Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm

Size: px
Start display at page:

Download "Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm"

Transcription

1 Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information Engineering, Shandong University of Science and Technology, Taian , China 2 Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan , China 3 Shandong Provincial Key Laboratory of Computer Networks, Jinan 25001, China Abstract In recent years, rapid development and popularization of cloud computing technology and big data technology enable users to store data in the cloud, which undoubtedly makes it more convenient for data sharing among users. At the same time, China has begun to use modern information technology to keep electronic medical record of patients, which is also called personal health record ( PHR ). Medical cloud is similar to public cloud service. In medical cloud system, PHR can be created and modified online through third-party services, and PHR files are stored in the cloud. However, this also means that cloud-based PHR files may be subject to unauthorized disclosure. Therefore, to effectively protect the privacy of PHR owners, ensure effective implementation of medical cloud system, and achieve efficient and safe sharing of PHR, the paper proposes an approach based on aggregation key encryption algorithm to protect the privacy of PHR owners, and conducts an in-depth research on the framework of this approach. Keywords: Aggregation Key, Medical Cloud, PHR, PRD, PUD, Privacy Protection. 1. RESEARCH BACKGROUND 1.1 Literature review With rapid development of modern information technology, cloud computing technology has been widely used in various fields. In recent years, many researchers have conducted a great deal of research on cloud computing technology and agreed that it has great development potential. With cloud computing technology, people can store data in the cloud and share data through social circle, which greatly facilitates data sharing and utilization among users. Medical cloud is a new concept put forward by Chinese and foreign researchers in recent years. Similar to public cloud service, medical cloud is a health information exchange model for storing data such as PHR. With the help of medical cloud, PHR owners can create, manage and control their personal health data on the Internet, thus improving the storage, retrieval and sharing of medical information (Yin et al., 2017). Medical cloud has brought great convenience to people as well as many security risks. For example, privacy information of PHR owners may be disclosed and stolen, which has become a great obstacle to development and wide application of medical cloud. Nowadays, it has become an important research topic to enable PHR owners to enjoy the convenience of medical cloud and meanwhile protect their privacy. It is necessary to construct a safe and efficient data sharing mechanism especially when PHR owners hope to quickly find out the cause of their disease through wide sharing of their PHR (Dai and Cheng, 2017). Current data sharing mechanism is realized mainly through the setting of access rights. However, it is more and more difficult for such traditional access control method to be geared to the increasingly complex environment of Internet. Therefore, it is of great practical significance to find out a mechanism that contributes to protecting the privacy of PHR owners. 1.2 Research purpose Aimed to address the security risks now confronting PHR owners in the increasingly complex Internet 771

2 environment, the paper puts forward a strategy for protecting the privacy of PHR owners in medical cloud system based on aggregation key encryption algorithm ( AKEA ), with a view to enhance the security of PHR in medical cloud system and guarantee security and efficiency of medical cloud. In this way, medical cloud can bring much convenience to PHR owners while effectively protecting their privacy (Shi et al., 2017). To this end, the paper has done the following work: It conducts in-depth research on AKEA, introduces the types of attribute-based encryption and CP-ABE outsourced decryption, and after making improvements, incorporates AKEA into PHR sharing scheme of medical cloud. Then, the paper proposes a strategy for protecting the privacy of PHR owners in medical cloud system, and conducts an in-depth research on its framework. 2. AKEA This paragraph carries out an in-depth research on AKEA, a public-key encryption algorithm that is essentially different from the attribute-based encryption algorithm. AKEA realizes encryption based on the size of the key, which enables it to effectively avoid key length or ciphertext increase due to increase in the number of attributes in the encryption process, and the problem of key update incurred due to revocation of attributes (Yin, 2017). When there is a connection between user groups and the user scale is small, data can be shared safely, efficiently and flexibly via AKEA. AKEA can aggregate different private keys that match different types of ciphertext files, thus generating a constant aggregation key. Users can, relying on the aggregation key, conveniently decrypt and access different types of ciphertext files. During the access process, AKEA mainly involves 3 elements, namely, cloud server, encryption party and decryption party. The encryption party is responsible for classifying and numbering the private files to be shared, initializing the program via the client to generate public parameters, generating master and public keys for these private files, and encrypting and sending these private files to the cloud based on file index number and public key (Cheng and Pan, 2017). The encryption party uses file index number and master key to extract the aggregation key via Extract algorithm, and sends the key to the decryption party, which then downloads the files to be accessed and uses Decrypt algorithm in the key to decrypt the private files so as to obtain plaintext. In this way, storage space and transmission bandwidth can be greatly reduced, while access efficiency is greatly improved. 3. INTRODUCTION TO TYPES OF ATTRIBUTE-BASED ENCRYPTION AND CP-ABE OUTSOURCED DECRYPTION 3.1 Types of attribute-based encryption Figure 1. Ciphertext and Key in CP-ABE Scheme There are two basic ABE schemes, which are KP-ABE and CP-ABE scheme. Besides, it is possible to flexibly choose the encryption scheme based on the practical situation, so as to exercise flexible control. The access policy for attribute-based encryption scheme can either adopt a matrix structure or a tree structure. The biggest difference between the CP-ABE scheme and the KP-ABE scheme is the difference in the position of the attribute set and the access policy. For CP-ABE scheme, the attribute set is related to the user s private key, the access structure is related to the ciphertext, the sender of message is the setter of the access structure, and the access structure is embedded. However, in KP-ABE scheme, the ciphertext is related to the user s private key, 772

