SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 1
Mi-HealthCare: MULTI-TENANT HEALTH CARE SYSTEM
Muhammad Awis Jamaluddin Johari (awis.johari@mimos.my), Lee Chee Kiam (ck.lee@mimos.my)
, Muhammad Azlan Shahariman Ahmad, (azlan.ahmad@mimos.my), Muhammad Fuad Mustafa
(fuad.mustafa@mimos.my)
Healthcare and Education Solution, Corporate Technology Division, MIMOS Berhad
Abstract
Multi-tenant architecture, commonly referred to as multitenancy, is a software architecture in which
multiple single instances of software run on a single physical server. The server then serves the software
to multiple tenants. These tenants can be within an organization or different businesses. This
architecture is gaining popularity among software development houses due to its capability to save the
cost of deployment and resources. Besides that, this architecture will give better protection to the system
which means less interaction with the outside world and thus the exposure to malicious software is
reduced. Healthcare domain is chosen as the software as services (SaaS) by the authors since this
domain is infrequently used by other software development houses and also the challenging part is to
understand the model of business in healthcare. Thus, the objective of this paper is to present a system
that uses this architecture to make use of the current technology to healthcare system. This system, from
here and onward will be referred to as Mi-HealthCare.
Keywords: Multitenancy, Health Care System, SaaS Application, Cloud Computing.
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 2
Introduction
Software architecture is the most important part during software development process. It serves as a
blueprint for a system. It also provides an abstraction to manage the system complexity and establish a
communication and coordination mechanism among components. The architecture of a system
describes it’s their relationships (structures), major components, and how it’s interacted with each other.
Furthermore, the architecture depends on several contributing factors such as business strategy, quality
attributes, human dynamics, design, and IT environment. For this paper, the authors decide to use multi-
tenant architecture. The business strategy and it’s IT environment will be elaborated on later.
Previously, the authors have produced project (Awis et al., 2019) that have same features as this paper
but using different architecture. From that paper, the authors use hybrid architecture due to the business
strategy, which is depends on stakeholder requirements and IT environment infrastructure defined by
the stakeholders. These include limited access to the internet and outreach visits. This challenged the
authors to come out with new ideas to make the system hybrid. After doing some study on architecture
and the evolution of architecture from the paper (Trilochan & Verma, 2017) they have mentioned that
nowadays evolution is cloud computing technology, becoming an adoptable technology for many of the
organizations with its dynamic scalability and usage of virtualized resources as a service through the
Internet. Before we to go deeper on the multitenant topic, let the authors give a brief on multitenant,
which is one of the options under cloud computing technology. The other subtopic is single tenant.
Figure 1, show the differentiate between single tenant and multitenant.
Single Tenant
Database Server
Customer A Customer B Customer C
Apps Server
Database Server
Multitenant
Customer A Customer B Customer C
Apps Server
Database Server Database Server
Database Server Database Server
Apps Server Apps Server
Figure 1: Single tenant vs Multitenant
Multi-tenancy is a popular option in cloud computing, offering shared tenancy on public cloud services
such as Microsoft Azure, Google Cloud Platform and Amazon Web Services. The advantages of using
multitenant is to align with the project that authors propose which authors listed that the system must
follow the characteristic as below:
1. Lower IT infrastructure
2. Lower costs for computer users
3. Improved performance
4. Increase data safety
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 3
5. Backup and recovery
6. Fewer maintenance issue
7. Instant software updates
8. Improved compatibility between Operating systems
9. Performance and Scalability
Mi-HealthCare is SaaS (software-as-a-service) in cloud computing. SaaS is to use the web to deliver
applications that are managed by a third-party vendor and whose interface is accessed on the clients’
side. Most SaaS applications can be run directly from a web browser without any downloads or
installations required, although some require plugins. With SaaS, it’s easy for enterprises to streamline
their maintenance and support, because everything can be managed by vendors: applications, runtime,
data, middleware, OSes, virtualization, servers, storage and networking. Furthermore, the authors have
made decision to use multitenant option for Mi-HealthCare system because the feature that have been
implemented in this system will be used by all the users afterward will be called as tenants. Below is
the list of the features of this system which consists of:
1. Patient Management
2. Queue Management
3. Users and Role Management.
4. Clinical Documentation
5. Prescription
6. Administration
7. Dashboard
8. Integration with Internet of Thing (IoT) devices
9. Licensing at data centre
Figure 2: Patient Management
Figure 2 shows the screenshot of the system using Chrome web browser. The page is about patient
management, tenant able to knowing details about the patient on this page. Other than that, authors also
implement queue management in this system to enable tenant to call patient as shown in Figure 3 below.
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 4
Figure 3: Queue Management
Figure 4: Clinical Documentation
Multitenancy Database Design
In a multi-tenant environment, multiple different customers will use the same application, on the same
hardware and with the same storage mechanism. However, the database is either logically or physically
isolated on per tenant or group basis. In general, there are 3 levels of separation:
1. A single, shared database schema
- This approach uses a single database to host data for all tenants. Logical separation is
achieved via storing tenant identifier for each data.
2. Single database, multiple schemas
- This approach divides tenants’ data without having to set up multiple databases. The
tenant identifier is the database schema itself. Each tenant is only granted access to its
own schema to achieve isolation and operates differently.
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 5
3. Multiple databases
- A new database is provisioned for each new tenant. With database per tenant approach,
