ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM
|
|
- Edgar Richard
- 5 years ago
- Views:
Transcription
1 ENSURING PRIVACY OF E-MEDICAL HEALTH RECORDS USING TRIPLE- DES ALGORITHM Ms. S. P. Vidhya Priya 1, Dharani.N.R 2, Gokilavani.M 3, Jeevitha.R 4 1,2,3,4 Department of Information Technology, Kathir College Of Engineering, Coimbatore. Abstract :Cloud computing is an Internet based network made up of large number of servers-mostly based on open standards, modular and inexpensive. Cloud assisted health data considerably facilitates secure and efficient patient treatment. The purpose of this health networking project is to fix appointments for the patient either through online communication or offline communication directly to the respective specialized doctor. Security is an important aspect of Quality of Services, in cloud computing. The server could convert the encrypted index of the patient into a re-encrypted form, in Proxy re-encryption (PRE) method. On account of using PRE method in the active system, plaintext attacks occur. To overcome all the shortcut attacks, the planned model (ESTHD) uses Enhanced Triple-DES algorithm that has proven reliability, longer key length and improve the security in billions of time. This system outperforms the previous schemes in terms of privacy, security, computational and communication overhead. Keywords- Proxy Re-encryption, Plaintext attacks, Triple-DES, Privacy, Security, communication. I. INTRODUCTION Cloud Computing is an essential evolution where in Information Technology (IT) is used and applied. In Cloud Computing paradigm, there are no limits to accessing information or sources to the consumer. User only needs the internet to access the resources from all over the world. It provides user-friendly access without worrying about inside operations. Nowadays, the Healthcare industry is also using online services through the websites and telemedicine consultations like other industries. Nevertheless, the patient physical visits are also necessary. People related to healthcare like patients and doctors or agencies like drugstores and insurance organizations are transferring data day-to-day. For example, the insurance corporations are increasing business only when using online services. Various techniques have been protecting the data contents privacy via access control. Identity-based encryption (IBE), in which the sender of a message can specify an identity such that only a receiver with matching identity can decrypt it. Few years later, Fuzzy Identity-Based Encryption, which is also known as Attribute- Based Encryption (ABE). In such encryption scheme, an identity is viewed as a set of descriptive attributes, and decryption is possible if a decrypt s identity has some overlaps with the one specified in the cipher text. Soon after, more general treebased ABE schemes, Key-Policy Attribute-Based Encryption (KP-ABE) and Cipher text-policy Attribute- Based Encryption (CP-ABE) are presented to express more general condition than simple overlap. They are counterparts to each other in the sense that the decision of encryption policy (who can or cannot decrypt the message) is made by different parties. A) Security issues in HMS Cloud Computing assures both Healthcare providers and patients to store EHRs and manage Healthcare services in Clouds. Nevertheless, this choice may influence various security issues: Maintaining EHRs accessing, sharing, processing and storing in Cloud. Key generation problem that is key escrow issue. User revocation and forward/backward secrecy. Cloud Computing provides several benefits along with some special threats to medical data security and privacy in real-time. Various methods were introduced to solve above mentioned issues. DOI : /IJRTER ZFRNX 201
2 Identity-Based Encryption (IBE) scheme, here, the owner sends data with identities. However, a user converts it into plain text only if he knows the identities. Continued with Fuzz-IBE, it is also known as ABE. Here, identities are the set of attributes described by the owner at that time encryption and decryption are possible only if the user satisfies attributes. Later, very common tree based ABE systems and CP-ABE were proposed to expose simple overlap conditions. B) Security Requirements of EHRs in cloud Currently, the Healthcare system focused on obtaining the EHRs without any time and location limitations. The cloud computing is the solution to address this issue. Notwithstanding the reality of the Cloud advantages, it additionally involves specific issues to the EHRs secrecy and safety. The privacy preserving approach is better than managing confidentiality of EHRs. The requirements of CHMS are as follows: Integrity this requirement fulfils the originality of the data that is captured by the system. The EHRs should not contain any faults like software or hardware errors or human mistakes. The data must be correct. Confidentiality this requirement offers the patient to restrict accessing of EHRs from unauthorized users. Therefore, the patients need not to worry about illegal access. Authenticity