet connectivity”. The health related data is communicated from the WWD to a server using standard internet protocols. Server calculates the response time and further it reviewed by a physician or health care provider. User and server interaction takes place the server transmits a response to the WWD and the user may answer the response.
Avner Amir, Avner Man (2006 a) [26] in “System and method for administration of on-line healthcare”. The end-unit device is guided by the CMIP so that anamnesis, diagnosis treatment is provided, monitored, recorded and clinically investigated. This system is useful for the management of medical records. Paul C.Tang, Joan S. Ash, David W. Bates, J. Marc overhage and Daniel Z.Sands (2006 b) presented “Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption” they explore the Personal Health record (PHR) systems for patients. They carry patient data, they combine data, knowledge and software tools which help the patient to handle their medical data they handle through a standalone computer.
Christopher Alban, KhiangSeow (2007) [28] defines a “Clinical documentation system for use by multiple caregivers” they explain that A computer based system for recording, storing, accessing and retrieving clinical documentation where the care setting is provided. In a single electronic database it stores clinical patient notes, provides multiple points of read/write access through user interface operating on single or more client computers that are in real time communication with the repository.
Brian A. Rosenfeld, Michael Breslow (2008) [29] in “System and method for accounting and billing patients in a hospital environment”. Patient identifier is associated with the billing service provided by the hospitalized unit. If the billable service is provided by a specialist, a specialist identifier is also associated with the billable service. The hospitalized patient is counted and a current procedural terminology (CPT) manager assigns CPT codes to the billable service. A bill generator receives all the details of the patient data, insurance information and CPT codes which generate a bill for the billable services provided to the hospitalized patient.
Jacquelyn Suzanne Hunt, Joseph Siemienczuk (2009) [30] in “Process and system for enhancing medical patient care” explored that a system that abstracts selected information. A data warehouse receives the extracted information and reformats that information. Information’s are analyzed by a health care provider having that medical condition. It further collects the data of the selected patients for multiple health care providers and enables comparisons of health care provider’s success for such patients to promote advance of the treatment by less successful providers.
Richard J. Schuman (2010) [31] defines “Health care computer system” which define the A hospital bed, patient and nurse call system. A hospital network is provided. Communication is provided over a packet based communication network. Kanagaraj, G.Sumathi, A.C. (2011) [32] in “Proposal of an open-source Cloud computing system for exchanging medical images of a Hospital Information System” proposed clinical information system through the cloud can provide the essential details to the health care and the patient can seek the treatment in different hospital, reduce computational resource maintenance in the hospital also existing medical equipment’s can be reconstructed to be more efficient and low-cost. J. Vidhyalakshmi, J. Prassanna (2012) [35] proposed “Providing a trustable healthcare cloud using an enhanced accountability framework” explored that Security and accountability of patient’s personal health record maintenance it handle the Privacy protection problem. They define Distributed accountability framework to control and monitor user data in cloud. It also handle the object centric which automatically trigger an object to create a log record and access over distributed data. Log file corruptions are handled, log manager maintenance and verify corrupted log records. With the introduction of cloud computing in medical data capital expenditure is converted to operational expenditure.
Carmelo Pino and Roberto Di Salvo (2013) [36] in “A Survey of Cloud Computing Architecture and Applications in Health” explained that cloud computing act as an important alternative to ensure high performance data processing and manage the tool in easy manner. Cloud computing provide resource management and computation capabilities, hybrid cloud can increase the development of the health sector. K.S. Aswathy, G. Venifa Mini (2014 a) [37] in “Secure Alternate Viable Technique of Securely Sharing the Personal Health Records in Cloud” proposed a cloud environment for resource sharing it involves in exchange of personal health record between multiple caregivers. Encryption schemes are used to secure the data and provide a patient centric framework for sharing the personal health data. Abhishek Kumar Gupta, Kulvinder Singh Mann (2014 b) defined “Sharing of Medical Information on Cloud Platform” explored that basically hospitals store the patient details in paper format now in the migration to next level medical information are stored in cloud computing which provide a secure way to share. It results in the setting the platform for the exchange and collaboration of medical information.

