Future Work
Though the author tried to implement all the scenario of E-health Monitoring care System, there are certain rules and regulations in Medical Council board that act as a restrict factor since medical council should approve the particular hospital for data transfer which takes little time. Although there is a rule that any medical records from one county to outside country should go along with the Medical board. The platform orchestrion implemented by one hospital differs from other hospitals and even medical board has different kind of network anomalies. In order to avoid any further delay for transmit or proof verification the author of this project suggest the standard platform protocol which is common for all called as CORBA implementation to all network whereas it is easy for everyone to share a record. Still research is going on of unity, I left this work as a future work to the young researcher of subsequent years that they will try and emphasis the advantages of POA (Portable Object Adapter) in CORBA where the dream for sharing under one platform for caring the patients will come true
Conclusion
The E-healthcare System project that deals with each aspect of real time scenario of how the hospital data are managed inside and outside securely in several hotspots. The project emphasis on in which way the data should be constructed and to transmitted in a quick possible time. The project emphasis the key agreement, algorithm and firewall, IDS, IPS factors for secure transmission of data. We proved this scenario through securiCAD and Anylogic Cloud implementation platform.
Acknowledgment to the Author (From Base Papers)
This project used the base paper titled Securing E-health care worked by Hans Löhr , Ahmad-Reza Sadeghi and Marcel Winandy,  where we enhanced many factors in all aspets which are mentioned above.
References.
[1] Puech, W. and Rodrigues, J.M., 2004, September. A new crypto-watermarking method for medical images safe transfer. In 2004 12th European Signal Processing Conference (pp. 1481-1484). IEEE.
 
[2] Somaraj, S. and Hussain, M.A., 2014. Securing medical images by image encryption using key image. International Journal of Computer Applications104(3), pp.30-34.
 
[3] Kester, Q.A., 2013. A visual cryptographic encryption technique for securing medical images. arXiv preprint arXiv:1307.7791.
 
[4] Meghashree, Sujitha 2018, AES based Image Encryption and Decryption using Matlab,ISSN : 2278-0181.
 
[5] Anane, N., Anane, M., Bessalah, H., Issad, M. and Messaoudi, K., 2010, June. RSA based encryption decryption of medical images. In 2010 7th International Multi-Conference on Systems, Signals and Devices (pp. 1-4). IEEE.
 
[6] Löhr, H., Sadeghi, A.R. and Winandy, M., 2010, November. Securing the e-health cloud. In Proceedings of the 1st acm international health informatics symposium (pp. 220-229). ACM.
 
[7] Yang, M., Chen, L., Yuan, S. and Hu, W.C., 2011. Secure Processing and Delivery of Medical Images for Patient Information Protection. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
 
[8] Singh, J., Lata, K. and Ashraf, J., 2015. Image encryption & decryption with symmetric key cryptography using MATLAB. International Journal of Current Engineering and Technology, 5(1), pp.448-451.
 
[9] Moorthi, M. and Amutha, R., 2011, December. An improved algorithm for medical image compression. In International Conference on Computing and Communication Systems (pp. 451-460). Springer, Berlin, Heidelberg.
 
[10] Alowolodu, O.D., Adelaja, G.K., Alese, B.K. and Olayemi, O.C., 2018. Medical Image Security Using Quantum Cryptography. Issues in Informing Science & Information Technology, 15, pp.57-68.