3 and the tree access structure is embedded in the key (Shi et al., 2017). If the attributes contained in the KP-ABE sche.me s ciphertext match the tree access structure, the user can access the file. In CP-ABE scheme, the attribute is used to express the access policy and is embedded in the ciphertext. Only when the attribute set of the user and the access structure set by data owner match each other, the user can decrypt and access the private data of the data owner; otherwise, the user is denied access to the file (Guan and He, 2017). After a comparative analysis, it can be found that CP-ABE scheme is more suitable for access control strategy in cloud storage environment. Figure 1 shows the ciphertext and key in CP-ABE scheme. 3.2 Introduction to CP-ABE outsourced decryption Based on the above analysis results, it can be seen that CP-ABE scheme is more suitable for access control strategy in the medical cloud. The working principle of outsourced decryption in CP-ABE scheme is as follows: The encryption party encrypts the data file through the matrix access structure and transmits it to the cloud. The key management center verifies the user s legitimacy, gives a set of attributes, generates the corresponding conversion key and sends it to the cloud server. Besides, the key management center sends the generated private key to the decryption party. When the user needs to access the file, and makes an access request to the cloud server, then the cloud server will evaluate the user s attribute set. If it confirms that the user s attribute set matches the access structure, the cloud server will convert the ABE ciphertext into El-Gamal ciphertext, and then re-evaluate the user s attribute set. If the user s attribute set is consistent with the access structure, the cloud server will send partially decrypted ciphertext to the user, which can then use the private key to decrypt the remaining ciphertext. If the ciphertext is fully decrypted, then the user has access to the file; otherwise, the user is denied access to the file (Yang et al., 2017). 4. FRAMEWORK RESEARCH ON PRIVACY PROTECTION OF PHR OWNERS IN MEDICAL CLOUD SYSTEM BASED ON AKEA 4.1 System framework To make the access control strategy more flexible, this paper proposes a more efficient medical cloud system, namely, SE-PHR. First, public domain and private domain are defined in the medical cloud system based on the division idea, namely, PRD and PUD. PRD includes users trusted by the PHR owner, the number of which is small and which are easy to manage (Fan et al., 2016). Second, the original AKEA is improved as follows: a trusted third party is introduced to manage and generate the keys. PHR owner sets the access right of PHR files. When a user applies for access to encrypted files, the third party will extract the file key of certain authority from the master key according to the user s authority, and the key is the aggregation key. In this way, users contained in PRD can have access to different encrypted files. Third, users in PUD have a large number and are unidentified, so CP-ABE scheme mentioned above can be used, and data sharing can be realized through integration of attribute revocation mechanism and multi-agency authorization center, which can simplify key management. By partially outsourcing the decryption of the CP-ABE scheme to a third party, the computational complexity of the decryption party can be greatly reduced. In addition, it is possible to achieve attribute revocation, renewal and authorization in the public domain. Varying the encryption scheme with user domain can help achieve efficient and safe sharing of PHR in the medical cloud system (Li and Liu, 2016). 4.2 Assumptions and system requirements A cloud service provider is a semi-trusted organization because it may implement user commands as per applicable regulations, and may take actions not good for users for the sake of great profits, such as disclosing the user s private information. The paper assumes that the third party introduced is a trusted entity, and constrains the communication between entities through standard security protocols (Qian and Huang, 2016). The functional requirement of the system is to achieve safe and efficient sharing of data in medical cloud system, while the security requirements of the system include realization of multi-agency authorization, attribute classification, and dynamic update policy; data privacy; large-scale access and efficient revocation mechanism. After the assumptions of information and system requirements are determined, the system model needs to be constructed. 4.3 System model construction The construction of system model mainly includes data sharing scheme description in PRD and PUD. In PRD, 773