III. ARCHITECTURAL REPRESENTATION OF PROPOSED SYSTEM

The architectural representation of cloud based PHR storage is represented in Fig 1. The portal plays an important role in uploading copy of data, remote access maintenance, start/stop operation. PCAS access is used to provide and show copies. The cloud takes the responsibility of mounting the PHRs.
image
Architectural representation of MyPHR Machine consists of two components evolution and storage with which client directly interacts with MyPHR Machine. The first component of MyPHR Machine consists of web portal which in turn interacts with Virtual Box Hypervisor. Virtual Machines are connected together with Virtual Box Hypervisor. The second component of MyPHR Machine, storage consists of VM Repository which houses VM Data and Private Network folders as indicated in Figure 2.
image

IV. EXISTING AND PROPOSED TECHNIQUES FOR SECURING PHR

Existing techniques for securing PHR are Paper based PHRs, Electronic device based PHRs and Web based PHRs[1]. PHR systems typically offer functionality to view the PHR data. PHR platforms provide no technical measures for preventing data abuse by the plug-ins that are contributed by third party software vendors. In this system access control mechanism and security issues occurred. PHRs should also be portable so as to enable easy updation and retrieval. PHR systems typically offer functionality to share, visualize and analyze PHR data. Secure lifelong management of patient medical records since data are stored in the cloud and do not have to be carried around by patients.

V. SEQUENCE FLOW MODELING OF KEY GENERATION

Interaction diagrams model the behavior of use cases by describing the way groups of objects interact to complete the task. The two kinds of interaction diagrams are sequence and collaboration diagrams. Interaction diagrams are used when you want to model the behavior of several objects in a use case. They demonstrate how the objects collaborate for the behavior. Interaction diagrams do not give a in depth representation of the behavior. Sequence diagrams, collaboration diagrams, or both diagrams can be used to demonstrate the interaction of objects in a use case. Sequence diagrams generally show the sequence of events that occur. Collaboration diagrams demonstrate how objects are statically connected.
The sequence diagram is used primarily to show the interactions between objects in the sequential order that those interactions occur. Much like the class diagram, developers typically think sequence diagrams were meant exclusively for them. However, an organization's business staff can find sequence diagrams useful to communicate how the business currently works by showing how various business objects interact. Besides documenting an organization's current affairs, a business-level sequence diagram can be used as a requirements document to communicate requirements for a future system implementation. During the requirements phase of a project, analysts can take use cases to the next level by providing a more formal level of refinement. When that occurs, use cases are often refined into one or more sequence diagrams. An organization's technical staff can find sequence diagrams useful in documenting how a future system should behave. During the design phase, architects and developers can use the diagram to force out the system's object interactions, thus fleshing out overall system design. One of the primary uses of sequence diagrams is in the transition from requirements expressed as use cases to the next and more formal level of refinement. Use cases are often refined into one or more sequence diagrams. In addition to their use in designing new systems, sequence diagrams can be used to document how objects in an existing (call it "legacy") system currently interact. This documentation is very useful when transitioning a system to another person or organization.
Diagram Elements:
 Object. Each of the objects that participate in the processing represented in the sequence diagram is drawn across the top. Note that objects are used in this diagram while classes are used in use cases, class diagrams, and state-transition diagrams.
 Lifeline. A dotted line is dropped from each object in the sequence diagram. Arrows terminating on the lifeline indicate messages (commands) sent to the object. Arrows originating on the lifeline indicate messages sent from this object to another object. Time flows from top to bottom on a sequence diagram.
 Active. To indicate that an object is executing, i.e., it has control of the CPU, the lifeline is drawn as a thin rectangle.
 Message. A horizontal arrow represents a message (command) sent from one object to another. Note that parameters can be passed as part of the message and can (optionally) be noted on the diagram.
 Return. When one object commands another, a value is often returned. This may be a value computed by the object as a result of the command or a return code indicating whether the object completed processing the command successfully. These returned values are generally not indicated on a sequence diagram; they are simply assumed. In some instances the object may not be able to return this information immediately. In this case, the return of this information is noted on the diagram later using a dotted arrow. This indicates the flow of information was based on a previous request.
 Conditional. Square brackets are used to indicate a conditional, i.e., a Boolean expression that evaluates to TRUE or FALSE. The message is sent only if the expression is TRUE.
 Iteration. Square brackets preceded by an asterisk (*) indicate iteration. The message is sent multiple times. The expression within the brackets describes the iteration rule.
 Deletion. An X is used to indicate the termination (deletion) of an object.
PHR mainly designed to focus towards achieving the availability of Health data for long term and accessing medical information anywhere and anytime and the invisibility of computing. MY PHR Machine has multiple PHR Data owners and multiple PHR users. The Data owners refer to institution or doctor who has full control over their own PHR data. They can create, manage and delete it. The users include readers and writers that may come from various aspects. MYPHR machine has a cloud server where the data store and access functionality undergoes. Users access the PHR documents through the server in order to read or write to PHR. The PHR files can be organized by their categories in a hierarchical way. Several objectivities for the User process are.
Fine-grained access control: It should be imposed. Different users can be authorized to initiate sets of files and access.
User level processing: At any time if it is required a user’s access privileges should be processed from future access in an efficient way.
Data access should be flexible: No need any conversion tool to process the user functionality it’s more flexible to access the data.
Efficiency: To support a large and volatile number of users, the system should be highly scalable and efficient. They mainly focus on the key management, user management, and computation and storage.
Data owner is the one who can deliver the permission to the cloud server to provide the access function to the user if the user level is legal and authorized one. Transaction gets cancel without initiating if the user is an Illegal user. Once the initiation gets success the keys are generated by the Advanced encryption standard which has an important skill of generating the key in fast manner. Users attain attribute-based keys from their AA (Attribute Authority). They submit their legality information and obtain keys that connect them to claimed attributes.