this requirement fulfils the verification of identities of the user before permitting data access. In CHMS, doctors, patients and others should be verified before accessing the information. This verification scheme is performed by using their attributes. Accountability this feature offers to monitor the activities of entities. Therefore, the patients can easily monitor their health data access activities at many places like insurance companies, hospitals etc. II. MODULES Doctor Details Patient Details Admin Details Encrypting and decrypting the article Send mail alert Doctor Details Once the Doctor login into the application can able to view the patient details. The main objective of the doctor is to send appointment to the patient through an application or intimate through mail. Maintaining treatment details for the patient. Publish article for the new disease. Those articles should be encrypted using Triple DES Algorithm and stored in database server. Doctor visiting first time, should fill the details in doctor registration page. Providing suggestion to choose the hospital to claim the insurance. Patient Details Once the patient login into the application. Able to view the doctor details. Request appointment to the doctor and view appointment details which was sent by doctor and view hospital details. Getting suggestion from the doctor to visit hospital for a particular disease to claim the insurance. Reading treatment details for the particular disease directly from the article itself. Patient visiting first time to the hospital, should fill the details in patient registration page. Admin Details Able to view the patient and doctor details. Monitoring the keys which was entered by user in the search box. If the search key is new the admin will intimate those information to the particular specialist. Based on the patient registered information, the admin will contact the subscribed users for to intimate the donor details. Able to view all appointment details which was sent by All Rights Reserved 202
3 Encrypting and decrypting the article Doctor uploading an article to the server. For more security purpose we encrypting an article using Triple DES algorithm. Those encrypted document will be stored in database server. User will decrypt the document using same Triple DES algorithm, to view about the treatment details from the article. Send mail alert Using SMTP (Simple Mail Transfer Protocol) doctor sending an appointment details to the patient in case of emergency situations. Suggesting insurance claims details for the particular disease and intimating to the patient through mail. Finally generating the crystal report for the patient with unique id. III. LITERATURE SURVEY Hsiao-Ying et al [7] proposed a scheme for forwarding the data to another user securely by ensuring data robustness, confidentiality by ensuring that the data owner has full control over the data to be forwarded to another user. This scheme uses decentralized erasure code so that the message is not under the security risk since it is encrypted and split into multiple blocks and stored in distributed storage server. This scheme tries to address the problem like maintenance of secret keys by the user, reduces communication traffic, and resolves the disadvantage of storage server of supporting other functionalities. The system model consists of highly distributed multiple key servers and storage server. In this scheme the operations encoding, encryption and data forwarding are integrated tightly. This scheme uses proxy re-encryption, which is understood as follows: When a user A transfers his data user B using his public key, creates re-encryption key and sends it to the proxy server. Here the proxy server is unaware of the original text message. The researcher has integrated encryption, re-encryption and the encoding techniques together, for improving storage robustness. This scheme reduces the communication cost and communication overhead. The re-encryption key is computed by the combination of User A secret key and User B public key. Failure system recovery is done by using additional storage server. The additional server obtains the encrypted units by querying remaining unaffected servers. This scheme uses multiplicative holomorphic encryption method which supports data encoding over encrypted message. Guiseppe et al [8] proposed an interactive protocol called Proofs of storage (PoS) which enables the client to ensure trustworthy storage of his file with the server. By using any identification protocol as a base, the researchers have constructed a framework for computing which can be used for numerous times of verifications. Here the file size and the size of client s state and the communication complexity are independent. This system ensures whether the complete file sent by the client is stored as it is in the server, so that the client tags each segment of the file and stores it to the server. For verifying the storage, the client sends challenge to the server; the server returns the challenge vector and the file segment along with the tag. Bo