Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm
|
|
- Lenard Eaton
- 5 years ago
- Views:
Transcription
1 Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information Engineering, Shandong University of Science and Technology, Taian , China 2 Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan , China 3 Shandong Provincial Key Laboratory of Computer Networks, Jinan 25001, China Abstract In recent years, rapid development and popularization of cloud computing technology and big data technology enable users to store data in the cloud, which undoubtedly makes it more convenient for data sharing among users. At the same time, China has begun to use modern information technology to keep electronic medical record of patients, which is also called personal health record ( PHR ). Medical cloud is similar to public cloud service. In medical cloud system, PHR can be created and modified online through third-party services, and PHR files are stored in the cloud. However, this also means that cloud-based PHR files may be subject to unauthorized disclosure. Therefore, to effectively protect the privacy of PHR owners, ensure effective implementation of medical cloud system, and achieve efficient and safe sharing of PHR, the paper proposes an approach based on aggregation key encryption algorithm to protect the privacy of PHR owners, and conducts an in-depth research on the framework of this approach. Keywords: Aggregation Key, Medical Cloud, PHR, PRD, PUD, Privacy Protection. 1. RESEARCH BACKGROUND 1.1 Literature review With rapid development of modern information technology, cloud computing technology has been widely used in various fields. In recent years, many researchers have conducted a great deal of research on cloud computing technology and agreed that it has great development potential. With cloud computing technology, people can store data in the cloud and share data through social circle, which greatly facilitates data sharing and utilization among users. Medical cloud is a new concept put forward by Chinese and foreign researchers in recent years. Similar to public cloud service, medical cloud is a health information exchange model for storing data such as PHR. With the help of medical cloud, PHR owners can create, manage and control their personal health data on the Internet, thus improving the storage, retrieval and sharing of medical information (Yin et al., 2017). Medical cloud has brought great convenience to people as well as many security risks. For example, privacy information of PHR owners may be disclosed and stolen, which has become a great obstacle to development and wide application of medical cloud. Nowadays, it has become an important research topic to enable PHR owners to enjoy the convenience of medical cloud and meanwhile protect their privacy. It is necessary to construct a safe and efficient data sharing mechanism especially when PHR owners hope to quickly find out the cause of their disease through wide sharing of their PHR (Dai and Cheng, 2017). Current data sharing mechanism is realized mainly through the setting of access rights. However, it is more and more difficult for such traditional access control method to be geared to the increasingly complex environment of Internet. Therefore, it is of great practical significance to find out a mechanism that contributes to protecting the privacy of PHR owners. 1.2 Research purpose Aimed to address the security risks now confronting PHR owners in the increasingly complex Internet 771
2 environment, the paper puts forward a strategy for protecting the privacy of PHR owners in medical cloud system based on aggregation key encryption algorithm ( AKEA ), with a view to enhance the security of PHR in medical cloud system and guarantee security and efficiency of medical cloud. In this way, medical cloud can bring much convenience to PHR owners while effectively protecting their privacy (Shi et al., 2017). To this end, the paper has done the following work: It conducts in-depth research on AKEA, introduces the types of attribute-based encryption and CP-ABE outsourced decryption, and after making improvements, incorporates AKEA into PHR sharing scheme of medical cloud. Then, the paper proposes a strategy for protecting the privacy of PHR owners in medical cloud system, and conducts an in-depth research on its framework. 2. AKEA This paragraph carries out an in-depth research on AKEA, a public-key encryption algorithm that is essentially different from the attribute-based encryption algorithm. AKEA realizes encryption based on the size of the key, which enables it to effectively avoid key length or ciphertext increase due to increase in the number of attributes in the encryption process, and the problem of key update incurred due to revocation of attributes (Yin, 2017). When there is a connection between user groups and the user scale is small, data can be shared safely, efficiently and flexibly via AKEA. AKEA can aggregate different private keys that match different types of ciphertext files, thus generating a constant aggregation key. Users can, relying on the aggregation