Cloud Computing Based PHR Architecture Using Multi Layers Model


There are important requirements for the adoption of innovative practices in the medical area. In this context, Personal Health Records have been proposed and some services have already been launched. However so far, there have been only a few studies in regards to applying Cloud architecture for PHR, despite the occurrence of a large volume of data. In particular, the existing studies tend to remain at applying them partly, instead of a full adoption based on the architectural characteristics of the service models. In this paper, we clarify the result of the general architecture design by applying the Cloud components for supporting healthcare record areas and highlight the required conditions to realize it. Through the proposed considerations the requirement for the new techniques of query processing has been identified as one of the critical factors, that are combined with several items such as managing semantic interoperability, managing service level agreement and secret sharing, Accordingly, we propose the primary work for building the standardized, detailed and more sophisticated architecture.

Share and Cite:

S. Kikuchi, S. Sachdeva and S. Bhalla, "Cloud Computing Based PHR Architecture Using Multi Layers Model," Journal of Software Engineering and Applications, Vol. 5 No. 11A, 2012, pp. 903-911. doi: 10.4236/jsea.2012.531105.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] C. Ogbuji, K. Gomadam and C. Petrie, “Web Technology and Architecture for Personal Health Records,” IEEE Internet Computing, Vol. 15, No. 4, 2011, pp. 10-13. doi:10.1109/MIC.2011.99
[2] Google, “About Google Health.”
[3] Microsoft Health Vault.
[4] P. C. Tang, J. S. Ash, D. W. Bates, J. M. Overhage and D. Z. Sands, “Personal Health Records: Definitions, Benefits, and Strategies for Overcoming Barriers to Adoption,” Journal of the American Medical Informatics Association, Vol. 13 No. 2, 2006, pp. 121-126. doi:10.1197/jamia.M2025
[5] H. Lohr, A. R. Sadeghi and M. Winandy, “Securing the e-Health Cloud,” Proceedings of the 1st ACM International Health Informatics Symposium IHI'10, Arlington, 11-12 November, 2010, pp. 220-229. doi:10.1145/1882992.1883024
[6] F. Daniel, F. Casati, P. Silveira, M. Verga and M. Nalin, “Beyond Health Tracking: A Personal Health and Lifestyle Platform,” IEEE Internet Computing, Vol. 15, No. 4, 2011, pp. 14-22. doi:10.1109/MIC.2011.53
[7] L. M. Vaquero, L. Rodero-Merino, J. Caceres and M. Lindner, “A Break in the Clouds: Towards a Cloud Definition,” Newsletter, ACM SIGCOMM Computer Communication Review Archive, Vol. 39, No. 1, 2009, pp. 50-55. doi:10.1145/1496091.1496100
[8] R. Brinkman, B. Schoenmakers, J. Doumen and W. Jonker, “Experiments with Queries over Encrypted Data Using Secret Sharing,” Proceedings of 2nd VLDB Workshop on Secure Data Management (SDM'05), Trondheim, 2-3 September 2005, pp. 33-46. doi:10.1007/11552338_3
[9] D. Daglish and N. Archer, “Electronic Personal Health Record Systems: A Brief Review of Privacy, Security, and Architectural Issues,” 2009 IEEE Proceedings of 2009 World Congress on Privacy, Security, Trust and the Management of e-Business, Saint John, 25-27 August 2009, pp. 110-120. doi:10.1109/CONGRESS.2009.14
[10] J. Lahteenmaki, J. Leppanen and H. Kaijanranta, “Interoperability of Personal Health Records,” Proceedings of Engineering in Medicine and Biology Society, Annual International Conference of the IEEE, Minneapolis, 3-6 September 2009, pp. 1726-1729. doi:10.1109/IEMBS.2009.5333559
[11] R. Fox, J. Cooley and M. Hauswirth, “Creating a Virtual Personal Health Record Using Mashups,” IEEE Internet Computing, Vol. 15, No. 4, 2011, pp. 23-30. doi:10.1109/MIC.2011.52
[12] N. Botts, B. Thoms, A. Noamani and T. A. Horan, “Cloud Computing Architectures for the Underserved: Public Health Cyberinfrastructures through a Network of Health ATMs,” IEEE Proceedings of 43rd Hawaii International Conference on System Sciences, Honolulu, 5-8 January 2010, pp. 1-10. doi:10.1109/HICSS.2010.107