Chen et al [9] proposed Remote Data Checking (RDC) scheme for improving robustness, in the case of insecure cloud storage provider. This scheme uses Cauchy matrices to determine the Reed- Solomon codes since they are compatible to dynamic operations. Wang et al [10] proposed a third-party auditor (TPA) to check the integrity of data, in order to reduce the overhead for the client to check the data integrity. In this method the TPA is designed in such a way that he performs multiple auditing tasks simultaneously. By improvising the existing proof of storage techniques this scheme also supports dynamic data operations. Block tag authentication is achieved by constructing Merkie Hash tree. Shiuan- Tzuo et al [11] proposed a scheme for checking the integrity of messages stored in cloud storage. The owner of the message holds the full control to decide the authorized persons to check the integrity of data; hence this method prevents re-delegation from delegated verifiers. The user uploads delegation key, integrity verification tags and the data to the storage server. The All Rights Reserved 203
4 storage server uses the delegation key to transform the data tag which is in the form such that the delegated verifier can check using its private key. This scheme uses random oracle model. IV. METHODOLOGIES (A) Existing method Proxy re-encryption is a cryptographic primitive which translates cipher texts from one encryption key to another encryption key. It can be used to forward encrypt messages without having to expose the clear texts to the potential users. The re-encryption protocol should be key independent to avoid compromising the private keys of the sender and the recipient. The primary advantage of this PRE scheme is that they are unidirectional (i.e., Alice can delegate to Bob without Bob having to delegate to her) and do not require delegators to reveal their entire secret key to anyone. A proxy reencryption algorithm transforms a cipher text under a public key PKA to cipher text PKB by using the re-encryption key RK A B. The server does not know the corresponding clear text, where PKA and PKB can only be decrypted by different key KA and KB respectively. Proxy re-encryption has many applications in addition to the previous proposals for forwarding, secure network file storage, and performing cryptographic operations on storage limited devices. (B) Re-dt ECK system architecture There are three types of entities: an information owner, users and a data centre. The data owner wants to store his private EHR files on a third-party database. He extracts keywords from the EHR files and encrypts those plaintext keywords into the secure searchable indices. The EHR files are encrypted to cipher text. Then, that information is outsourced to the data centre. A data centre consists of an EHR storage provider and a search server. The storage provider is responsible for storing data and search server performs search/add/delete operations according to users requests. A user generates a trapdoor to search the EHR files using his private key and sends it to the search servers. After receiving the request, the search servers interact with the EHR storage provider to find the matched files and returns those retrieved information to the user in an encrypted form. Fig.1.Re-dtPECK System architecture In an existing system (Re-dtPECK), proxy re-encryption (PRE) method is used. In proxy reencryption method, the messages are first encrypted by the owner and then stored in a storage server. When a user wants to share their messages, user sends a re-encryption key to the storage server. The storage server re-encrypts the encrypted messages for the authorized user. Thus, their system has data confidentiality and supports the data forwarding function. An encryption scheme is multiplicative homo-morphic, if it supports a group operation on encrypted plaintexts without decryption. The multiplicative homo-morphic encryption scheme supports the encoding operation over encrypted messages. But this scheme provides chosen plaintext attack that presumes that attacker can obtain the cipher texts for arbitrary All Rights Reserved 204
5 A third-party server inside hackers can be able to leak the information and security records to other people. So this scheme is not fully trust. In order to overcome this problem, proposed system uses Enhanced Triple-DES algorithm that prevents all the shortcut attacks because of longer key length and improve the security in billions of time. Enhanced Triple-DES algorithm is faster than other encryption schemes. C) Proposed system Architecture In this system, there are three types of entities: users (patients), doctors, and admin. The user wants to store the private health record files on a third-party database. They extract keywords from health record files and encrypt those plaintext keywords into the secure searchable indices. The health record files are encrypted to cipher text. Then, that information is stored to the cloud server. Fig.2. ESTHD System Architecture The doctor publish article for the new disease those