4 the user s identity is known to PHR owner, and the number of users is small. Although ABE scheme enables users to access data, its application scenario is not suitable for PRD as the key and ciphertext length are affected by the number of attributes, and there are problems like key update. Therefore, AKEA needs to be improved before application (Wang, 2016). In the process of improvement, a trusted third party shall be introduced to generate keys and public parameters. The public key is public, and is marked and classified by PHR owner based on file content. Besides, PHR owner encrypts the PHR file based on the public key and the file index number, and sets the user s access right. In addition, the third party generates the aggregation key, so that the user can access files within his/her authorized right through the aggregation key (Shang and Sun, 2016). Please refer to Figure 1 for data file classification diagram. Figure 2. Data File Classification Schematic The specific implementation process is as follows: It is assumed that the file classification number is i, i {1,2, m}, and PHR owner s request for system parameters submitted to the authorization center is Q. The authorization center will, based on request of PHR owner, randomly select the bilinear group H of r order, and generate the variable h H. Then, the first random number α Z r is selected, each ciphertext data is represented by an index number i, and system parameter Q is worked out through initialization, namely, Q {h, h 1,, h i, h m }. Then, the second random number β Z r is selected, and a master key and a public key are then generated, which are respectively expressed as msk and pk, with (msk=β, pk = v = h β ). The PHR owner selects the third random number t Z r based on system parameters, file index number and the public key, and encrypts the file n. Then, the output ciphertext can be expressed as: CT = {H t, (vh t i ), n e (h 1, h m ) t } = {c 1, c 2, c 3 }, where, CT stands for output ciphertext that consists of 3 parts, namely, {c 1, c 2, c 3 }. In the formula, c 1 = h t, c 2 = (vh i ) t, and c 3 = e (h 1, h m ) t. After encryption, these encrypted PHR files are uploaded to the cloud server. When a user accesses a classified PHR file, he or she submits an access request to the cloud server. It is assumed that the index number of the requested PHR file is i, the index number of his/her accessible file is j, and the set S consists of all j. The authorization center will, based on the set S of the user s accessible file index number, generate the aggregation key K s and send it to the user. The aggregation key K s is expressed as K s = j S h β m + 1 j. After the user receives the generated aggregation key, the authorization center may check whether the file with the index number i is included in the set S: If no, the user cannot decrypt it; if yes, then the user can decrypt the ciphertext in the file i with the aggregation key (Liu et al., 2016). After the data sharing scheme of PRD is made clear, the next step is to design the data sharing scheme of PUD, a public domain where the users are unidentified and have a large number, and are thus difficult to manage. Therefore, CP-ABE scheme is more suitable for it. However, as there is only one authorization center in the medical cloud system, which is responsible for key distribution and management, and for attribute revocation. This will lead to system bottlenecks and it must be ensured that the authorization center is completely reliable. This is to say that one authorization center is unable to meet security requirements of PHR owner (Gan and 774