VI. SEQUENCE FLOW MODELING OF UPLOADING PROCESS

The general process of upload function is, user through network system will login or specify the user level. The user level will be checked against login cloud data owner. System will verify that to which domain user and grant permission. Doctor who involved in monitoring and maintaining the patient details will collect all the treatment reports and prescriptions details and upload in the cloud server where the user with the assigned key or level has a permission to access the data anytime or anywhere without going to the institution.
Patient gets all the relevant prescriptions and guidance about the treatment. Key distribution will be again managed by Cloud server .To avoid key assignment problem will be using the concept of attribute authority (AA). File size will be specified and the cloudlet gets and stored.
image

VII. SEQUENCE FLOW MODELING OF DATA RETRIEVING PROCESS

In retrieval process the system can be analyzed on various parameters like Security, scalability and efficiency and perform the operation. Read access and write access are been provided according to privilege provided to the user.
User level should be entered in correct manner to access the file where the person who is not organized will never get access to such retrieval data. Data may be monitored by the doctor who is the source person in maintaining the tight bond relationship. MYPHR system will be providing the new architecture solution for all the medical data retrieval process.
image

VIII. SEQUENCE FLOW MODELING OF DATA SHARING PROCESS

PHR data can be shared to the care provider or the institution to whom the user level permission has been granted. Share Functionality also performs level identification process. Only the initiated level use can perform the share process, if any illegal user try to access the data cloud server will not grant permission to use the data. Cloud server will check with the data owner to provide the access permission.
image

IX. CONCLUSION AND FUTURE WORK

In this paper, the issue of outsourcing of data in cloud is addressed by the method of key generation for cloud user. Cloud computing, besides providing a maximized effectiveness of shared resources, also provides an easy way of storing and retrieving data. Personal Health Records (PHRs) are designed to maintain lifelong details of patients. Automated Patient Identifier and Patient Care System is designed to count hospitalized patients based on the concept of Current Procedure Terminology (CPT) manager. Cloud storage service is accessed through the cloud computer service, web service application programming interface or by a cloud storage gateway. The cloud based workspace is centralized providing easy functionality to share. The cloud environment can provide improvements in system efficiency & density. As a part of future work, we have planned design the UML diagrams to look into the problem and to increase the clarity and to implement the uploading of encrypted medical data in cloud and in the process of creating individual cloudlets for preventing unauthorized user.