articles should be encrypted using Enhanced Triple DES algorithm and stored in database server. User can be able to decrypt the articles from the database server and request appointment to the doctor and view appointment details which was sent by doctor. Then doctor fix the appointment to the patient. Admin monitor the activities of both users and doctors, also monitoring the keys which are entered by user in the search box. D) Workflow of the ESTHD System In ESTHD system, Enhanced Triple DES algorithm is used. In this, first article content is encrypted using effective key length of 192 bit. Hash code is generated for key using MD5 algorithm. Encrypted articles are uploaded to the Database Server. If user wants the article, they decrypt the article using Enhanced Triple DES algorithm. In decryption, also hash code is generated for the key using MD5. V. ALGORITHM Triple-DES Algorithm Standard: The 3-Data Encryption Standard (3DES) is a variation of DES that is composed of 3parts. It is slower than the regular DES but it can improve security in billions of times. Triple DES uses three 64-bit keys, so in total it uses an overall key length of 168 bits, the first part of the process is a regular DES encryption, and then the second part is a DES decryption and at last it uses a DES encryption again. It uses 3 different keys. Since it is based on the DES algorithm, it is very easy to modify existing software to use Triple All Rights Reserved 205
6 It also has the advantage of proven reliability and a longer key length that eliminates many of the shortcut attacks. Fig.3. Implementation of Triple-DES (3DES) Triple DES Encoding Triple DES algorithm uses three iterations of common DES cipher. It receives a secret 168- bit key, which is divided into three 56-bit keys. Encryption using the first secret key Decryption using the second secret key Encryption using the third secret key Encryption: c = E3 (D2 (E1 (m))) Triple DES Decoding Using decryption in the second step during encryption provides backward common DES algorithm. Decryption using the first secret key Encryption using the second secret key Decryption using the third secret key Decryption: m = D1 (E2 (D3(c))) compatibility with VI. CONCLUSION The internet usage and network system is growing rapidly. So there are some additional requirements to secure the data transmitted over different networks using different services. To afford the security to the network and data different encryption methods are used. According to the literature survey can be found that Enhanced TRIPLE-DES algorithm is most efficient in terms of speed, time, security and throughput effect. The limitation of the new improver algorithm is memory used in new method is higher than the old method. This is because of the algorithms which we have used is providing a very high security. The Security provided by these algorithms can be enhanced further. Future work will explore this concept, combination of other algorithms will be applied either sequentially or parallel and will reduce the time taken to encrypt the document. It is a flexible solution for any cryptographic system and security layers of wireless protocol. It will provide a combination of cryptographic algorithms, to setup a more secure environment for data storage and All Rights Reserved 206
7 REFERENCES [1] Richard K. Lomotey, Mobile Medical Data Synchronization on Cloud-Powered Middleware Platform, Pennsylvania State University, USA, (2016) [2] A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology. Berlin, Germany: Springer-Verlag, (1985) [3] A. Sahai and B. Waters, Fuzzy identity-based encryption, in Advances in Cryptology. Berlin, Germany: Springer- Verlag, (2005) [4] V. Goyal, O. Pandey, A. Sahai, and B. Waters, Attribute-based encryption for fine-grained access control of encrypted data, in Proc. 13th CCS,(2006) [5] J. Bethencourt, A. Sahai, and B. Waters, Cipher text-policy attribute based encryption, in Proc. IEEESP,(2007) [6] A. Sahai et al. Fuzzy Identity-Based Encryption, ProceedingsInt. Conf. Theory and Allocations of Cryptographic Techniques (Euro crypt 05)(2005) [7] H.-Y. Lin and W.-G. Tzeng, A secure decentralized erasure code for distributed networked storage, IEEE Trans. Parallel Disturb. Syst., vol. 21, no. 11, pp , Nov [8] B. Chen, R. Curtmola, G. Ateniese, and R. Burns, Remote data checking for network coding-based distributed storage systems, in Proc. 2nd ACM Workshop Cloud Computing Security (CCSW'10), 2010, pp [9] B. Chen and R. Curtmola, Robust dynamic remote data checks for public clouds, in Proc. 19th ACM Conf. Computer and Common. Security (CCS'12), 2012, pp [10] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, Enabling public auditability and data dynamics for storage security in cloud computing,ieee Trans. Parallel Disturb. Syst., vol. 22, no. 5, pp , May [11] S.-T. Sheen and W.-G. Tzeng, Delegable provable data possession for remote data in the clouds, in Proc. 13th Int. Conf. Information and Common. Security (ICICS'11), 2011, pp. 93 All Rights Reserved 207
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems.