key, conveniently decrypt and access different types of ciphertext files. During the access process, AKEA mainly involves 3 elements, namely, cloud server, encryption party and decryption party. The encryption party is responsible for classifying and numbering the private files to be shared, initializing the program via the client to generate public parameters, generating master and public keys for these private files, and encrypting and sending these private files to the cloud based on file index number and public key (Cheng and Pan, 2017). The encryption party uses file index number and master key to extract the aggregation key via Extract algorithm, and sends the key to the decryption party, which then downloads the files to be accessed and uses Decrypt algorithm in the key to decrypt the private files so as to obtain plaintext. In this way, storage space and transmission bandwidth can be greatly reduced, while access efficiency is greatly improved. 3. INTRODUCTION TO TYPES OF ATTRIBUTE-BASED ENCRYPTION AND CP-ABE OUTSOURCED DECRYPTION 3.1 Types of attribute-based encryption Figure 1. Ciphertext and Key in CP-ABE Scheme There are two basic ABE schemes, which are KP-ABE and CP-ABE scheme. Besides, it is possible to flexibly choose the encryption scheme based on the practical situation, so as to exercise flexible control. The access policy for attribute-based encryption scheme can either adopt a matrix structure or a tree structure. The biggest difference between the CP-ABE scheme and the KP-ABE scheme is the difference in the position of the attribute set and the access policy. For CP-ABE scheme, the attribute set is related to the user s private key, the access structure is related to the ciphertext, the sender of message is the setter of the access structure, and the access structure is embedded. However, in KP-ABE scheme, the ciphertext is related to the user s private key, 772
3 and the tree access structure is embedded in the key (Shi et al., 2017). If the attributes contained in the KP-ABE sche.me s ciphertext match the tree access structure, the user can access the file. In CP-ABE scheme, the attribute is used to express the access policy and is embedded in the ciphertext. Only when the attribute set of the user and the access structure set by data owner match each other, the user can decrypt and access the private data of the data owner; otherwise, the user is denied access to the file (Guan and He, 2017). After a comparative analysis, it can be found that CP-ABE scheme is more suitable for access control strategy in cloud storage environment. Figure 1 shows the ciphertext and key in CP-ABE scheme. 3.2 Introduction to CP-ABE outsourced decryption Based on the above analysis results, it can be seen that CP-ABE scheme is more suitable for access control strategy in the medical cloud. The working principle of outsourced decryption in CP-ABE scheme is as follows: The encryption party encrypts the data file through the matrix access structure and transmits it to the cloud. The key management center verifies the user s legitimacy, gives a set of attributes, generates the corresponding conversion key and sends it to the cloud server. Besides, the key management center sends the generated private key to the decryption party. When the user needs to access the file, and makes an access request to the cloud server, then the cloud server will evaluate the user s attribute set. If it confirms that the user s attribute set matches the access structure, the cloud server will convert the ABE ciphertext into El-Gamal ciphertext, and then re-evaluate the user s attribute set. If the user s attribute set is consistent with the access structure, the cloud server will send partially decrypted ciphertext to the user, which can then use the private key to decrypt the remaining ciphertext. If the ciphertext is fully decrypted, then the user has access to the file; otherwise, the user is denied access to the file (Yang et al., 2017). 4. FRAMEWORK RESEARCH ON PRIVACY PROTECTION OF PHR OWNERS IN MEDICAL CLOUD SYSTEM BASED ON AKEA 4.1 System framework To make the access control strategy more flexible, this paper proposes a more efficient medical cloud system, namely, SE-PHR. First, public domain and private domain are defined in the medical cloud system based on the division idea, namely, PRD and PUD. PRD includes users trusted by the PHR owner, the number of which is small and which are easy to manage (Fan et al., 2016). Second, the original AKEA is improved as follows: a trusted third party is introduced to manage and generate the keys. PHR owner sets the access right of PHR files. When a user applies for access to encrypted files, the third party will extract the file key of certain authority from the master key according to the user s authority, and the key is the aggregation key. In this way, users contained in PRD can have access to different encrypted files. Third, users in PUD have a large number and are unidentified, so CP-ABE scheme mentioned above can be used, and data sharing can be realized through integration of attribute revocation mechanism and multi-agency authorization center, which can simplify key management. By partially outsourcing the decryption of the CP-ABE scheme to a third party, the computational complexity of the decryption party can be greatly reduced. In addition, it is possible to achieve attribute revocation, renewal and authorization in the public domain. Varying the encryption scheme with user domain can help achieve efficient and safe sharing of PHR in the medical cloud system (Li and Liu, 2016). 