customization for individual tenant is straightforward to be achieved.
In the digital age, more and more personally identifiable information (PII) and personal health
information (PHI) of millions of users are stored outsides of users. A number of regulations and acts
have been introduced. This includes European Union General Data Protection Regulation (GDPR),
United States of America The Health Insurance Portability and Accountability Act (HIPAA) and
Malaysia Personal Data Protection Act (PDPA).
Pseudonymization is a process that allows the user to switch the original data set, for example data
subject’s e-mail or a patient’s National Registration Identity Card (NRIC) Number with an alias or
pseudonym. This pseudonym is often a numeric or alphanumeric identifier, which is usually generated
randomly. Pseudonymization is used in data security to conceal the identity of a person. Sensitive data
can then be stored with the pseudonym and the list of pseudonyms and related personal information is
stored separately. This makes it harder for an attacker to steal the data. Pseudonymization is a reversible
process that de-identifies data but allows the reidentification later on if necessary. This is a well-known
data management technique that is highly recommended by the GDPR as one of the data protection
methods.
On the other hand, anonymization is the irreversible removal of information that could lead to an
individual being identified, either on the basis of the removed information or in combination with other
information. This definition emphasizes that anonymized data must be stripped of any identifiable
information, making it impossible to derive insights on a discreet individual, even by the party that is
responsible for the anonymization. Anonymization is the permanent replacement of sensitive data with
unrelated characters, either using scrambling, generalization or masking techniques. A data once
anonymized, cannot be re-identified.
Pseudonymization makes it easier for data processors to process personal information without the fear
of exposing sensitive data to personnel and employees who should not have access to it. For example,
in Health Information System (HIS) or Clinical Information System (CIS) system, which is considered
as primary database usage, the user of the systems, e.g. health care provider (HCP) like nurse, doctor,
dentist, specialist shall be able to identify the patient to prevent wrong diagnosis which could cause
serious and critical impact to patient. For secondary database usage like data warehouse, statistical or
research purposes, anonymization techniques should be used to protect sensitive PHI and achieve data
privacy.
Virtualization vs Containerization
When using cloud computing, there are two options to improve scalability, reduce overhead costs, and
standardize software deployments across multiple machines and platforms, virtualization and
containerization. The goal of these two options is to host a maximize number of applications per
physical server. Furthermore, satisfying rate of performance, security performance and scalability of
the system need to highlight when using those option. In this section the authors will elaborate more on
which one that will be used for this project and why the authors choose that option for this project.
Virtualization is a technology that can enables a single personal computer (PC), workstation or server
to simultaneously run multiple operating systems or multiple sessions in a single operating system (OS).
In other words, this technology allows multiple OS’s and workloads to run on the same physical
hardware including computer hardware platform, storage device and computer network resources.
There are three type of virtualization which is full virtualization, paravirtualization and hardware
assisted virtualization.
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 6
Full virtualization, one or more OSs and the applications they contain are run on top of virtual hardware.
Each instance of an OS and its applications runs in a separate VM called a guest operating system. The
guest OSs on a host are managed by the hypervisor, which controls the flow of instructions between the
guest OSs and the physical hardware, such as control processor unit (CPU), disk storage, memory, and
network interface cards. The hypervisor can partition the system’s resources and isolate the guest OSs
so that each has access to only its own resources, as well as possible access to shared resources such as
files on the host OS. Also, each guest OS can be completely encapsulated, making it portable. Some
hypervisors run on top of another OS, which is known as the host operating system (Scarfone et al.,
n.d.).
Paravirtualization refers to communication between the guest OS and the hypervisor to improve
performance and efficiency. This involves modifying the OS kernel to replace non-virtualizable
instructions with hypercalls that communicate directly with the virtualization layer hypervisor. The
hypervisor also provides hypercall interfaces for other critical kernel operations such as memory
management, interrupt handling and time keeping. Paravirtualization is different from full
virtualization, where the unmodified OS does not know it is virtualized and sensitive OS calls are
trapped using binary translation. The value proposition of paravirtualization is in lower virtualization
overhead, but the performance advantage of paravirtualization over full virtualization can vary greatly
depending on the workload (VMware, n.d.).
Hardware-assisted virtualization is also called native virtualization, accelerated virtualization, or
hardware VM, depending on the vendor. Hardware-assisted virtualization is a technology of
virtualization approach that enables efficient full virtualization using help from hardware capabilities,
primarily from the host processors. This type can reduce the maintenance overhead of paravirtualization
as it reduces (ideally, eliminates) the changes needed in the guest operating system. It is also
considerably easier to obtain better performance. The disadvantages of this type is requires explicit
support in the host CPU, which is not available on all x86/x86_64 processors. To identify the CPU that
use this technology like Intel Virtualization Technology (VT-x) and AMD-V.
From Docker website, container is a standard unit of software that packages up code and all its
dependencies so the application runs quickly and reliably from one computing environment to another.
Containerization is the process of engineering a software architecture using multiple containers.
Containers are becoming more common because they provide many of the isolation benefits of VMs