A compact Aggregate key Cryptosystem for Data Sharing in Cloud Storage systems. G Swetha M.Tech Student Dr.N.Chandra Sekhar Reddy Professor & HoD U V N Rajesh Assistant Professor Abstract Cryptography
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationA Survey on Secure Sharing In Cloud Computing
A Survey on Secure Sharing In Cloud Computing Aakanksha maliye, Sarita Patil Department of Computer Engineering, G.H.Raisoni College of Engineering & Management, Wagholi, India ABSTRACT: Cloud computing
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationISSN Vol.08,Issue.16, October-2016, Pages:
ISSN 2348 2370 Vol.08,Issue.16, October-2016, Pages:3146-3152 www.ijatir.org Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation VEDIRE AJAYANI 1, K. TULASI 2, DR P. SUNITHA
More informationISSN: [Shubhangi* et al., 6(8): August, 2017] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DE-DUPLICABLE EFFECTIVE VALIDATION of CAPACITY for DYNAMIC USER ENVIRONMENT Dr. Shubhangi D C *1 & Pooja 2 *1 HOD, Department
More informationEnhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms
Enhancing Reliability and Scalability in Dynamic Group System Using Three Level Security Mechanisms A.Sarika*1, Smt.J.Raghaveni*2 M.Tech Student, Dept of CSE, S.R.K.R Engineering college, Bhimavaram, AP,
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationAvailable online at ScienceDirect. Procedia Computer Science 48 (2015 ) (ICCC-2014) (ICCC-2015)
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 48 (2015 ) 347 352 International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015) (ICCC-2014)
More informationA Procedural Based Encryption Technique for Accessing Data on Cloud
A Procedural Based Encryption Technique for Accessing Data on Cloud Avinash N 1, Divya C 2 P.G. Student, Department of Computer Science and Engineering, SVIT, Bangalore, Karnataka, India 1 Assistant Professor,
More informationEFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE
EFFICIENT DATA SHARING WITH ATTRIBUTE REVOCATION FOR CLOUD STORAGE Chakali Sasirekha 1, K. Govardhan Reddy 2 1 M.Tech student, CSE, Kottam college of Engineering, Chinnatekuru(V),Kurnool,Andhra Pradesh,
More informationAES and DES Using Secure and Dynamic Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationConjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud
Conjunctive Keyword Search with Designated Tester and Timing Enabled Proxy Re-Encryption Function for Electronic Health Cloud Mrs. Rashi Saxena 1, N. Yogitha 2, G. Swetha Reddy 3, D. Rasika 4 1 Associate
More informationS. Indirakumari, A. Thilagavathy
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 5.302 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 3, March-2018 Key Aggregate Tagged File Searching(KATFS)
More informationUser Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe
User Revocation And Fine Grained Access Control Of Phr In Cloud Using Hasbe T.Radhika 1, S.Vasumathi Kannagi 2 P.G.Scholar, Department of CSE, Info Institute of Engineering, Coimbatore, India 1 Assistant
More informationDECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE
DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority
More informationThree Levels of Access Control to Personal Health Records in a Healthcare Cloud
Three Levels of Access Control to Personal Health Records in a Healthcare Cloud Gabriel Sanchez Bautista and Ning Zhang School of Computer Science The University of Manchester Manchester M13 9PL, United
More informationEfficient Data Storage Security with Multiple Batch Auditing in Cloud Computing
Efficient Data Storage Security with Multiple Batch Auditing in Cloud Computing P. Sukumar [1] Department of Computer Science Sri Venkateswara College of Engineering, Chennai B. Sathiya [2] Department
More informationSecure Data Storage and Data Retrieval in Cloud Storage using Cipher Policy Attribute based Encryption
Indian Journal of Science and Technology, Vol 8(S9), 318 325, May 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 DOI: 10.17485/ijst/2015/v8iS9/65600 Secure Data Storage and Data Retrieval in Cloud
More informationInternational Journal of Advanced Research in Computer Science and Software Engineering
Volume 3, Issue 3, March 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reliable Proxy
More informationHIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES
HIGH LEVEL SECURITY IMPLEMENTATION IN DATA SHARING ON SOCIAL WEBSITES P.Senthil Kumar 1 Associate professor, PSNA college of engineering and technology,dindigul,tamilnadu,india Abstract: With the recent
More informationEnhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage
Enhancing Availability Using Identity Privacy Preserving Mechanism in Cloud Data Storage V.Anjani Kranthi *1, Smt.D.Hemalatha *2 M.Tech Student, Dept of CSE, S.R.K.R engineering college, Bhimavaram, AP,
More informationDynamic and Flexible Group Key Generation Based on User Behaviour Monitoring
International Journal of Computing Academic Research (IJCAR) ISSN 2305-9184, Volume 5, Number 1 (February 2016), pp.27-32 MEACSE Publications http://www.meacse.org/ijcar Dynamic and Flexible Group Key