4.2 Assumptions and system requirements A cloud service provider is a semi-trusted organization because it may implement user commands as per applicable regulations, and may take actions not good for users for the sake of great profits, such as disclosing the user s private information. The paper assumes that the third party introduced is a trusted entity, and constrains the communication between entities through standard security protocols (Qian and Huang, 2016). The functional requirement of the system is to achieve safe and efficient sharing of data in medical cloud system, while the security requirements of the system include realization of multi-agency authorization, attribute classification, and dynamic update policy; data privacy; large-scale access and efficient revocation mechanism. After the assumptions of information and system requirements are determined, the system model needs to be constructed. 4.3 System model construction The construction of system model mainly includes data sharing scheme description in PRD and PUD. In PRD, 773
4 the user s identity is known to PHR owner, and the number of users is small. Although ABE scheme enables users to access data, its application scenario is not suitable for PRD as the key and ciphertext length are affected by the number of attributes, and there are problems like key update. Therefore, AKEA needs to be improved before application (Wang, 2016). In the process of improvement, a trusted third party shall be introduced to generate keys and public parameters. The public key is public, and is marked and classified by PHR owner based on file content. Besides, PHR owner encrypts the PHR file based on the public key and the file index number, and sets the user s access right. In addition, the third party generates the aggregation key, so that the user can access files within his/her authorized right through the aggregation key (Shang and Sun, 2016). Please refer to Figure 1 for data file classification diagram. Figure 2. Data File Classification Schematic The specific implementation process is as follows: It is assumed that the file classification number is i, i {1,2, m}, and PHR owner s request for system parameters submitted to the authorization center is Q. The authorization center will, based on request of PHR owner, randomly select the bilinear group H of r order, and generate the variable h H. Then, the first random number α Z r is selected, each ciphertext data is represented by an index number i, and system parameter Q is worked out through initialization, namely, Q {h, h 1,, h i, h m }. Then, the second random number β Z r is selected, and a master key and a public key are then generated, which are respectively expressed as msk and pk, with (msk=β, pk = v = h β ). The PHR owner selects the third random number t Z r based on system parameters, file index number and the public key, and encrypts the file n. Then, the output ciphertext can be expressed as: CT = {H t, (vh t i ), n e (h 1, h m ) t } = {c 1, c 2, c 3 }, where, CT stands for output ciphertext that consists of 3 parts, namely, {c 1, c 2, c 3 }. In the formula, c 1 = h t, c 2 = (vh i ) t, and c 3 = e (h 1, h m ) t. After encryption, these encrypted PHR files are uploaded to the cloud server. When a user accesses a classified PHR file, he or she submits an access request to the cloud server. It is assumed that the index number of the requested PHR file is i, the index number of his/her accessible file is j, and the set S consists of all j. The authorization center will, based on the set S of the user s accessible file index number, generate the aggregation key K s and send it to the user. The aggregation key K s is expressed as K s = j S h β m + 1 j. After the user receives the generated aggregation key, the authorization center may check whether the file with the index number i is included in the set S: If no, the user cannot decrypt it; if yes, then the user can decrypt the ciphertext in the file i with the aggregation key (Liu et al., 2016). After the data sharing scheme of PRD is made clear, the next step is to design the data sharing scheme of PUD, a public domain where the users are unidentified and have a large number, and are thus difficult to manage. Therefore, CP-ABE scheme is more suitable for it. However, as there is only one authorization center in the medical cloud system, which is responsible for key distribution and management, and for attribute revocation. This will lead to system bottlenecks and it must be ensured that the authorization center is completely reliable. This is to say that one authorization center is unable to meet security requirements of PHR owner (Gan and 774