without as much overhead. Although containers are typically hosted on some version of Linux, they are
beginning to also be hosted on other OSs such as Windows. Containers are being heavily used in Cloud-
hosted applications. Containers are increasingly being used to support the continuous development and
integration (CD/CI) of containerized microservices.
Above is the elaboration and study on fundamental on virtualization and containerization. After doing
some research and study on both options, the author also found paper (Vestman, n.d.) that do the
comparison between containers and virtual machine. On that paper, he concludes that the virtual
machine is the better choice for application where privacy is a higher priority, due to the complete
isolation and abstraction from the rest of physical location. The authors agreed on that statement but the
authors have some characteristics that make containers more suitable for our solution as listed in Table
1.
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 7
Characteristic Virtualization Containerization
Number of applications per server Lower Higher
Number of copies of single application One Many
Performance (throughput, not response time) Lower Higher
Readily share resources (devices, services) No Yes
Robustness via failover and restart Not supported Supported
Scalability & load balancing (dynamic deployment) Slower and Harder Faster and easier
Table 1: Mi-HealthCare Characteristics
https://www.armor.com/resources/containerization-the-need-to-know/
Figure 3: Virtualization vs Containerization
Container Orchestration
Container orchestration is all about managing the lifecycles of containers, especially in large, dynamic
environments. It also includes simplifies tasks of building, deploying, and maintaining containers across
servers. Below is the list of tasks that mostly software team use for container orchestration:
1. Provisioning and deployment of containers.
2. Redundancy and availability of containers.
3. Scaling up or removing containers to spread application load evenly across host infrastructure.
4. Movement of containers from one host to another if there is a shortage of resources in a host,
or if a host die.
5. Allocation of resources between containers.
6. External exposure of services running in a container with the outside world.
7. Load balancing of service discovery between containers.
8. Health monitoring of containers and hosts.
9. Configuration of an application in relation to the containers running it.
There are a lot of tools for container orchestration like Kubernetes, Docker Swarm, Mesos Marathon
and many more. But need to clearly understanding on the key features that they provide depending upon
the use case, it will be easier to opt for the best one. In our project the authors have decided after doing
some study on paper (Platform9, 2018) to use Docker Swarm as our orchestrator. The reason why we
chose Docker Swarm is due to the fact that we are using Docker as our containerization. To avoid
conflict during integration, we decide to use same vendor for orchestration. Furthermore, the features
that have in Docker Swarm which is the configuration to have multi-container by using YAML files
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 8
only to configure. Then, using these vendors also we can embed health check functionality into their
Docker images using the HEALTHCHECK instruction. Figure 4 is a diagram that show the concept of
container orchestration.
https://devopedia.org/container-orchestration
Figure 4: Concept of Container Orchestration
Conclusion & Future Scope
Mi-HealthCare is a clinical web-based application that use full cloud-based system and use multitenant
architecture to make use of the current technology to healthcare domain. Not limited on that, Mi-
HealthCare has automated deployment and auto-scaling for applications depending on number of users,
number of 3rd
party integration and how much patients visit per day. Mi-HealthCare also has cloud-
based clinic queue management that is able to connect within branches or states using internet. It is fully
developed by open sources, using Java for backend, Angular for frontend and also the PostgreSQL
Server as the database. By using this system, the organization can reduce cost on maintaining hardware
within branches or states. Other than that, the organization can feel more secure that all data that has
been uploaded to cloud, only the authorized person can access and manage it.
This system is currently in development phase using the required features cross the various modules.
For future enhancements which can be carried out include adding dental functionalities to the system,
data exchange between public clinic and private clinic on patient history. Mobile support for patient
related modules will also be an added advantage to support integration with medical devices through
the Internet of Things (IOT)
Pseudonymization and anonymization are two of the pioneering and core techniques to be used on the
forefront of the health data privacy protection. It is relevant and valid for both GDPR and HIPAA.
Although the PDPA states that a data subject has the right to anonymize their personal data, unlike the
GDPR, it does not specifically define anonymized or pseudonymized data. This paper also suggests that
the Malaysian government improves on the coverage of PDPA by introducing pseudonymization and
anonymization.
E-PROCEEDING OF THE 9TH INTERNATIONAL
CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020
(ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 9
References
1. Awis, M., Johari, J., Shahariman, M. A., Izyan, N., Faizulnizam, N., & Kiam, L. C. (2019). HYBRID
DENTAL CHARTING SYSTEM (HyDeCS). E-Proceeding Of The 8th International Conference On
Social Science Research 2019 Conference On Social Science Research 2019, 2019(November), 1–
9.
2. Platform9. (2018). Container Management : Kubernetes vs Docker Swarm , Mesos + Marathon ,
Amazon ECS. https://platform9.com/wp-content/uploads/2018/08/kubernetes-comparison-
ebook.pdf
3. Scarfone, K., Hoffman, P., & Hoffman, P. (n.d.). Guide to Security for Full Virtualization
Technologies Recommendations of the National Institute of Standards and Technology.
4. Trilochan, & Verma, A. (2017). Cloud Computing: Evolution and Challenges. International Journal
of Engineering Science and Computing, 7(4), 10197–10200. http://ijesc.org/
5. Vestman, S. (n.d.). Cloud application platform-Virtualization vs Containerization A comparison
between application containers and virtual machines. http://www.diva-
portal.org/smash/get/diva2:1112069/FULLTEXT01.pdf
6. VMware. (n.d.). Understanding Full Virtualization, Paravirtualization, and Hardware Assist. 1–11.
https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/VMware_
paravirtualization.pdf