More informationABSTRACT I. INTRODUCTION. Telangana, India 2 Professor, Department of Computer Science & Engineering, Shadan College of Engineering & Technology,
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 Secure Proxy Server Data Sharing Scheme in Hybrid
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationSharing of PHR s in Cloud Computing
86 Sharing of PHR s in Cloud Computing Dussa Manasa K.Rajesh Khanna In Cse Dept, Vaagdevi Engineering college, Warangal, Andhra Pradesh, India Abstract Personal health records (PHRs) grant patients access
More informationSecure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code
Secure Auditing For Outsourced Data in Cloud Using Homomorphic Token and Erasure Code N.S. Monalisa Devi 1, T. Sounder Rajan 2 M.E. Department of CSE, K S R College for Engineering and Technology, Tiruchengode,
More informationEfficient integrity checking technique for securing client data in cloud computing
International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 43 Efficient integrity checking technique for securing client data in cloud computing Dalia Attas and Omar Batrafi Computer
More informationVolume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 7.327 Volume 6, Issue 1, January 2018 International Journal of Advance Research in Computer Science and Management Studies Research Article /
More informationEfficient Auditable Access Control Systems for Public Shared Cloud Storage
Efficient Auditable Access Control Systems for Public Shared Cloud Storage Vidya Patil 1, Prof. Varsha R. Dange 2 Student, Department of Computer Science Dhole Patil College of Engineering, Pune, Maharashtra,
More informationTime-Based Proxy Re-encryption Review
Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL
ROBUST AND ANONYMOUS AUTHENTICATION OF DATA STORED IN CLOUDS WITH DECENTRALIZED ACCESS CONTROL S.Vijaya Madhavi 1, G.Rama Subba Reddy 2 1 M.tech Scholar (CSE), 2 Headof Department (CSE), Vignana Bharathi
More informationSECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM. SRM University, Chennai
Volume 115 No. 6 2017, 689-695 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu SECURE SHARING OF DATA IN PRIVATE CLOUD BY RSA OAEP ALGORITHM S. Selvakumar
More informationA Simple Secure Auditing for Cloud Storage
A Simple Secure Auditing for Cloud Storage Lee-Hur Shing Institute of Information Science Academia Sinica leehurs@iis.sinica.edu.tw Marn-Ling Shing University of Taipei Yu-Hsuan Yeh, Yan-Zhi Hu and Shih-Ci
More informationImplementation of IBE with Outsourced Revocation technique in Cloud Computing
Implementation of IBE with Outsourced Revocation technique in Cloud Computing M.MOHANRAO, POCKLA PAVANI Assistant Professor, M.TECH STUDENT Dept of CSE,Megha Institute of Engineering & Technology For womens,edulabad,ghatkesar
More informationOn the Security of Group-based Proxy Re-encryption Scheme
On the Security of Group-based Proxy Re-encryption Scheme Purushothama B R 1, B B Amberker Department of Computer Science and Engineering National Institute of Technology Warangal Warangal, Andhra Pradesh-506004,
More informationA LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE
A LTERATURE SURVEY ON REVOCABLE MULTIAUTHORITY CIPHER TEXT-POLICY ATTRIBUTE-BASED ENCRYPTION (CP-ABE) SCHEME FOR CLOUD STORAGE Vinoth Kumar P, Dr.P.D.R. Vijaya Kumar 1 PG Student, INFO Institute of Engineering,
More informationSecure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSecure Data De-Duplication With Dynamic Ownership Management In Cloud Storage
Secure Data De-Duplication With Dynamic Ownership Management In Cloud Storage 1 A. Sumathi, PG Scholar, Department Of Computer Science And Engineering, Maha Barathi Engineering College, Chinna Salem, Villupuram,
More informationADVANCES in NATURAL and APPLIED SCIENCES
ADVANCES in NATURAL and APPLIED SCIENCES ISSN: 1995-0772 Published BY AENSI Publication EISSN: 1998-1090 http://www.aensiweb.com/anas 2016 May 10(5): pages 223-227 Open Access Journal An Efficient Proxy
More informationSession Based Ciphertext Policy Attribute Based Encryption Method for Access Control in Cloud Storage
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 09 (September. 2014), V3 PP 21-25 www.iosrjen.org Session Based Ciphertext Policy Attribute Based Encryption
More informationInternational Journal of Advance Engineering and Research Development. AN Optimal Matrix Approach for virtual load allocation and data sharing
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 02, February -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 AN
More informationAoT: Authentication and Access Control for the Entire IoT Device Life-Cycle
AoT: Authentication and Access Control for the Entire IoT Device Life-Cycle Noura Alomar November 7th, 2018 1 AoT The AoT paper is one of the earliest and most cited papers on IoT defense and it considers
More informationPublic Auditing on Shared Data in the Cloud Using Ring Signature Mechanism