5 Wang, 2016). Therefore, the multi-agency authorization mode shall be adopted so that the user private key in each public domain can be distributed by different authorization centers, and outsourced decryption scheme shall be employed to reduce the computation workload of the authorization centers. 5. CONCLUSION In a word, in the medical cloud system, construction of a health information exchange model based on PHR can greatly enhance the efficiency of medical information storage, retrieval and sharing, thus bringing much convenience to people. However, privacy and security risks with such system have greatly hindered development and application of medical cloud. Concerning privacy risks of PHE owners, the paper proposes a strategy for protecting the privacy of PHR owners in medical cloud system, which helps protect privacy of PHR owners by setting access right that varies with the user domain. As a result, the strategy enables PHR owners to enjoy the benefits brought by medical cloud and meanwhile creates a safe and reliable application environment for medical cloud. ACKNOWLEDGMENTS Natural Science Foundation of Shandong Province, Research on power control and performance of wireless body area network for medical monitoring. ZR2017MF029. REFERENCES Cheng W., Pan R.K. (2017). Talking about the application of mixed cloud in medical industry, Computer and Telecommunications, (07), Dai F., Cheng Y. (2017). Design of cloud platform for telemedicine in Hebei, Electronic Technology and Software Engineering, (18), 53. Fan Y.F., Wang Y.J., Chen J.M., Xia Z.W. (2016). The development of the regional medical data sharing based on the Chinese, Journal of Medical Library and Information Science, 25(12), Gan Q.Q., Wang X.M. (2016). An efficient encryption scheme for key aggregation under the cloud environment, Computer Engineering, 42(02), 33-37, 44. Guan J.J., He P.T. (2017). Based on the construction of a cloud based regional medical data sharing platform, Communication World, (06), Li W.H., Liu S. (2016). The infrastructure of the medical cloud platform, Information and Computer (Theoretical Edition), (22), Liu J., Zuo X.R., Wang X., Yang G.L. (2016). Research on the construction of medical cloud platform based on Hadoop, Chinese Digital Medicine, 11(06), Qian X.R., Huang P.P. (2016). The design and implementation of the regional medical wisdom cloud platform, The Software Industry and Engineering, (06), 33-35, 56. Shang Y.N., Sun B. (2016). Research on the current situation of intelligent medical application under the background of large data, Technology and Industry, 16(10), Shi B.P., Duan X., Kong G.Q., Wu Y. (2017). Design and implementation of the deployment of medical cloud platform, Computer Applications and Software, 34(06), 43-45, 90. Shi B.P., Duan X., Kong G.Q., Wu Y. (2017). Research on resource scheduling strategy of medical cloud platform, Computer Engineering, 43(08), 44-48, 55. Wang Y. (2016). The construction of regional medical information based on cloud computing, The World's Latest Medical Information Digest, 16(87), 219. Yang M., Shu M.L., Liu R.X., Chen C.F., Wei N. (2017). The design and implementation of medical cloud system in the rural areas, Shandong Science, 30(01), Yin Q.G. (2017). The wisdom of the medical application of Internet plus, Under the Background of Communication of Science and Technology, 9(14), Yin W.D., Huang Z., Guo L., Ding Q.S. (2017). Research and practice of regional self-help medical cloud service platform, Chinese Digital Medicine, 12(10),
Attribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationEfficient Auditable Access Control Systems for Public Shared Cloud Storage
Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing
More informationResearch on Design and Application of Computer Database Quality Evaluation Model
Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the
More informationFine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing
wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications
More informationSecurity Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare
Security Analysis of PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-healthcare Jingjing Wang 1, Xiaoyu Zhang 1, Jingjing Guo 1, and Jianfeng Wang 1 1 State Key Laboratory of Integrated
More informationThe Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI
2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationThe Design and Implementation of Disaster Recovery in Dual-active Cloud Center
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) The Design and Implementation of Disaster Recovery in Dual-active Cloud Center Xiao Chen 1, a, Longjun Zhang
More informationClock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Qin Liu [1][2], Guojun Wang [1], and Jie Wu [2], [1] Central South University, China [2] Temple University, USA 1 Outline 1. 1. Introduction
More informationOpen Access Research on the Prediction Model of Material Cost Based on Data Mining
Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining
More informationChongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.