Mais conteúdo relacionado

Mais procurados

Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
 
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionImproved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionConference Papers
 
Software testing automation a comparative study on productivity rate of ope...
Software testing automation   a comparative study on productivity rate of ope...Software testing automation   a comparative study on productivity rate of ope...
Software testing automation a comparative study on productivity rate of ope...Conference Papers
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis Conference Papers
 
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...ijaia
 
IRJET - Autonomous Navigation System using Deep Learning
IRJET -  	  Autonomous Navigation System using Deep LearningIRJET -  	  Autonomous Navigation System using Deep Learning
IRJET - Autonomous Navigation System using Deep LearningIRJET Journal
 
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET Journal
 
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...IRJET Journal
 
Autonomous vehicles: A study of implementation and security
Autonomous vehicles: A study of implementation and security Autonomous vehicles: A study of implementation and security
Autonomous vehicles: A study of implementation and security IJECEIAES
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
The Study of Smart Grid Knowledge Visualization Key Technologies
The Study of Smart Grid Knowledge Visualization Key TechnologiesThe Study of Smart Grid Knowledge Visualization Key Technologies
The Study of Smart Grid Knowledge Visualization Key TechnologiesNooria Sukmaningtyas
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESijcsit
 
IRJET- IoT based Vehicle Tracking using GPS
IRJET-  	  IoT based Vehicle Tracking using GPSIRJET-  	  IoT based Vehicle Tracking using GPS
IRJET- IoT based Vehicle Tracking using GPSIRJET Journal
 
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...IRJET Journal
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...IJCNCJournal
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...redpel dot com
 
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesExamining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesAIRCC Publishing Corporation
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...IJECEIAES
 

Mais procurados (20)

Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...Cooperative hierarchical based edge-computing approach for resources allocati...
Cooperative hierarchical based edge-computing approach for resources allocati...
 
Improved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryptionImproved indistinguishability for searchable symmetric encryption
Improved indistinguishability for searchable symmetric encryption
 
Software testing automation a comparative study on productivity rate of ope...
Software testing automation   a comparative study on productivity rate of ope...Software testing automation   a comparative study on productivity rate of ope...
Software testing automation a comparative study on productivity rate of ope...
 
Review of big data analytics (bda) architecture trends and analysis
Review of big data analytics (bda) architecture   trends and analysis Review of big data analytics (bda) architecture   trends and analysis
Review of big data analytics (bda) architecture trends and analysis
 
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...
PREDICTIVE MAINTENANCE AND ENGINEERED PROCESSES IN MECHATRONIC INDUSTRY: AN I...
 
IRJET - Autonomous Navigation System using Deep Learning
IRJET -  	  Autonomous Navigation System using Deep LearningIRJET -  	  Autonomous Navigation System using Deep Learning
IRJET - Autonomous Navigation System using Deep Learning
 
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water ConservationIRJET - Automated Water Meter: Prediction of Bill for Water Conservation
IRJET - Automated Water Meter: Prediction of Bill for Water Conservation
 
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...IRJET -  	  Review on IoV (Internet of Vehicles): Threats, Applications and R...
IRJET - Review on IoV (Internet of Vehicles): Threats, Applications and R...
 
Sustainability 07-02028
Sustainability 07-02028Sustainability 07-02028
Sustainability 07-02028
 
Autonomous vehicles: A study of implementation and security
Autonomous vehicles: A study of implementation and security Autonomous vehicles: A study of implementation and security
Autonomous vehicles: A study of implementation and security
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
The Study of Smart Grid Knowledge Visualization Key Technologies
The Study of Smart Grid Knowledge Visualization Key TechnologiesThe Study of Smart Grid Knowledge Visualization Key Technologies
The Study of Smart Grid Knowledge Visualization Key Technologies
 
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIESA WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
A WIRELESS NETWORK INFRASTRUCTURE ARCHITECTURE FOR RURAL COMMUNITIES
 
IRJET- IoT based Vehicle Tracking using GPS
IRJET-  	  IoT based Vehicle Tracking using GPSIRJET-  	  IoT based Vehicle Tracking using GPS
IRJET- IoT based Vehicle Tracking using GPS
 
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...
 
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
 
A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...A novel real time video and data capture of vehicular accident in intelligent...
A novel real time video and data capture of vehicular accident in intelligent...
 
Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...Multiagent multiobjective interaction game system for service provisoning veh...
Multiagent multiobjective interaction game system for service provisoning veh...
 