Public Auditing on Shared Data in the Cloud Using Ring Signature Mechanism MS. Gayatri D Patwardhan Prof.B. W. Balkhande Abstract: Cloud computing is the long dreamed vision of computing as a utility,
More informationTHIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA
THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing
More informationDelegating Auditing Task to TPA for Security in Cloud Computing
Delegating Auditing Task to TPA for Security in Cloud Computing 1 Nallam Gowri, 2 D.Srinivas 1,2Dept. of CSE,Kakinada Institute of Engineering & Technology, Korangi, e.g.dt,ap, India Abstract: This paper
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationHIPAA AND SECURITY. For Healthcare Organizations
HIPAA AND EMAIL SECURITY For Healthcare Organizations Table of content Protecting patient information 03 Who is affected by HIPAA? 06 Why should healthcare 07 providers care? Email security & HIPPA 08
More informationImplementation of Decentralized Access Control with Anonymous Authentication in Cloud
Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud
More informationIMPLEMENTATION OF E-HEALTH CLOUD SYSTEM USING TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION (RE-DTPECK)
IMPLEMENTATION OF E-HEALTH CLOUD SYSTEM USING TIMING ENABLED PROXY RE-ENCRYPTION FUNCTION (RE-DTPECK) U.Sarath priyan 1, K.Gunasekaran 2 ABSTRACT: E-Health record system is a major application which provides
More informationQUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING
QUALITY OF SEVICE WITH DATA STORAGE SECURITY IN CLOUD COMPUTING ABSTRACT G KALYANI 1* 1. M.Tech Student, Dept of CSE Indira Institute of Engineering and Technology, Markapur, AP. Cloud computing has been
More informationAn Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara
An Efficient Verifiable Multi-Authority Secret Access control scheme in Cloud Storage M.Sreelakshmi & P.Gangadhara 1 M.Tech, Dept of CSE,Shri Shirdi Sai Institute of Science and Engineering, Affiliated
More informationABSTRACT. Keywords: Cloud Storage, Regenerating Code, Public Auditing, Dynamic Auditing, Privacy Preserving, Proxy I. INTRODUCTION
216 IJSRSET Volume 2 Issue 4 Print ISSN : 2395-199 Online ISSN : 2394-499 Themed Section: Engineering and Technology Privacy Preserving and Dynamic Auditing for Outsourced Storages in Cloud Satish Shelar*,
More informationFine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing
wwwijcsiorg 10 Fine-Grained Data Sharing Supporting Attribute Extension in Cloud Computing Yinghui Zhang 12 1 National Engineering Laboratory for Wireless Security Xi'an University of Posts and Telecommunications
More informationSystem Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure Clouds
System Approach for Single Keyword Search for Encrypted data files Guarantees in Public Infrastructure s B.Nandan 1, M.Haripriya 2, N.Tejaswi 3, N. Sai Kishore 4 Associate Professor, Department of CSE,
More informationBlowfish Algorithm with Verifiable Outsourced in Cloud Computing
Blowfish Algorithm with Verifiable Outsourced in Cloud Computing 1 Bawya.M, PG scholar/cse, Tagore Institute of Engineering and Technology, aglya08@gmail.com 2 Raja.K, Assistant Professor/CSE, Tagore Institute
More informationLOAD BALANCING AND DEDUPLICATION
LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such
More informationPreserving Data Integrity in Cloud Storage
Preserving Data Integrity in Cloud Storage Jegadeesan.K 1, Sivakumar.K 2 M.E, Department of CCE, Erode Builder Educational Trust s Group of Institutions, Kangayam, Tamilnadu, India 1 M.E, Department of
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been
More informationRemote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store
Remote Data Checking: Auditing the Preservation Status of Massive Data Sets on Untrusted Store Randal Burns randal@cs.jhu.edu www.cs.jhu.edu/~randal/ Department of Computer Science, Johns Hopkins Univers
More informationCloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An
Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In
More informationSecurity Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13
Security Weaknesses of an Anonymous Attribute Based Encryption appeared in ASIACCS 13 Payal Chaudhari, Manik Lal Das, Anish Mathuria DA-IICT, Gandhinagar, India {payal chaudhari, maniklal das, anish mathuria}@daiict.ac.in
More informationEFFICIENT REVOCATION AND SECURE ATTRIBUTE-BASED PROXY RE-ENCRYPTION SCHEME
EFFICIENT REVOCATION AND SECURE ATTRIBUTE-BASED PROXY RE-ENCRYPTION SCHEME MAHESH S. GUNJAL 1, Dr. B. L. GUNJAL 2 1PG Student, Dept. of Computer Engineering, AVCOE, Maharashtra, India 2Associate Professor,
More informationSecure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing
ISSN No: 2454-9614 Secure Data Sharing using Attribute Based Encryption with Revocation in Cloud Computing *Corresponding Author: D. Vaduganathan E-mail:vaduganathan.kce@gmail.com D. Vaduganathan a a)
More informationGroup User Revocation in Cloud for Shared Data
Group User Revocation in Cloud for Shared Data Mahesh Salunke, Harshal Meher, Ajay Tambe, Sudir Deshmukh,Prof.Sanjay Agarwal Abstract With the excessive use of internet cloud has received much of the attention.