2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: 978-1-60595-406-6 The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data
More informationThree Levels of Access Control to Personal Health Records in a Healthcare Cloud
Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United
More informationA compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationHIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES
HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationIntelligent Terminal System Based on Trusted Platform Module
American Journal of Mobile Systems, Applications and Services Vol. 4, No. 3, 2018, pp. 13-18 http://www.aiscience.org/journal/ajmsas ISSN: 2471-7282 (Print); ISSN: 2471-7290 (Online) Intelligent Terminal
More informationA Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da
More informationCombining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,
More informationSecure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption
Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud
More informationModel the P2P Attack in Computer Networks
International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information
More informationA LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE
A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationA Survey on Secure Sharing In Cloud Computing
A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationUser Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe
User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant
More informationEncrypted Data Deduplication in Cloud Storage
Encrypted Data Deduplication in Cloud Storage Chun- I Fan, Shi- Yuan Huang, Wen- Che Hsu Department of Computer Science and Engineering Na>onal Sun Yat- sen University Kaohsiung, Taiwan AsiaJCIS 2015 Outline
More informationA Data Classification Algorithm of Internet of Things Based on Neural Network
A Data Classification Algorithm of Internet of Things Based on Neural Network https://doi.org/10.3991/ijoe.v13i09.7587 Zhenjun Li Hunan Radio and TV University, Hunan, China 278060389@qq.com Abstract To
More informationTime-Based Proxy Re-encryption Review
Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure
More informationResearch on Digital Library Platform Based on Cloud Computing
Research on Digital Library Platform Based on Cloud Computing Lingling Han and Lijie Wang Heibei Energy Institute of Vocation and Technology, Tangshan, Hebei, China hanlingling2002@126.com, wanglj509@163.com
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationEfficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage
Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer
More informationSecure Data Sharing in Cloud Computing: Challenges and Research Directions
Cyber Summer School Melbourne, 12-13 Feb 2018 Secure Data Sharing in Cloud Computing: Challenges and Research Directions Willy Susilo Institute of Cybersecurity and Cryptology School of Computing and Information
More informationTHIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA
THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing
More informationCloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An
Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In
More informationA practical application of CP ABE for mobile PHR system: a study on the user accountability
DOI 10.1186/s40064-016-3002-y SHORT REPORT Open Access A practical application of CP ABE for mobile PHR system: a study on the user accountability Hanshu Hong 1, Di Chen 2 and Zhixin Sun 1* *Correspondence:
More informationRemote Monitoring System of Ship Running State under Wireless Network
Journal of Shipping and Ocean Engineering 7 (2017) 181-185 doi 10.17265/2159-5879/2017.05.001 D DAVID PUBLISHING Remote Monitoring System of Ship Running State under Wireless Network LI Ning Department
More informationDesign of Soybean Milk Machine Control System based on STC89C52. Ya-gang SUN, Yue ZHANG, Zhi-gang YANG, Rui-cheng ZHANG and Xiao-wei SHEN
2016 International Conference on Advanced Manufacture Technology and Industrial Application (AMTIA 2016) ISBN: 978-1-60595-387-8 Design of Soybean Milk Machine Control System based on STC89C52 Ya-gang
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been