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous VehiclesExamining Modern Data Security and Privacy Protocols in Autonomous Vehicles
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles
 
Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...Internet of things-based photovoltaics parameter monitoring system using Node...
Internet of things-based photovoltaics parameter monitoring system using Node...
 

Semelhante a Mi health care - multi-tenant health care system

Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesIJCSIS Research Publications
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...IJAAS Team
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...Amber Wheeler
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...ijtsrd
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESijcsit
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesAIRCC Publishing Corporation
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingEditor IJMTER
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Editor IJMTER
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oPradeep Muralidhar
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...IOSR Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudIJERA Editor
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingIOSR Journals
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET Journal
 
A Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud SecurityA Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud Securityijsrd.com
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...IJECEIAES
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 

Semelhante a Mi health care - multi-tenant health care system (20)

Literature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and TechniquesLiterature Review: Cloud Computing Security Issues and Techniques
Literature Review: Cloud Computing Security Issues and Techniques
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...A New And Efficient Hybrid Technique For The Automatic...
A New And Efficient Hybrid Technique For The Automatic...
 
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
Secure One Time Password OTP Generation for user Authentication in Cloud Envi...
 
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIESBIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES
 
Big Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and OpportunitiesBig Data in Cloud Computing Review and Opportunities
Big Data in Cloud Computing Review and Opportunities
 
Excellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computingExcellent Manner of Using Secure way of data storage in cloud computing
Excellent Manner of Using Secure way of data storage in cloud computing
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
A study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_oA study on_security_and_privacy_issues_o
A study on_security_and_privacy_issues_o
 
E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...E-Healthcare Billing and Record Management Information System using Android w...
E-Healthcare Billing and Record Management Information System using Android w...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
An Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud ComputingAn Overview on Security Issues in Cloud Computing
An Overview on Security Issues in Cloud Computing
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
A Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud SecurityA Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud Security
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...An efficient and secure data storage in cloud computing using modified RSA pu...
An efficient and secure data storage in cloud computing using modified RSA pu...
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 

Mais de Conference Papers

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generatorConference Papers
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Conference Papers
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Conference Papers
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Conference Papers
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Conference Papers
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Conference Papers
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution Conference Papers
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentConference Papers
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...Conference Papers
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...Conference Papers
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Conference Papers
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaConference Papers
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...Conference Papers
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorConference Papers
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designConference Papers
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edgeConference Papers
 
Rapid reduction of ultrathin films of graphene oxide on large area silicon su...
Rapid reduction of ultrathin films of graphene oxide on large area silicon su...Rapid reduction of ultrathin films of graphene oxide on large area silicon su...
Rapid reduction of ultrathin films of graphene oxide on large area silicon su...Conference Papers
 

Mais de Conference Papers (20)

Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generator
 
Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...Advanced resource allocation and service level monitoring for container orche...
Advanced resource allocation and service level monitoring for container orche...
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
Absorption spectrum analysis of dentine sialophosphoprotein (dspp) in orthodo...
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...Automated snomed ct mapping of clinical discharge summary data for cardiology...
Automated snomed ct mapping of clinical discharge summary data for cardiology...
 
Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...Automated login method selection in a multi modal authentication - login meth...
Automated login method selection in a multi modal authentication - login meth...
 
Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...Atomization of reduced graphene oxide ultra thin film for transparent electro...
Atomization of reduced graphene oxide ultra thin film for transparent electro...
 
An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution An enhanced wireless presentation system for large scale content distribution
An enhanced wireless presentation system for large scale content distribution
 
An analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deploymentAn analysis of a large scale wireless image distribution system deployment
An analysis of a large scale wireless image distribution system deployment
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...Unified theory of acceptance and use of technology of e government services i...
Unified theory of acceptance and use of technology of e government services i...
 
Towards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysiaTowards predictive maintenance for marine sector in malaysia
Towards predictive maintenance for marine sector in malaysia
 
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
The new leaed (ii) ion selective electrode on free plasticizer film of pthfa ...
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
Study on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistorStudy on performance of capacitor less ldo with different types of resistor
Study on performance of capacitor less ldo with different types of resistor
 
Stil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal designStil test pattern generation enhancement in mixed signal design
Stil test pattern generation enhancement in mixed signal design
 
On premise ai platform - from dc to edge
On premise ai platform - from dc to edgeOn premise ai platform - from dc to edge
On premise ai platform - from dc to edge
 
Rapid reduction of ultrathin films of graphene oxide on large area silicon su...
Rapid reduction of ultrathin films of graphene oxide on large area silicon su...Rapid reduction of ultrathin films of graphene oxide on large area silicon su...
Rapid reduction of ultrathin films of graphene oxide on large area silicon su...
 