References

  1. Pieter Van Gorp and Marco Comuzzi “Lifelong Personal Health Data and Application Software via Virtual Machines in the Cloud” IEEE Journal of Biomedical and Healthcare Informatics, Vol. 18, No. 1, Jan 2014
  2. Lichtenstein Eric Stefan 1984 a, Computer control medical care system US4464172.
  3. ARalph R.Frerichs, Dr. PH.Robert A. Miller 1985, Introduction of a Microcomputer for Health Research in a Developing Country.
  4. Steven P.Brown 1986, Combinational Medical Data, Identification and health Insurance card.
  5. Peter P. Gombrich, Richard J. Beard, Richard A. Griffee, Thomas R. Wilson, Ronald E. Zook, Max S. Hendrickson 1989,A Patient care system,US4835372 A.
  6. Neil Bodick, Andre L. Marquis1990, Interactive system and method for creating and editing a knowledge base for use as a computerized aid to the cognitive process of diagnosis,US4945476 A.
  7. Angela M. Garcia, Dr.,Boca Raton 1991 a, System and Method for scheduling and Reporting Patient related services including prioritizing services,US5974389 A.
  8. Clark Melanie Ann, John Finley, Huska; Michael Edward, Kabel; Geoffrey Harold, Graham, Marc Merrill 1991 b,System and Method for scheduling and Reporting Patient Related services.
  9. Robert W. Kukla1992,Patient care communication system, US5101476 A
  10. Mark C. Sorensen 1993, Computer aided medical diagnostic method and apparatus, US5255187 A.
  11. Edward J. Whalen, San Ramon, Olive Ave Piedmont 1994,Computerized file maintenance System for managing medical records including narrative patent documents reports.
  12. Desmond D. Cummings 1994b,All care health management system, US5301105 A.
  13. Woodrow B. Kesler Rex K Kesslerin 1994 c,Medical data draft for tracking and evaluating medical treatment.
  14. Joseph P. Tallman, Elizabeth M. Snowden, Barry W. Wolcott 1995, Medical network management system and process, US5471382 A.
  15. Peter S. Stutman, J. Mark Miller 1996,Medical alert distribution system with selective filtering of medical information
  16. Edwin C. Iliff1997,computerized medical diagnostic system including re-enter function and sensitivity factors, US5594638 A.
  17. Timothy Joseph Graettinger, Paul Alton DuBose 1998, Computer-based neural network system and method for medical diagnosis and interpretation. US5839438 A.
  18. Melanie Ann Clark, John Finley Gold, Michael Edward Huska, Geoffrey Harold Kabel, Marc Merrill Graham1999,Medical record management system and process with improved workflow features, US5974389 A.
  19. Richard S. Surwit, Lyle M. Allen, III, Sandra E. Cummings 2000 a, Systems, methods and computer program products for monitoring, diagnosing and treating medical conditions of remotely located patients, US6024699 A.
  20. Jeffrey J. Clawson 2000 b, Method and system for giving remote emergency medical counsel to choking patients, US6010451 A.
  21. Marc Edward Chicorel 2001, Computer keyboard-generated medical progress notes via a coded diagnosis-based language, US6192345 B1.
  22. Charlyn Jordan2002, Health analysis and forecast of abnormal conditions.
  23. Jeffrey J. Clawson2003, Method and system for an improved entry process of an emergency medical dispatch system
  24. PekkaRuotsalainen 2004, A cross-platform model for secure Electronic Health Record communication.
  25. Roger J. Quy2005, Method and apparatus for health and disease management combining patient data monitoring with wireless internet connectivity, US6936007 B2.
  26. Avner Amir, Avner Man2006 a, System and method for administration of on-line healthcare, WO2006006176 A2.
  27. Paul C.Tang, Joan S. Ash, David W. Bates, J. Marc overhage and Daniel Z.Sands 2006 b, Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption.
  28. Christopher Alban, KhiangSeow2007, Clinical documentation system for use by multiple caregivers.
  29. Brian A. Rosenfeld, Michael Breslow2008, System and method for accounting and billing patients in a hospital environment.
  30. Jacquelyn Suzanne Hunt, Joseph Siemienczuk 2009, Process and system for enhancing medical patient care.
  31. Richard J. Schuman2010, Health care computer system, US7831447 B2.
  32. Kanagaraj, G.Sumathi, A.C.2011,Proposal of an open-source Cloud computing system for exchanging medical images of a Hospital Information System
  33. AvulaTejaswi, NelaManoj Kumar, GudapatiRadhika, SreenivasVelagapudi 2012 a, Efficient Use of Cloud Computing in Medical Science.
  34. J. Vidhyalakshmi, J. Prassanna 2012 b, Providing a trustable healthcare cloud using an enhanced accountability framework.
  35. Carmelo Pino and Roberto Di Salvo 2013, A Survey of Cloud Computing Architecture and Applications in Health.
  36. K.S. Aswathy, G. Venifa Mini 2014 a, Secure Alternate Viable Technique of Securely Sharing the Personal Health Records in Cloud.
  37. Abhishek Kumar Gupta, Kulvinder Singh Mann 2014 sharing of Medical Information on Cloud Platform.
  38. D. C. Kaelber, A. K. Jha, D. Johnston, B. Middleton, and D. W. Bates, "Viewpoint paper: research agenda for personal health records (PHRs),”J. Amer. Med. Inform. Assoc., vol. 15, no. 6, pp. 729–736, 2008.