More informationSession Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption
More informationAn Improved Method of Vehicle Driving Cycle Construction: A Case Study of Beijing
International Forum on Energy, Environment and Sustainable Development (IFEESD 206) An Improved Method of Vehicle Driving Cycle Construction: A Case Study of Beijing Zhenpo Wang,a, Yang Li,b, Hao Luo,
More informationBased on The DES_RSA Encryption Algorithm Improvement and Implementation
Based on The DES_RSA Encryption Algorithm Improvement and Implementation Abstract Hao Wang Changchun University of science and technology with the rapid development of information technology and net work,our
More informationA Method and System for Thunder Traffic Online Identification
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy
More informationTest Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang
More informationConjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Mrs. Rashi Saxena 1, N. Yogitha 2, G. Swetha Reddy 3, D. Rasika 4 1 Associate
More informationDelegated Access for Hadoop Clusters in the Cloud
Delegated Access for Hadoop Clusters in the Cloud David Nuñez, Isaac Agudo, and Javier Lopez Network, Information and Computer Security Laboratory (NICS Lab) Universidad de Málaga, Spain Email: dnunez@lcc.uma.es
More informationAn Approach towards Securing Data in Cloud Computing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727 PP 16-20 www.iosrjournals.org An Approach towards Securing Data in Cloud Computing Miss. V.T. Lanjewar 1, Prof. R.V.Dharaskar
More informationResearch on Design Reuse System of Parallel Indexing Cam Mechanism Based on Knowledge
Send Orders for Reprints to reprints@benthamscience.ae 40 The Open Mechanical Engineering Journal, 2015, 9, 40-46 Open Access Research on Design Reuse System of Parallel Indexing Cam Mechanism Based on
More informationImplementation of Decentralized Access Control with Anonymous Authentication in Cloud
Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud
More informationYunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction
More informationHCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems
HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China [2] Central South University, China [3] Temple
More informationCemetery Navigation and Information Query System Based on Android and Java Web
2017 3rd International Conference on Computational Systems and Communications (ICCSC 2017) Cemetery Navigation and Information Query System Based on Android and Java Web Chao Ding1, a, Yongjie Yang1, b,
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,
More informationShared-network scheme of SMV and GOOSE in smart substation
J. Mod. Power Syst. Clean Energy (2014) 2(4):438 443 DOI 10.1007/s40565-014-0073-z Shared-network scheme of and in smart substation Wenlong WANG, Minghui LIU (&), Xicai ZHAO, Gui YANG Abstract The network
More informationDAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
1790 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 11, NOVEMBER 2013 DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems Kan Yang, Associate Member,
More informationSECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
Research Manuscript Title SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Dr.B.Kalaavathi, SM.Keerthana, N.Renugadevi Professor, Assistant professor, PGScholar Department of
More informationA Design of Remote Monitoring System based on 3G and Internet Technology
National Conference on Information Technology and Computer Science (CITCS 2012) A Design of Remote Monitoring System based on 3G and Internet Technology Shouxian WEN Lei XU Xingguo SUN Xiaohui LI* Abstract
More informationThe Research of Delay Characteristics in CAN Bus Networked Control System
Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationCloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks
CloudSky: A Controllable Data Self-Destruction System for Untrusted Cloud Storage Networks The material in these slides mainly comes from the paper CloudSky: A Controllable Data Self-Destruction System
More informationThe Research on PGP Private Key Ring Cracking and Its Application