5 Wang, 2016). Therefore, the multi-agency authorization mode shall be adopted so that the user private key in each public domain can be distributed by different authorization centers, and outsourced decryption scheme shall be employed to reduce the computation workload of the authorization centers. 5. CONCLUSION In a word, in the medical cloud system, construction of a health information exchange model based on PHR can greatly enhance the efficiency of medical information storage, retrieval and sharing, thus bringing much convenience to people. However, privacy and security risks with such system have greatly hindered development and application of medical cloud. Concerning privacy risks of PHE owners, the paper proposes a strategy for protecting the privacy of PHR owners in medical cloud system, which helps protect privacy of PHR owners by setting access right that varies with the user domain. As a result, the strategy enables PHR owners to enjoy the benefits brought by medical cloud and meanwhile creates a safe and reliable application environment for medical cloud. ACKNOWLEDGMENTS Natural Science Foundation of Shandong Province, Research on power control and performance of wireless body area network for medical monitoring. ZR2017MF029. REFERENCES Cheng W., Pan R.K. (2017). Talking about the application of mixed cloud in medical industry, Computer and Telecommunications, (07), Dai F., Cheng Y. (2017). Design of cloud platform for telemedicine in Hebei, Electronic Technology and Software Engineering, (18), 53. Fan Y.F., Wang Y.J., Chen J.M., Xia Z.W. (2016). The development of the regional medical data sharing based on the Chinese, Journal of Medical Library and Information Science, 25(12), Gan Q.Q., Wang X.M. (2016). An efficient encryption scheme for key aggregation under the cloud environment, Computer Engineering, 42(02), 33-37, 44. Guan J.J., He P.T. (2017). Based on the construction of a cloud based regional medical data sharing platform, Communication World, (06), Li W.H., Liu S. (2016). The infrastructure of the medical cloud platform, Information and Computer (Theoretical Edition), (22), Liu J., Zuo X.R., Wang X., Yang G.L. (2016). Research on the construction of medical cloud platform based on Hadoop, Chinese Digital Medicine, 11(06), Qian X.R., Huang P.P. (2016). The design and implementation of the regional medical wisdom cloud platform, The Software Industry and Engineering, (06), 33-35, 56. Shang Y.N., Sun B. (2016). Research on the current situation of intelligent medical application under the background of large data, Technology and Industry, 16(10), Shi B.P., Duan X., Kong G.Q., Wu Y. (2017). Design and implementation of the deployment of medical cloud platform, Computer Applications and Software, 34(06), 43-45, 90. Shi B.P., Duan X., Kong G.Q., Wu Y. (2017). Research on resource scheduling strategy of medical cloud platform, Computer Engineering, 43(08), 44-48, 55. Wang Y. (2016). The construction of regional medical information based on cloud computing, The World's Latest Medical Information Digest, 16(87), 219. Yang M., Shu M.L., Liu R.X., Chen C.F., Wei N. (2017). The design and implementation of medical cloud system in the rural areas, Shandong Science, 30(01), Yin Q.G. (2017). The wisdom of the medical application of Internet plus, Under the Background of Communication of Science and Technology, 9(14), Yin W.D., Huang Z., Guo L., Ding Q.S. (2017). Research and practice of regional self-help medical cloud service platform, Chinese Digital Medicine, 12(10),

Attribute-based encryption with encryption and decryption outsourcing

Attribute-based encryption with encryption and decryption outsourcing Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing

More information

Efficient Auditable Access Control Systems for Public Shared Cloud Storage

Efficient Auditable Access Control Systems for Public Shared Cloud Storage Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing

More information

Research on Design and Application of Computer Database Quality Evaluation Model

Research on Design and Application of Computer Database Quality Evaluation Model Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the

More information

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing

Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications

More information

Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare

Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare Jingjing Wang 1, Xiaoyu Zhang 1, Jingjing Guo 1, and Jianfeng Wang 1 1 State Key Laboratory of Integrated

More information

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI

The Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI 2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing

More information

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN

Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN 2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen

More information

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center

The Design and Implementation of Disaster Recovery in Dual-active Cloud Center International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang

More information

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds

Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Qin Liu [1][2], Guojun Wang [1], and Jie Wu [2], [1] Central South University, China [2] Temple University, USA 1 Outline 1. 1. Introduction

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.

Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation. 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data

More information

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud

Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United

More information

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.

A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography

More information

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES

HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent

More information

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a

Study on data encryption technology in network information security. Jianliang Meng, Tao Wu a nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric

More information

Intelligent Terminal System Based on Trusted Platform Module

Intelligent Terminal System Based on Trusted Platform Module American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption

Secure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE

A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,

More information

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING

IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health

More information

A Survey on Secure Sharing In Cloud Computing

A Survey on Secure Sharing In Cloud Computing A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing

More information

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE

EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,

More information

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe

User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant

More information

Encrypted Data Deduplication in Cloud Storage

Encrypted Data Deduplication in Cloud Storage Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline

More information

A Data Classification Algorithm of Internet of Things Based on Neural Network

A Data Classification Algorithm of Internet of Things Based on Neural Network A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To

More information

Time-Based Proxy Re-encryption Review

Time-Based Proxy Re-encryption Review Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure

More information

Research on Digital Library Platform Based on Cloud Computing

Research on Digital Library Platform Based on Cloud Computing Research on Digital Library Platform Based on Cloud Computing Lingling Han and Lijie Wang Heibei Energy Institute of Vocation and Technology, Tangshan, Hebei, China hanlingling2002@126.com, wanglj509@163.com

More information

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data

A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop

More information

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage

Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer

More information

Secure Data Sharing in Cloud Computing: Challenges and Research Directions

Secure Data Sharing in Cloud Computing: Challenges and Research Directions Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information

More information

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA

THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing

More information

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An

Cloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In

More information

A practical application of CP ABE for mobile PHR system: a study on the user accountability

A practical application of CP ABE for mobile PHR system: a study on the user accountability DOI 10.1186/s40064-016-3002-y SHORT REPORT Open Access A practical application of CP ABE for mobile PHR system: a study on the user accountability Hanshu Hong 1, Di Chen 2 and Zhixin Sun 1* *Correspondence:

More information

Remote Monitoring System of Ship Running State under Wireless Network

Remote Monitoring System of Ship Running State under Wireless Network Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department

More information

Design of Soybean Milk Machine Control System based on STC89C52. Ya-gang SUN, Yue ZHANG, Zhi-gang YANG, Rui-cheng ZHANG and Xiao-wei SHEN

Design of Soybean Milk Machine Control System based on STC89C52. Ya-gang SUN, Yue ZHANG, Zhi-gang YANG, Rui-cheng ZHANG and Xiao-wei SHEN 2016 International Conference on Advanced Manufacture Technology and Industrial Application (AMTIA 2016) ISBN: 978-1-60595-387-8 Design of Soybean Milk Machine Control System based on STC89C52 Ya-gang

More information

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM

Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been

More information

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage

Session Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption

More information

An Improved Method of Vehicle Driving Cycle Construction: A Case Study of Beijing

An Improved Method of Vehicle Driving Cycle Construction: A Case Study of Beijing International Forum on Energy, Environment and Sustainable Development (IFEESD 206) An Improved Method of Vehicle Driving Cycle Construction: A Case Study of Beijing Zhenpo Wang,a, Yang Li,b, Hao Luo,

More information

Based on The DES_RSA Encryption Algorithm Improvement and Implementation

Based on The DES_RSA Encryption Algorithm Improvement and Implementation Based on The DES_RSA Encryption Algorithm Improvement and Implementation Abstract Hao Wang Changchun University of science and technology with the rapid development of information technology and net work,our

More information

A Method and System for Thunder Traffic Online Identification

A Method and System for Thunder Traffic Online Identification 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information

More information

ADVANCES in NATURAL and APPLIED SCIENCES

ADVANCES in NATURAL and APPLIED SCIENCES ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy

More information

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2 International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang

More information

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud

Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Mrs. Rashi Saxena 1, N. Yogitha 2, G. Swetha Reddy 3, D. Rasika 4 1 Associate

More information

Delegated Access for Hadoop Clusters in the Cloud

Delegated Access for Hadoop Clusters in the Cloud Delegated Access for Hadoop Clusters in the Cloud David Nuñez, Isaac Agudo, and Javier Lopez Network, Information and Computer Security Laboratory (NICS Lab) Universidad de Málaga, Spain Email: dnunez@lcc.uma.es

More information

An Approach towards Securing Data in Cloud Computing

An Approach towards Securing Data in Cloud Computing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 16-20 www.iosrjournals.org An Approach towards Securing Data in Cloud Computing Miss. V.T. Lanjewar 1, Prof. R.V.Dharaskar

More information

Research on Design Reuse System of Parallel Indexing Cam Mechanism Based on Knowledge

Research on Design Reuse System of Parallel Indexing Cam Mechanism Based on Knowledge Send Orders for Reprints to reprints@benthamscience.ae 40 The Open Mechanical Engineering Journal, 2015, 9, 40-46 Open Access Research on Design Reuse System of Parallel Indexing Cam Mechanism Based on

More information

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace

Yunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction

More information

HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems

HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China [2] Central South University, China [3] Temple

More information

Cemetery Navigation and Information Query System Based on Android and Java Web

Cemetery Navigation and Information Query System Based on Android and Java Web 2017 3rd International Conference on Computational Systems and Communications (ICCSC 2017) Cemetery Navigation and Information Query System Based on Android and Java Web Chao Ding1, a, Yongjie Yang1, b,