  39. J. Ahima, “Defining the personal health record,” vol. 76, no. 6, pp. 24–25, Jun. 2005.
  40. W. Currie and M. Guah. "Conflicting institutional logics: a national programme for it in the organizational field of healthcare:, Journal of Information Technology, 22:235–247,2007.
  41. M. Gysels, A. Richardson, and J. I. Higginson "Does the patient-held record improve continuity and related outcomes in cancer care: a systematic review", Health Expectations,10(1):75–91, Mar. 2007.
  42. International Organization for Standardization. ISO TR20514:2005 Health Informatics - Electronic Health Record Definition, Scope and Context Standard. International Organization for Standardization (ISO). Geneva, Switzerland,2005.
  43. B.Powmeya , Nikita Mary Ablett ,V.Mohanapriya,S.Balamurugan,”An Object Oriented approach to Model the secure Health care Database systems,”In proceedings of International conference on computer , communication & signal processing(IC3SP)in association with IETE students forum and the society of digital information and wireless communication,SDIWC,2011,pp.2-3
  44. Balamurugan Shanmugam, Visalakshi Palaniswami, “Modified Partitioning Algorithm for Privacy Preservation in Microdata Publishing with Full Functional Dependencies”, Australian Journal of Basic and Applied Sciences, 7(8): pp.316-323, July 2013
  45. Balamurugan Shanmugam, Visalakshi Palaniswami, R.Santhya, R.S.Venkatesh “Strategies for Privacy Preserving Publishing of Functionally Dependent Sensitive Data: A State-of-the-Art-Survey”, Australian Journal of Basic and Applied Sciences, 8(15) September 2014.
  46. S.Balamurugan, P.Visalakshi, V.M.Prabhakaran, S.Chranyaa, S.Sankaranarayanan, "Strategies for Solving the NP-Hard Workflow Scheduling Problems in Cloud Computing Environments", Australian Journal of Basic and Applied Sciences, 8(15) October 2014.
  47. Charanyaa, S., et. al., , A Survey on Attack Prevention and Handling Strategies in Graph Based Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 2(10): 5722-5728, 2013.
  48. Charanyaa, S., et. al., Certain Investigations on Approaches forProtecting Graph Privacy in Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 1(8): 5722-5728, 2013.
  49. Charanyaa, S., et. al., Proposing a Novel Synergized K-Degree L-Diversity T-Closeness Model for Graph Based Data Anonymization. International Journal of Innovative Research in Computer and Communication Engineering, 2(3): 3554-3561, 2014.
  50. Charanyaa, S., et. al., , Strategies for Knowledge Based Attack Detection in Graphical Data Anonymization. International Journal of Advanced Research in Computer and Communication Engineering, 3(2): 5722-5728, 2014.
  51. Charanyaa, S., et. al., Term Frequency Based Sequence Generation Algorithm for Graph Based Data Anonymization International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
  52. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Certain Investigations on Strategies for Protecting Medical Data in Cloud", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
  53. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Investigations on Remote Virtual Machine to Secure Lifetime PHR in Cloud ", International Journal of Innovative Research in Computer and Communication Engineering Vol 2, Issue 10, October 2014
  54. V.M.Prabhakaran, Prof.S.Balamurugan, S.Charanyaa," Privacy Preserving Personal Health Care Data in Cloud" , International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
  55. P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, "Investigations on Evolution of Strategies to Preserve Privacy of Moving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
  56. P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Certain Investigations on Securing Moving Data Objects" International Journal of Innovative Research in Computer and Communication Engineering, 2(2): 3033-3040, 2014.
  57. P.Andrew, J.Anish Kumar, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Survey on Approaches Developed for Preserving Privacy of Data Objects" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014
  58. S.Jeevitha, R.Santhya, Prof.S.Balamurugan, S.Charanyaa, " Privacy Preserving Personal Health Care Data in Cloud" International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 2, October 2014.
  59. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "Investigations on Methods Evolved for Protecting Sensitive Data", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
  60. K.Deepika, P.Andrew, R.Santhya, S.Balamurugan, S.Charanyaa, "A Survey on Approaches Developed for Data Anonymization", International Advanced Research Journal in Science, Engineering and Technology Vol 1, Issue 4, Decermber 2014.
  61. S.Balamurugan, S.Charanyaa, "Principles of Social Network Data Security" LAP Verlag, Germany, ISBN: 978-3-659-61207-7, 2014
  62. S.Balamurugan, S.Charanyaa, "Principles of Scheduling in Cloud Computing" Scholars' Press, Germany,, ISBN: 978-3-639-66950-3, 2014
  63. S.Balamurugan, S.Charanyaa, "Principles of Database Security" Scholars' Press, Germany, ISBN: 978-3-639-76030-9, 2014