The Research on PGP Private Key Ring Cracking and Its Application Xiaoyan Deng 1 *, Qingbing Ji 2, Lijun Zhang 3 1. College of Applied Mathematics,Chengdu University of Information Technology,Chengdu,
More informationResearch on 3G Terminal-Based Agricultural Information Service
Research on 3G Terminal-Based Agricultural Information Service Neng-fu Xie and Xuefu Zhang Agricultural Information Institute, The Chinese Academy of Agricultural Sciences Key Laboratory of Digital Agricultural
More informationSecure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing
ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)
More informationWASHINGTON UNIVERSITY HIPAA Privacy Policy # 7. Appropriate Methods of Communicating Protected Health Information
WASHINGTON UNIVERSITY HIPAA Privacy Policy # 7 Appropriate Methods of Communicating Protected Health Information Statement of Policy Washington University and its member organizations (collectively, Washington
More informationAn Agricultural Tri-dimensional Pollution Data Management Platform Based on DNDC Model
An Agricultural Tri-dimensional Pollution Data Management Platform Based on DNDC Model Lihua Jiang 1,2, Wensheng Wang 1,2, Xiaorong Yang 1,2, Nengfu Xie 1,2, and Youping Cheng 3 1 Agriculture Information
More informationMULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY
ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology
More information2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN:
2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN: 978-1-60595-415-8 Design and Implementation of a Mobile Healthcare Management Platform Based on
More informationImprovements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao Fan1, Yuexin Wu2,b, Ao Xiao1
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao
More informationPRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA
PRIVACY PRESERVING CONTENT BASED SEARCH OVER OUTSOURCED IMAGE DATA Supriya Pentewad 1, Siddhivinayak Kulkarni 2 1 Department of Computer Engineering. MIT College of Engineering, Pune, India 2 Department
More informationConstruction of SSI Framework Based on MVC Software Design Model Yongchang Rena, Yongzhe Mab
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Construction of SSI Framework Based on MVC Software Design Model Yongchang Rena, Yongzhe Mab School
More informationSecure Data De-Duplication With Dynamic Ownership Management In Cloud Storage
Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,
More informationSummarization of Data Security and Encryption in Cloud Computing
2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 Summarization of Data Security and Encryption in Cloud Computing Jianfei Liao &
More informationResearch on Building Baseline of IT Risk Control and Its Application in IT Risks Management
Management Science and Engineering Vol. 8, No. 3, 2014, pp. 11-16 DOI: 10.3968/5520 ISSN 1913-0341 [Print] ISSN 1913-035X [Online] www.cscanada.net www.cscanada.org Research on Building Baseline of IT
More informationA priority based dynamic bandwidth scheduling in SDN networks 1
Acta Technica 62 No. 2A/2017, 445 454 c 2017 Institute of Thermomechanics CAS, v.v.i. A priority based dynamic bandwidth scheduling in SDN networks 1 Zun Wang 2 Abstract. In order to solve the problems
More informationThe Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1,
More informationConstruction Scheme for Cloud Platform of NSFC Information System
, pp.200-204 http://dx.doi.org/10.14257/astl.2016.138.40 Construction Scheme for Cloud Platform of NSFC Information System Jianjun Li 1, Jin Wang 1, Yuhui Zheng 2 1 Information Center, National Natural
More informationResearch on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines
DOI: 10.23977/acss.2019.31002 EISSN 2371-8838 Advances in Computer, Signals and Systems (2019) 3: 8-14 Clausius Scientific Press, Canada Research on WSN Secure Communication Method Based on Digital Watermark
More informationA Study of Smartphone Based Disaster Information Reporting System under Disaster Environment
, pp. 45-52 http://dx.doi.org/10.14257/ijsh.2015.9.1.05 A Study of Smartphone Based Disaster Information Reporting System under Disaster Environment Yin Baoquan 1,2, Sun Ruizhi 1 and Yang Hongjun 1 1.