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017

International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017 RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,

More information

Shared-network scheme of SMV and GOOSE in smart substation

Shared-network scheme of SMV and GOOSE in smart substation J. Mod. Power Syst. Clean Energy (2014) 2(4):438 443 DOI 10.1007/s40565-014-0073-z Shared-network scheme of and in smart substation Wenlong WANG, Minghui LIU (&), Xicai ZHAO, Gui YANG Abstract The network

More information

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems

DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems 1790 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 11, NOVEMBER 2013 DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems Kan Yang, Associate Member,

More information

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA

SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Research Manuscript Title SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Dr.B.Kalaavathi, SM.Keerthana, N.Renugadevi Professor, Assistant professor, PGScholar Department of

More information

A Design of Remote Monitoring System based on 3G and Internet Technology

A Design of Remote Monitoring System based on 3G and Internet Technology National Conference on Information Technology and Computer Science (CITCS 2012) A Design of Remote Monitoring System based on 3G and Internet Technology Shouxian WEN Lei XU Xingguo SUN Xiaohui LI* Abstract

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

Research on Heterogeneous Communication Network for Power Distribution Automation

Research on Heterogeneous Communication Network for Power Distribution Automation 3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG

More information

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks

CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System

More information

The Research on PGP Private Key Ring Cracking and Its Application

The Research on PGP Private Key Ring Cracking and Its Application The Research on PGP Private Key Ring Cracking and Its Application Xiaoyan Deng 1 *, Qingbing Ji 2, Lijun Zhang 3 1. College of Applied Mathematics,Chengdu University of Information Technology,Chengdu,

More information

Research on 3G Terminal-Based Agricultural Information Service

Research on 3G Terminal-Based Agricultural Information Service Research on 3G Terminal-Based Agricultural Information Service Neng-fu Xie and Xuefu Zhang Agricultural Information Institute, The Chinese Academy of Agricultural Sciences Key Laboratory of Digital Agricultural

More information

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing

Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)

More information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information

WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington

More information

An Agricultural Tri-dimensional Pollution Data Management Platform Based on DNDC Model

An Agricultural Tri-dimensional Pollution Data Management Platform Based on DNDC Model An Agricultural Tri-dimensional Pollution Data Management Platform Based on DNDC Model Lihua Jiang 1,2, Wensheng Wang 1,2, Xiaorong Yang 1,2, Nengfu Xie 1,2, and Youping Cheng 3 1 Agriculture Information

More information

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY

MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology

More information

2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN:

2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN: 2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN: 978-1-60595-415-8 Design and Implementation of a Mobile Healthcare Management Platform Based on

More information

Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao Fan1, Yuexin Wu2,b, Ao Xiao1

Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao Fan1, Yuexin Wu2,b, Ao Xiao1 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao

More information

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA

PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department

More information

Construction of SSI Framework Based on MVC Software Design Model Yongchang Rena, Yongzhe Mab

Construction of SSI Framework Based on MVC Software Design Model Yongchang Rena, Yongzhe Mab 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Construction of SSI Framework Based on MVC Software Design Model Yongchang Rena, Yongzhe Mab School

More information

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage

Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,

More information

Summarization of Data Security and Encryption in Cloud Computing

Summarization of Data Security and Encryption in Cloud Computing 2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 Summarization of Data Security and Encryption in Cloud Computing Jianfei Liao &

More information

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management

Research on Building Baseline of IT Risk Control and Its Application in IT Risks Management Management Science and Engineering Vol. 8, No. 3, 2014, pp. 11-16 DOI: 10.3968/5520 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org Research on Building Baseline of IT

More information

A priority based dynamic bandwidth scheduling in SDN networks 1

A priority based dynamic bandwidth scheduling in SDN networks 1 Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems

More information

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c

The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1,

More information

Construction Scheme for Cloud Platform of NSFC Information System

Construction Scheme for Cloud Platform of NSFC Information System , pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural

More information

Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines

Research on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines DOI: 10.23977/acss.2019.31002 EISSN 2371-8838 Advances in Computer, Signals and Systems (2019) 3: 8-14 Clausius Scientific Press, Canada Research on WSN Secure Communication Method Based on Digital Watermark

More information

A Study of Smartphone Based Disaster Information Reporting System under Disaster Environment

A Study of Smartphone Based Disaster Information Reporting System under Disaster Environment , pp. 45-52 http://dx.doi.org/10.14257/ijsh.2015.9.1.05 A Study of Smartphone Based Disaster Information Reporting System under Disaster Environment Yin Baoquan 1,2, Sun Ruizhi 1 and Yang Hongjun 1 1.