Último

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Último (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Mi health care - multi-tenant health care system

  • 1. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 1 Mi-HealthCare: MULTI-TENANT HEALTH CARE SYSTEM Muhammad Awis Jamaluddin Johari (awis.johari@mimos.my), Lee Chee Kiam (ck.lee@mimos.my) , Muhammad Azlan Shahariman Ahmad, (azlan.ahmad@mimos.my), Muhammad Fuad Mustafa (fuad.mustafa@mimos.my) Healthcare and Education Solution, Corporate Technology Division, MIMOS Berhad Abstract Multi-tenant architecture, commonly referred to as multitenancy, is a software architecture in which multiple single instances of software run on a single physical server. The server then serves the software to multiple tenants. These tenants can be within an organization or different businesses. This architecture is gaining popularity among software development houses due to its capability to save the cost of deployment and resources. Besides that, this architecture will give better protection to the system which means less interaction with the outside world and thus the exposure to malicious software is reduced. Healthcare domain is chosen as the software as services (SaaS) by the authors since this domain is infrequently used by other software development houses and also the challenging part is to understand the model of business in healthcare. Thus, the objective of this paper is to present a system that uses this architecture to make use of the current technology to healthcare system. This system, from here and onward will be referred to as Mi-HealthCare. Keywords: Multitenancy, Health Care System, SaaS Application, Cloud Computing.
  • 2. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 2 Introduction Software architecture is the most important part during software development process. It serves as a blueprint for a system. It also provides an abstraction to manage the system complexity and establish a communication and coordination mechanism among components. The architecture of a system describes it’s their relationships (structures), major components, and how it’s interacted with each other. Furthermore, the architecture depends on several contributing factors such as business strategy, quality attributes, human dynamics, design, and IT environment. For this paper, the authors decide to use multi- tenant architecture. The business strategy and it’s IT environment will be elaborated on later. Previously, the authors have produced project (Awis et al., 2019) that have same features as this paper but using different architecture. From that paper, the authors use hybrid architecture due to the business strategy, which is depends on stakeholder requirements and IT environment infrastructure defined by the stakeholders. These include limited access to the internet and outreach visits. This challenged the authors to come out with new ideas to make the system hybrid. After doing some study on architecture and the evolution of architecture from the paper (Trilochan & Verma, 2017) they have mentioned that nowadays evolution is cloud computing technology, becoming an adoptable technology for many of the organizations with its dynamic scalability and usage of virtualized resources as a service through the Internet. Before we to go deeper on the multitenant topic, let the authors give a brief on multitenant, which is one of the options under cloud computing technology. The other subtopic is single tenant. Figure 1, show the differentiate between single tenant and multitenant. Single Tenant Database Server Customer A Customer B Customer C Apps Server Database Server Multitenant Customer A Customer B Customer C Apps Server Database Server Database Server Database Server Database Server Apps Server Apps Server Figure 1: Single tenant vs Multitenant Multi-tenancy is a popular option in cloud computing, offering shared tenancy on public cloud services such as Microsoft Azure, Google Cloud Platform and Amazon Web Services. The advantages of using multitenant is to align with the project that authors propose which authors listed that the system must follow the characteristic as below: 1. Lower IT infrastructure 2. Lower costs for computer users 3. Improved performance 4. Increase data safety
  • 3. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 3 5. Backup and recovery 6. Fewer maintenance issue 7. Instant software updates 8. Improved compatibility between Operating systems 9. Performance and Scalability Mi-HealthCare is SaaS (software-as-a-service) in cloud computing. SaaS is to use the web to deliver applications that are managed by a third-party vendor and whose interface is accessed on the clients’ side. Most SaaS applications can be run directly from a web browser without any downloads or installations required, although some require plugins. With SaaS, it’s easy for enterprises to streamline their maintenance and support, because everything can be managed by vendors: applications, runtime, data, middleware, OSes, virtualization, servers, storage and networking. Furthermore, the authors have made decision to use multitenant option for Mi-HealthCare system because the feature that have been implemented in this system will be used by all the users afterward will be called as tenants. Below is the list of the features of this system which consists of: 1. Patient Management 2. Queue Management 3. Users and Role Management. 4. Clinical Documentation 5. Prescription 6. Administration 7. Dashboard 8. Integration with Internet of Thing (IoT) devices 9. Licensing at data centre Figure 2: Patient Management Figure 2 shows the screenshot of the system using Chrome web browser. The page is about patient management, tenant able to knowing details about the patient on this page. Other than that, authors also implement queue management in this system to enable tenant to call patient as shown in Figure 3 below.
  • 4. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 4 Figure 3: Queue Management Figure 4: Clinical Documentation Multitenancy Database Design In a multi-tenant environment, multiple different customers will use the same application, on the same hardware and with the same storage mechanism. However, the database is either logically or physically isolated on per tenant or group basis. In general, there are 3 levels of separation: 1. A single, shared database schema - This approach uses a single database to host data for all tenants. Logical separation is achieved via storing tenant identifier for each data. 2. Single database, multiple schemas - This approach divides tenants’ data without having to set up multiple databases. The tenant identifier is the database schema itself. Each tenant is only granted access to its own schema to achieve isolation and operates differently.
  • 5. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 5 3. Multiple databases - A new database is provisioned for each new tenant. With database per tenant approach, customization for individual tenant is straightforward to be achieved. In the digital age, more and more personally identifiable information (PII) and personal health information (PHI) of millions of users are stored outsides of users. A number of regulations and acts have been introduced. This includes European Union General Data Protection Regulation (GDPR), United States of America The Health Insurance Portability and Accountability Act (HIPAA) and Malaysia Personal Data Protection Act (PDPA). Pseudonymization is a process that allows the user to switch the original data set, for example data subject’s e-mail or a patient’s National Registration Identity Card (NRIC) Number with an alias or pseudonym. This pseudonym is often a numeric or alphanumeric identifier, which is usually generated randomly. Pseudonymization is used in data security to conceal the identity of a person. Sensitive data can then be stored with the pseudonym and the list of pseudonyms and related personal information is stored separately. This makes it harder for an attacker to steal the data. Pseudonymization is a reversible process that de-identifies data but allows the reidentification later on if necessary. This is a well-known data management technique that is highly recommended by the GDPR as one of the data protection methods. On the other hand, anonymization is the irreversible removal of information that could lead to an individual being identified, either on the basis of the removed information or in combination with other information. This definition emphasizes that anonymized data must be stripped of any identifiable information, making it impossible to derive insights on a discreet individual, even by the party that is responsible for the anonymization. Anonymization is the permanent replacement of sensitive data with unrelated characters, either using scrambling, generalization or masking techniques. A data once anonymized, cannot be re-identified. Pseudonymization makes it easier for data processors to process personal information without the fear of exposing sensitive data to personnel and employees who should not have access to it. For example, in Health Information System (HIS) or Clinical Information System (CIS) system, which is considered as primary database usage, the user of the systems, e.g. health care provider (HCP) like nurse, doctor, dentist, specialist shall be able to identify the patient to prevent wrong diagnosis which could cause serious and critical impact to patient. For secondary database usage like data warehouse, statistical or research purposes, anonymization techniques should be used to protect sensitive PHI and achieve data privacy. Virtualization vs Containerization When using cloud computing, there are two options to improve scalability, reduce overhead costs, and standardize software deployments across multiple machines and platforms, virtualization and containerization. The goal of these two options is to host a maximize number of applications per physical server. Furthermore, satisfying rate of performance, security performance and scalability of the system need to highlight when using those option. In this section the authors will elaborate more on which one that will be used for this project and why the authors choose that option for this project. Virtualization is a technology that can enables a single personal computer (PC), workstation or server to simultaneously run multiple operating systems or multiple sessions in a single operating system (OS). In other words, this technology allows multiple OS’s and workloads to run on the same physical hardware including computer hardware platform, storage device and computer network resources. There are three type of virtualization which is full virtualization, paravirtualization and hardware assisted virtualization.
  • 6. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 6 Full virtualization, one or more OSs and the applications they contain are run on top of virtual hardware. Each instance of an OS and its applications runs in a separate VM called a guest operating system. The guest OSs on a host are managed by the hypervisor, which controls the flow of instructions between the guest OSs and the physical hardware, such as control processor unit (CPU), disk storage, memory, and network interface cards. The hypervisor can partition the system’s resources and isolate the guest OSs so that each has access to only its own resources, as well as possible access to shared resources such as files on the host OS. Also, each guest OS can be completely encapsulated, making it portable. Some hypervisors run on top of another OS, which is known as the host operating system (Scarfone et al., n.d.). Paravirtualization refers to communication between the guest OS and the hypervisor to improve performance and efficiency. This involves modifying the OS kernel to replace non-virtualizable instructions with hypercalls that communicate directly with the virtualization layer hypervisor. The hypervisor also provides hypercall interfaces for other critical kernel operations such as memory management, interrupt handling and time keeping. Paravirtualization is different from full virtualization, where the unmodified OS does not know it is virtualized and sensitive OS calls are trapped using binary translation. The value proposition of paravirtualization is in lower virtualization overhead, but the performance advantage of paravirtualization over full virtualization can vary greatly depending on the workload (VMware, n.d.). Hardware-assisted virtualization is also called native virtualization, accelerated virtualization, or hardware VM, depending on the vendor. Hardware-assisted virtualization is a technology of virtualization approach that enables efficient full virtualization using help from hardware capabilities, primarily from the host processors. This type can reduce the maintenance overhead of paravirtualization as it reduces (ideally, eliminates) the changes needed in the guest operating system. It is also considerably easier to obtain better performance. The disadvantages of this type is requires explicit support in the host CPU, which is not available on all x86/x86_64 processors. To identify the CPU that use this technology like Intel Virtualization Technology (VT-x) and AMD-V. From Docker website, container is a standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another. Containerization is the process of engineering a software architecture using multiple containers. Containers are becoming more common because they provide many of the isolation benefits of VMs without as much overhead. Although containers are typically hosted on some version of Linux, they are beginning to also be hosted on other OSs such as Windows. Containers are being heavily used in Cloud- hosted applications. Containers are increasingly being used to support the continuous development and integration (CD/CI) of containerized microservices. Above is the elaboration and study on fundamental on virtualization and containerization. After doing some research and study on both options, the author also found paper (Vestman, n.d.) that do the comparison between containers and virtual machine. On that paper, he concludes that the virtual machine is the better choice for application where privacy is a higher priority, due to the complete isolation and abstraction from the rest of physical location. The authors agreed on that statement but the authors have some characteristics that make containers more suitable for our solution as listed in Table 1.