More informationSecurity Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13
Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in
More informationIntegration of information security and network data mining technology in the era of big data
Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The
More informationAnalyzing and Improving Load Balancing Algorithm of MooseFS
, pp. 169-176 http://dx.doi.org/10.14257/ijgdc.2014.7.4.16 Analyzing and Improving Load Balancing Algorithm of MooseFS Zhang Baojun 1, Pan Ruifang 1 and Ye Fujun 2 1. New Media Institute, Zhejiang University
More informationFault Diagnosis of Wind Turbine Based on ELMD and FCM
Send Orders for Reprints to reprints@benthamscience.ae 76 The Open Mechanical Engineering Journal, 24, 8, 76-72 Fault Diagnosis of Wind Turbine Based on ELMD and FCM Open Access Xianjin Luo * and Xiumei
More informationAnalysis and Research on the Big Data Security Based on Cloud Platform. Bo Yang1, a
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Analysis and Research on the Big Data Security Based on Cloud Platform Bo Yang1, a 1 Beijing Earthquake
More informationMubug: a mobile service for rapid bug tracking
. MOO PAPER. SCIENCE CHINA Information Sciences January 2016, Vol. 59 013101:1 013101:5 doi: 10.1007/s11432-015-5506-4 Mubug: a mobile service for rapid bug tracking Yang FENG, Qin LIU *,MengyuDOU,JiaLIU&ZhenyuCHEN
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 e-issn (O): 2348-4470 p-issn (P): 2348-6406 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 A SURVEY
More informationPrediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai He 1,c
2nd International Conference on Electrical, Computer Engineering and Electronics (ICECEE 215) Prediction of traffic flow based on the EMD and wavelet neural network Teng Feng 1,a,Xiaohong Wang 1,b,Yunlai
More informationProcessing Technology of Massive Human Health Data Based on Hadoop
6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Processing Technology of Massive Human Health Data Based on Hadoop Miao Liu1, a, Junsheng Yu1,
More informationBattery Energy Storage System Information Modeling Based on IEC 61850
Journal of Power and Energy Engineering, 2014, 2, 233-238 Published Online April 2014 in SciRes. http://www.scirp.org/journal/jpee http://dx.doi.org/10.4236/jpee.2014.24033 Battery Energy Storage System
More informationDesign and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System
Design and Implementation of Real-Time Data Exchange Software of Maneuverable Command Automation System Shi Chuan, Zhang Yang and Zhou Yuefei 1 Introduction Command automation system provides an effective
More informationVarious Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi 2 M. Navinkumar 3
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Various Attribute Based Encryption Algorithms in Clouds-A Survey P. Sivakumar 1 K. Devi
More informationResearch on the Knowledge Representation Method of Instance Based on Functional Surface
5th International Conference on Advanced Engineering Materials and Technology (AEMT 2015) Research on the Knowledge Representation Method of Instance Based on Functional Surface Pengjie Zhai a, Changqing
More informationInsecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme
2014 Tenth 10th International Conference on Computational Intelligence and Security Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme Changji Wang, Haitao
More informationDesign of Coal Mine Power Supply Monitoring System
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design of Coal Mine Power Supply Monitoring System Lei Shi 1, Guo Jin 2 and Jun Xu 3 1 2 Department of electronic
More informationAn Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database
Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management
More informationConcealing Information in Images using Progressive Recovery
Concealing Information in Images using Progressive Recovery Pooja R 1, Neha S Prasad 2, Nithya S Jois 3, Sahithya KS 4, Bhagyashri R H 5 1,2,3,4 UG Student, Department Of Computer Science and Engineering,
More informationDelegation Scheme based on Proxy Re-encryption in Cloud Environment
Vol.133 (Information Technology and Computer Science 2016), pp.122-126 http://dx.doi.org/10.14257/astl.2016. Delegation Scheme based on Proxy Re-encryption in Cloud Environment You-Jin Song Department
More informationWireless Smart Home Security System Based on Android
2017 2 nd International Conference on Artificial Intelligence and Engineering Applications (AIEA 2017) ISBN: 978-1-60595-485-1 Wireless Smart Home Security System Based on Android LIANGYU CHEN, SEN ZHANG
More informationDesign and Implementation of Remote Medical Monitoring System for. Homecare
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design and Implementation of Remote Medical Monitoring System for Homecare Juan Zhong1, a, * Hua Liao2, b 1 College
More informationCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY CONTENT Introduction Problem statements Literature Review Existing system Proposed system Application Conclusion Future work MOTIVATIONS
More information