More information

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13

Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Analyzing and Improving Load Balancing Algorithm of MooseFS

Analyzing and Improving Load Balancing Algorithm of MooseFS , pp. 169-176 http://dx.doi.org/10.14257/ijgdc.2014.7.4.16 Analyzing and Improving Load Balancing Algorithm of MooseFS Zhang Baojun 1, Pan Ruifang 1 and Ye Fujun 2 1. New Media Institute, Zhejiang University

More information

Fault Diagnosis of Wind Turbine Based on ELMD and FCM

Fault Diagnosis of Wind Turbine Based on ELMD and FCM Send Orders for Reprints to reprints@benthamscience.ae 76 The Open Mechanical Engineering Journal, 24, 8, 76-72 Fault Diagnosis of Wind Turbine Based on ELMD and FCM Open Access Xianjin Luo * and Xiumei

More information

Analysis and Research on the Big Data Security Based on Cloud Platform. Bo Yang1, a

Analysis and Research on the Big Data Security Based on Cloud Platform. Bo Yang1, a 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Analysis and Research on the Big Data Security Based on Cloud Platform Bo Yang1, a 1 Beijing Earthquake

More information

Mubug: a mobile service for rapid bug tracking

Mubug: a mobile service for rapid bug tracking . MOO PAPER. SCIENCE CHINA Information Sciences January 2016, Vol. 59 013101:1 013101:5 doi: 10.1007/s11432-015-5506-4 Mubug: a mobile service for rapid bug tracking Yang FENG, Qin LIU *,MengyuDOU,JiaLIU&ZhenyuCHEN

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY

More information

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c

Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c 2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai

More information

Processing Technology of Massive Human Health Data Based on Hadoop

Processing Technology of Massive Human Health Data Based on Hadoop 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Processing Technology of Massive Human Health Data Based on Hadoop Miao Liu1, a, Junsheng Yu1,

More information

Battery Energy Storage System Information Modeling Based on IEC 61850

Battery Energy Storage System Information Modeling Based on IEC 61850 Journal of Power and Energy Engineering, 2014, 2, 233-238 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24033 Battery Energy Storage System

More information

Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System

Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Shi Chuan, Zhang Yang and Zhou Yuefei 1 Introduction Command automation system provides an effective

More information

Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3

Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi

More information

Research on the Knowledge Representation Method of Instance Based on Functional Surface

Research on the Knowledge Representation Method of Instance Based on Functional Surface 5th International Conference on Advanced Engineering Materials and Technology (AEMT 2015) Research on the Knowledge Representation Method of Instance Based on Functional Surface Pengjie Zhai a, Changqing

More information

Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme

Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme 2014 Tenth 10th International Conference on Computational Intelligence and Security Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme Changji Wang, Haitao

More information

Design of Coal Mine Power Supply Monitoring System

Design of Coal Mine Power Supply Monitoring System 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic

More information

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management

More information

Concealing Information in Images using Progressive Recovery

Concealing Information in Images using Progressive Recovery Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,

More information

Delegation Scheme based on Proxy Re-encryption in Cloud Environment

Delegation Scheme based on Proxy Re-encryption in Cloud Environment Vol.133 (Information Technology and Computer Science 2016), pp.122-126 http://dx.doi.org/10.14257/astl.2016. Delegation Scheme based on Proxy Re-encryption in Cloud Environment You-Jin Song Department

More information

Wireless Smart Home Security System Based on Android

Wireless Smart Home Security System Based on Android 2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Wireless Smart Home Security System Based on Android LIANGYU CHEN, SEN ZHANG

More information

Design and Implementation of Remote Medical Monitoring System for. Homecare

Design and Implementation of Remote Medical Monitoring System for. Homecare 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design and Implementation of Remote Medical Monitoring System for Homecare Juan Zhong1, a, * Hua Liao2, b 1 College

More information

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY

COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY CONTENT Introduction Problem statements Literature Review Existing system Proposed system Application Conclusion Future work MOTIVATIONS

More information