  • 7. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 7 Characteristic Virtualization Containerization Number of applications per server Lower Higher Number of copies of single application One Many Performance (throughput, not response time) Lower Higher Readily share resources (devices, services) No Yes Robustness via failover and restart Not supported Supported Scalability & load balancing (dynamic deployment) Slower and Harder Faster and easier Table 1: Mi-HealthCare Characteristics https://www.armor.com/resources/containerization-the-need-to-know/ Figure 3: Virtualization vs Containerization Container Orchestration Container orchestration is all about managing the lifecycles of containers, especially in large, dynamic environments. It also includes simplifies tasks of building, deploying, and maintaining containers across servers. Below is the list of tasks that mostly software team use for container orchestration: 1. Provisioning and deployment of containers. 2. Redundancy and availability of containers. 3. Scaling up or removing containers to spread application load evenly across host infrastructure. 4. Movement of containers from one host to another if there is a shortage of resources in a host, or if a host die. 5. Allocation of resources between containers. 6. External exposure of services running in a container with the outside world. 7. Load balancing of service discovery between containers. 8. Health monitoring of containers and hosts. 9. Configuration of an application in relation to the containers running it. There are a lot of tools for container orchestration like Kubernetes, Docker Swarm, Mesos Marathon and many more. But need to clearly understanding on the key features that they provide depending upon the use case, it will be easier to opt for the best one. In our project the authors have decided after doing some study on paper (Platform9, 2018) to use Docker Swarm as our orchestrator. The reason why we chose Docker Swarm is due to the fact that we are using Docker as our containerization. To avoid conflict during integration, we decide to use same vendor for orchestration. Furthermore, the features that have in Docker Swarm which is the configuration to have multi-container by using YAML files
  • 8. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 8 only to configure. Then, using these vendors also we can embed health check functionality into their Docker images using the HEALTHCHECK instruction. Figure 4 is a diagram that show the concept of container orchestration. https://devopedia.org/container-orchestration Figure 4: Concept of Container Orchestration Conclusion & Future Scope Mi-HealthCare is a clinical web-based application that use full cloud-based system and use multitenant architecture to make use of the current technology to healthcare domain. Not limited on that, Mi- HealthCare has automated deployment and auto-scaling for applications depending on number of users, number of 3rd party integration and how much patients visit per day. Mi-HealthCare also has cloud- based clinic queue management that is able to connect within branches or states using internet. It is fully developed by open sources, using Java for backend, Angular for frontend and also the PostgreSQL Server as the database. By using this system, the organization can reduce cost on maintaining hardware within branches or states. Other than that, the organization can feel more secure that all data that has been uploaded to cloud, only the authorized person can access and manage it. This system is currently in development phase using the required features cross the various modules. For future enhancements which can be carried out include adding dental functionalities to the system, data exchange between public clinic and private clinic on patient history. Mobile support for patient related modules will also be an added advantage to support integration with medical devices through the Internet of Things (IOT) Pseudonymization and anonymization are two of the pioneering and core techniques to be used on the forefront of the health data privacy protection. It is relevant and valid for both GDPR and HIPAA. Although the PDPA states that a data subject has the right to anonymize their personal data, unlike the GDPR, it does not specifically define anonymized or pseudonymized data. This paper also suggests that the Malaysian government improves on the coverage of PDPA by introducing pseudonymization and anonymization.
  • 9. E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 E-PROCEEDING OF THE 9TH INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE RESEARCH 2020 (ICSSR 2020). (e-ISBN 978-967-xxxxx-x-x). Malaysia. Organized by https://worldconferences.net Page 9 References 1. Awis, M., Johari, J., Shahariman, M. A., Izyan, N., Faizulnizam, N., & Kiam, L. C. (2019). HYBRID DENTAL CHARTING SYSTEM (HyDeCS). E-Proceeding Of The 8th International Conference On Social Science Research 2019 Conference On Social Science Research 2019, 2019(November), 1– 9. 2. Platform9. (2018). Container Management : Kubernetes vs Docker Swarm , Mesos + Marathon , Amazon ECS. https://platform9.com/wp-content/uploads/2018/08/kubernetes-comparison- ebook.pdf 3. Scarfone, K., Hoffman, P., & Hoffman, P. (n.d.). Guide to Security for Full Virtualization Technologies Recommendations of the National Institute of Standards and Technology. 4. Trilochan, & Verma, A. (2017). Cloud Computing: Evolution and Challenges. International Journal of Engineering Science and Computing, 7(4), 10197–10200. http://ijesc.org/ 5. Vestman, S. (n.d.). Cloud application platform-Virtualization vs Containerization A comparison between application containers and virtual machines. http://www.diva- portal.org/smash/get/diva2:1112069/FULLTEXT01.pdf 6. VMware. (n.d.). Understanding Full Virtualization, Paravirtualization, and Hardware Assist. 1–11. https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/techpaper/VMware_ paravirtualization.pdf