[13] Microsoft Health Vault, “Welcome, Google Health Users.”
[14] N. Lewis, “Google Health Dies, but PHR Market Still Growing,” Information Week, 2011.
[15] MicroSoft, “Connected Health Framework Architecture and Design Blueprint,” 2009.
[16] openEHR, 2007.
[17] Japan Association for Medical Informatics, “Health Informatics: Health Information Systems,” Shinohara Shuppan Shinsha, 2009. (In Japanese)
[18] OASIS Open and BT, “Case Study: UK National Health Service NPfIT Uses ebXML Messaging,” 2004.
[19] Minister of Economy, Trade and Industry of Japan, “Summary report on PHR in Japan (in Japanese)”, 2008.
[20] D. Krechel and M. Hartbauer, “The LENUS Master Patient Index: Combining Hospital Content Management with a Healthcare Service Bus,” Proceedings of 21st IEEE International Symposium on Computer-Based Medical Systems. CBMS '08, Jyvaskyla, 17-19 June 2008, pp. 170-172. doi:10.1109/CBMS.2008.107
[21] T. D. Wang, K. Wongsuphasawat and C. Plaisant, “Visual Information Seeking in Multiple Electronic Health Records: Design Recommendations and a Process Model,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 46-55. doi:10.1145/1882992.1883001
[22] L. Martino and S. Ahuja, “Privacy Policies of Personal Health Records: An Evaluation of Their Effectiveness in Protecting Patient Information,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 191-200. doi:10.1145/1882992.1883020
[23] Z. R. Li, E. C. Chang, K. H. Huang and F. Lai, “A Secure Electronic Medical Record Sharing Mechanism in the Cloud Computing Platform,” Proceedings of 2011 IEEE 15th International Symposium on Consumer Electronics (ISCE), Singapore, 14-17 June 2011, pp. 98-103. doi:10.1109/ISCE.2011.5973792
[24] R. Harpaz, K. Haerian, H. S. Chase and C. Friedman, “Mining Electronic Health Records for Adverse Drug Effects Using Regression Based Methods,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 100-107. doi:10.1145/1882992.1883008
[25] G. Luo, C. Tang and S. B. Thomas, “Intelligent Personal Health Record: Experience and Open Issues,” Proceedings of the 1st ACM International Health Informatics Symposium IHI '10, Arlington, 11-12 November 2010, pp. 326-335. doi:10.1145/1882992.1883039
[26] C. Ma, H. Frankel and T. Beale, “openEHR, Archetype Query Language Description,” 2009.
[27] J. A. Maldonado, D. Moner, D. Tomás, C. Angulo, M. Robles and J. T. Fernández, “Framework for Clinical Data Standardization Based on Archetypes,” Studies in Health Technology and Informatics, Vol. 129, 2007, pp. 454-458.
[28] C. Rinner, T. Wrba and G. Duftschmid, “Publishing Relational Medical Data as prEN 13606 Archetype Compliant EHR Extracts Using XML Technologies,” 2007.
[29] D. Moner, J. A. Maldonado, D. Bosca, J. T. Fernandez, C. Angulo, P. Crespo, P. J. Vivancos and M. Robles, “Archetype-Based Semantic Integration and Standardization of Clinical Data,” Proceedings of the 28th IEEE EMBS Annual International Conference, New York, 30 August -3 September 2006.
[30] W. Rishel, “The Cloud Based Personal Health Record,” Industry Research ID No. G00158181, Gartner, 13 June 2008, pp. 1-9.
[31] W. S. Li, J. Yan, Y. Yan and J. Zhang, “Xbase: Cloud-Enabled Information Appliance for Healthcare,” Proceedings of the 13th International Conference on Extending Database Technology (EDBT '10), Lausanne, 22-26 March 2010, pp. 675-680. doi:10.1145/1739041.1739125
[32] Dossia Indivo, “INDIVOTM: The Personally Controlled Health Record,”
[33] US Department of Health & Human Services, “Understanding Health Information Privacy.”
[34] D. Agrawal, A. El Abbadi and S. Wang, “Secure Data Management in the Cloud,” Proceedings of 7th International Workshop on Databases in Networked Information Systems (DNIS 2011), Aizu-Wakamatsu, 12-14 December 2011, pp. 1-15. doi:10.1007/978-3-642-25731-5_1
[35] J. Biskup and P. A. Bonatti, “Controlled Query Evaluation for Known Policies by Combining Lying and Refusal,” Annals of Mathematics and Artificial Intelligence, Vol. 40, No. 1-2, 2004, pp. 37-62. doi:10.1023/A:1026106029043

Copyright © 2022 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.