⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



Data Encryption and Access Control in Cloud-Based Healthcare Systems


Authors : Rushil Patel; Vidhi Sutaria

Volume/Issue : Volume 11 - 2026, Issue 3 - March


Google Scholar : https://tinyurl.com/47pde36r

Scribd : https://tinyurl.com/5xuphnxu

DOI : https://doi.org/10.38124/ijisrt/26mar2029

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The growth of cloud computing has emerged as a critical enabling technology for today's healthcare systems, providing on-demand access to large amounts of medical data, including electronic health records (EHRs), diagnostic images, and clinical documentation. However, the benefits of cloud-based medical information will be contradicted by challenges with securing and maintaining the privacy of electronic medical records. The medical data hosted in cloud computing environments (such as hospitals) is at risk of being stored and opened inappropriately or accessed inappropriately. This research focused on the current practices used to secure sensitive data, including access control and virus protection. A number of different encryption mechanisms are available to ensure that sensitive medical records remain confidential at the time of storage and/or in transit. A number of different access control models are available to provide structured methods to manage user access, user authentication, etc. The proposed research presents a new layered security model integrating encryption with role-based authorization and identity authentication. A functioning example of this research demonstrates how authentication, authorization, and activity logging can be leveraged to prevent unauthorized access to healthcare records. The results of the study show that the use of encryption technologies with a structured access policy for accessing sensitive healthcare records will greatly improve the security and access to sensitive medical information for authorized medical personnel utilizing cloud-based healthcare systems.

Keywords : Cloud Computing, Healthcare Data Security, Data Encryption, Access Control Models, Role-Based Access Control, Identity and Access Management, Cloud Security Framework.

References :

  1. S. Dorairaj and P. Ramasamy, “Privacy-preserving healthcare data storage in cloud computing environments,” IEEE International Conference on Cloud Computing, 2020.
  2. P. Khatiwada, H. Bhusal, A. Chatterjee, and M. W. Gerdess, “A proposed access control-based privacy preservation model to share healthcare data in cloud,” arXiv, 2020.
  3. D. Singh and P. Kaur, “Secure data sharing in healthcare cloud using hybrid encryption techniques,” International Journal of Computer Applications, 2021.
  4. V. Sharma and R. Gupta, “A secure framework for privacy preservation in cloud-based healthcare systems,” Journal of Information Security and Applications, 2021.
  5. M. Mehrtak et al., “Security challenges and solutions in healthcare cloud computing environments,” Journal of Medical Internet Research, 2021.
  6. M. Penelova, “Access control models and their applications in information systems,” Cybernetics and Information Technologies, 2021.
  7. Z. Man, J. Li, X. Di, R. Zhang, X. Li, and X. Sun, “Research on cloud data encryption algorithm based on neural networks,” Information Sciences, 2022.
  8. S. Nanda and R. Mishra, “Secure cloud data sharing using attribute-based access control,” Future Generation Computer Systems, 2022.
  9. J. Alonso et al., “Understanding the challenges and architectural models of multi-cloud applications,” Journal of Cloud Computing, 2023.
  10. D. Shivaramakrishna and M. Nagaratna, “A hybrid cryptographic framework for secure cloud storage using AES-OTP and RSA,” Alexandria Engineering Journal, 2023.
  11. H. Huang, “Research on the application of data encryption technology in computer network communication security,” Applied Science and Innovative Research, 2024.
  12. V. Rivaldi, N. H. Johari, R. Setiawan, and R. Y. Rumagit, “Comparative simulation of homomorphic encryption techniques in edge-cloud computing,” Procedia Computer Science, 2024.
  13. A. Sapkal, L. Heisnam, and S. Kusi, “Evolution of cloud computing technologies and adoption trends,” IRJET, 2024.
  14. G. Kapil, N. Kumar, and A. Mourya, “Attribute-based encryption models for healthcare big data protection,” IEEE Access, 2024.
  15. R. Basani and P. Ganesan, “Secure healthcare data processing using AES encryption and cloud segregation,” International Journal of Engineering and Management, 2024.
  16. A. Zhao, “Application of data encryption technology in cloud computing environments,” International Conference on Computing and Data Science Proceedings, 2025.
  17. P. Jain, “Identity and access management in the cloud,” International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2025.
  18. A. K. Akuthota, “Role-based access control in modern cloud security governance,” International Journal of Scientific Research in Computer Science and Engineering, 2025.
  19. P. Selvi et al., “Hybrid ECC-AES encryption framework for secure healthcare cloud applications,” Scientific Reports, 2025.
  20. G. Kapil, N. Kumar, A. Mourya, and V. Kumar, “Securing big healthcare data using attribute-based encryption in cloud environments,” The Journal of Supercomputing, 2025.
  21. S. Kumar et al., “Efficient access request management for healthcare data in cloud computing systems,” Expert Systems with Applications, 2025.
  22. R. Ojino, “Secure healthcare data management using zero trust architecture in cloud storage,” International Journal of Advanced Research in Computer Science, 2025.
  23. D. Rose, “Attribute dependent multi-factor authentication for secure cloud data access,” Australian Computer Journal, 2025.
  24. U. R. Saxena, “Reinforced reliable cloud computing through identity-based encryption and homomorphic cryptography,” Computers, 2025.
  25. A. Amanna and I. Shinde, “Securing generative AI in healthcare using zero-trust cloud architecture,” arXiv, 2025.
  26. H. X. Son et al., “SLIE: A secure lightweight identity-based encryption scheme for healthcare IoT services,” arXiv, 2025.
  27. M. N. Alruwaill, S. P. Mohanty, and E. Kougianos, “hChain 4.0: Secure blockchain framework for electronic health records,” arXiv, 2025.
  28. V. Gollapalli and A. Kurunthachalam,  “Secure healthcare data storage and access control using AES and ECC encryption,” Journal of Cloud Security, 2025.
  29. S. Ali et al., “Security and privacy challenges in multi-cloud computing environments,” Computers & Security, 2025.
  30. S. Dorairaj and P. Ramasamy, “Privacy-preserving healthcare data sharing in distributed cloud systems,” IEEE Cloud Computing, 2025.

The growth of cloud computing has emerged as a critical enabling technology for today's healthcare systems, providing on-demand access to large amounts of medical data, including electronic health records (EHRs), diagnostic images, and clinical documentation. However, the benefits of cloud-based medical information will be contradicted by challenges with securing and maintaining the privacy of electronic medical records. The medical data hosted in cloud computing environments (such as hospitals) is at risk of being stored and opened inappropriately or accessed inappropriately. This research focused on the current practices used to secure sensitive data, including access control and virus protection. A number of different encryption mechanisms are available to ensure that sensitive medical records remain confidential at the time of storage and/or in transit. A number of different access control models are available to provide structured methods to manage user access, user authentication, etc. The proposed research presents a new layered security model integrating encryption with role-based authorization and identity authentication. A functioning example of this research demonstrates how authentication, authorization, and activity logging can be leveraged to prevent unauthorized access to healthcare records. The results of the study show that the use of encryption technologies with a structured access policy for accessing sensitive healthcare records will greatly improve the security and access to sensitive medical information for authorized medical personnel utilizing cloud-based healthcare systems.

Keywords : Cloud Computing, Healthcare Data Security, Data Encryption, Access Control Models, Role-Based Access Control, Identity and Access Management, Cloud Security Framework.

Paper Submission Last Date
30 - April - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe