Académique Documents
Professionnel Documents
Culture Documents
Idongesit E. Eteng
Department of Computer Science, Faculty of Physical Sciences, University of Calabar
Ekoro, Ekoro Igo
Cross River State College of Education, Akamkpa
ABSTRACT
Background: The lack of a centralized database and proper authentication system for healthcare delivery is a
major problem of the paper-based healthcare system in existence across healthcare institutions in Nigeria. The
aim of this research is to develop an e-Health cloud application that offers an even distribution of healthcare
data among major healthcare stakeholders as well as some level of profile-based authentication in a cloud
computing environment. This profile authentication scheme ensures that resources are made available based
on the profile of the user.
Methods: The software engineering methodology adopted for this study was the incremental software
development model. This allowed the end users experiment with the intermediate version of the system before
a final version of the system was developed after their inputs.
Results: The developed system was presented to healthcare personnel, thereafter, a questionnaire testing the
usability and acceptability of the system was administered to 75 healthcare personnel. The results of the
interview revealed that 86.96% of the doctors, 82.76% of the Nurses, 66.67% of medical laboratory scientists
and 63.64% of the medical record staff tested the system gave satisfactory reports on the system performance
regarding the usability, functionality , privileges and acceptability of the system. The developed system was
recommended for adoption in all healthcare institutions across the state in the first instance, and then the
country as a whole.
Keywords: Profile-authentication, e-Health, cloud computing
9 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
10 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
medical prescriptions was mostly used to practitioners and other integrating enterprises
Personal Health Records (PHR), Electronic is overblown and tasking to control, which
Medical Records (EMR) and the recently inevitably demands for the deploying of
Electronic Health Records (EHR)[2]. The cloud computing services in the healthcare
necessity to incorporate patients’ medical domain [2]. The cloud computing (CC)
information from distant and remote area, model has assisted the healthcare domain of
health insurance organizations and non- records (PMR) in storing medical data.
metamorphosed to the technology referred to consuming and tedious work, this is because
e-Health. The World Health Organization the paper record can only be available in one
(WHO) in its definition deduced that e- place at a time, and for this reason, this
Health refers to the transfer and documents cannot be accessed between two
various healthcare practitioners and clients and diverse places concurrently. Also, in the
Technology (IT) equipment and electronic services are done on written documents from
Nonetheless, the interchange and through the patient or relatives of the patient.
11 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
referral system. The cloud computing militating against healthcare givers in the
such as keeping large chunks of paper-based of healthcare delivery at distant and remote
medical records in large file cabinets which area [4].This situation is worrisome because
may be affected by natural hazards such as challenges and success at a point cannot be
such as fire and theft, hence the necessity to According to [3], the e-Health Cloud
Technology service providers to forestall this paradigm that creates an interactive platform
menace becomes inevitable [5]. Moreover, for healthcare services. This platform
according to [6], the cloud computing model provides a synergy for various healthcare
enhancing integration among the various interact and access any breakthroughs in
and to provide the most expected gains, that this research intends to deploy an e-
which include scalability, swiftness, cost Health system with a profile-based access
effectiveness, and all time accessibility of which provides different levels of privileges
Apart from the problem of integration of who are involved in the provision of
12 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
effective distribution of healthcare data (such through several versions till a suitable
as patients’ records) and services (such as acceptable system has been developed. One
platform will be created. The information in development and system validation process
this e-Health platform will also create a are interwoven rather than separate, with
repository for doctors and their areas of speedy feedback across activities.
institution, this will enable patients to locate adopted for this research because the
doctors, it will also include a referral system developed system requires inputs from the
where patients can be transferred from one users at each increment (modules). In this
available facilities. Major stakeholders such the system contains some of the basic
as patients, doctors, and nurses will have a functionality that is of utmost need by the
platform for robust interaction. user. In general, the initial version of the
13 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
Patient
Accessing
patient data
ACL PR RD
and medical
advice
CURD
CURD
ACL PR RD
14 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
The architecture in figure 1 illustrate the generated in the platform. Another important
profile authentication of an e-health system feature of this architecture is that the doctor
access control list (ACL), define the activities of the nurses and other healthcare
a particular profile. These profiles defines doctor. Patients can initiate consultations
the various health care providers in the with doctors based on their area of
platform. The profile gateway (PR) defines specialties. Doctors in turn can also schedule
access policies and resources in the and reschedule patients’ visitations, this
platform. The resources are mainly the invariably reduced the bottleneck associated
patients’ information which are categorized with the paper-based medical system. This
and made available based on the profile of architecture enables patients to access
the user. The rule dictionary (RD) specify medical practitioners based on their area of
who perform complete or partial CURD specialties. This architecture also creates a
operations assigned to users of the platform and cross fertilize ideas that improve the
delicate operations. Some users are more convenient manner than the paper-
privileged to perform complete CURD, based healthcare services. With the CURD
while others can only perform partial operations properly spelt out, patients can
CURD. The cloud data storage in the properly access their medical history
15 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
16 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
linking patients’ record among several ii. HTML5: this is the latest version of
facilitates referral services. This interaction iii. Cascading style sheet (CSS3): this
17 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
ii. Processor: Intel Xeon and password in order to gain access and
2012 operating system, this was the server Several unit tests were conducted on the
application that acted as the private cloud different modules of the system. These unit
server for sharing of system resources. • Database unit tests: this test were
18 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
properly displayed at their expected scientists and 11 medical record staff. In the
• Profile unit tests: this test was doctors faulted the initial design of the
carried out to ensure that users only system which made doctors the desk officers
• Data input unit test: this test was to create room for the front desk officer,
carried out to confirm that the several thereafter the system was then represented.
data entry modules were able to The response obtained from the healthcare
accept data in the expected and personnel after redesigning the system to
19 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
73.91%of the doctors interviewed were interviewed agreed that the software was
impressed by the service provided by the interactive and user friendly enough for their
doctors interviewed agreed that allowing medical data in the software was given a
patients access to their medical record was a massive approval as 91.67% of the medical
The results in the responses from nurses that the platform improves the confidentiality and
were interviewed shows that 82.76% of the safety of healthcare data. Also, the result
nurses agreed that the software reduces the obtained from the interview of medical
burden on medical personnel in the record staff shows a clear acceptance of the
management of healthcare information. The developed system. From the result, 100% of
confidentiality of medical records introduced medical record staff were impressed with the
approval, this is evidence from the fact that A graphical representation of the analysis is
93.10% of the nurses agreed that the platform shown in chart 1 and chart 2. Based on the
improves the confidentiality and safety of responses obtained and the results shown in
healthcare data. The direct interaction of the tables and charts from the four
platform was received 82.76% which implies deduced that the users are satisfied with the
20 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
20
15 SA
10 A
D
5
SD
0
Q1 Q2 Q3 Q4 Q5 Q6 Q7 Q8 Q9
21 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 16, No. 9, September 2018
REFERENCES
22 https://sites.google.com/site/ijcsis/
ISSN 1947-5500