More informationHIPAA Compliance & Privacy What You Need to Know Now
HIPAA Email Compliance & Privacy What You Need to Know Now Introduction The Health Insurance Portability and Accountability Act of 1996 (HIPAA) places a number of requirements on the healthcare industry
More informationENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2,
ENCRYPTED KEY SEARCHING FOR DATA SHARING OVER GROUPS IN THE CLOUD STORAGE THEJA #1, GARREPALLI PRASAD #2, DEPARTMENT OF CSE SAHAJA INSTITUTE OF TECHNOLOGY & SCIENCES FOR WOMEN, KARIMNAGAR ABSTRACT: The
More informationDAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems
1790 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 8, NO. 11, NOVEMBER 2013 DAC-MACS: Effective Data Access Control for Multiauthority Cloud Storage Systems Kan Yang, Associate Member,
More informationFine-Grained Data Updates on Cloud with Authorized Public Auditing
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 03, 2015 ISSN (online): 2321-0613 Fine-Grained Data Updates on Cloud with Authorized Public Auditing Sindhu L 1 Ms Leelavathi
More informationEfficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage
Efficient Access Control Scheme with Multiple Attribute Authorities for Public Cloud Storage Mr. Ramesh 1, Prof. Girish Kumar D 2, Student, M.tech(Computer Networking) 1,, Assistant Professor, Computer
More informationDATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION
DATA SECURITY IN CLOUDS USING DECENTRALIZED ACCESS CONTROL, ANONYMOUS AUTHENTICATION AND RSA BASED ENCRYPTION 1 VARALATCHOUMY.M, 2 PRATEEK. S. BHARADWAJ, 3 R. ROHITH, 4 NAGACHANDRA. K. P, 5 PRAVEEN. M
More informationSTRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 STRUCTURED EMINENT DYNAMIC AUDITING FOR SECURE DATA STORAGE IN CLOUD COMPUTING Mr.Elamparithi P 1, Mr.Thanga Mariappan
More informationENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING
ENCRYPTED DATA MANAGEMENT WITH DEDUPLICATION IN CLOUD COMPUTING S KEERTHI 1*, MADHAVA REDDY A 2* 1. II.M.Tech, Dept of CSE, AM Reddy Memorial College of Engineering & Technology, Petlurivaripalem. 2. Assoc.
More informationCSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L
CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any
More informationDecentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav
Decentralized Anonymous Authentication of Data Stored in Clouds Praveen.N, Krishna Kumar.P.R, Vinitha V Yadav Abstract: Distributed computing is area that permits clients to store the information. Distributed
More informationAccountability in Distributed Environment For Data Sharing in the Cloud
Accountability in Distributed Environment For Data Sharing in the Cloud K.Neeraja B.Savitha Reddy D. Rajani JNTU Hyderabad JNTU Hyderabad JNTU Hyderabad Hyderabad, India Hyderabad, India Hyderabad, India
More informationMANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY
MANAGING OF CLOUD STORAGE AUDITING FOR DATA INTEGRITY GARNEPALLI MOUNIKA 1, N.SANTHOSH RAMCHANDER 2 M. Tech Student, CSE, SVS Group of Institutions, Warangal, TS 1 M.Tech (Ph.D) Assoc. Prof, CSE Dept,
More informationIssues. Separation of. Distributed system security. Security services. Security policies. Security mechanism
Module 9 - Security Issues Separation of Security policies Precise definition of which entities in the system can take what actions Security mechanism Means of enforcing that policy Distributed system
More informationIntegrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services
Integrating OpenID with proxy re-encryption to enhance privacy in cloud-based identity services David Nuñez, Isaac Agudo, and Javier Lopez Network, Information and Computer Security Laboratory (NICS Lab)
More informationIJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online):
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 10, 2015 ISSN (online): 2321-0613 Determining Security and Efficiency of PHR using Different Algorithms with Attribute
More informationSDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data
SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,
More informationA Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach
A Review on Secure Multi Owner Multi-keyword Ranked Search Scheme Over Encrypted Cloud Data By Using 3DES Approach Mr Vaibhav Sawalkar 1,Prof.Megha Singh 2 1 MTECH Student,Dept of Computer Science, CIIIT
More informationFortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE
Fortified and Revocable Access Control for Multi- Authority Cloud Storage using CPABE Bhuvaneswari Thangaraj PG scholar, Maharaja Engineering College, Avinashi, India, S. Umarani Assistant Professor, Maharaja
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH
More informationFADE: A Secure Overlay Cloud Storage System with Access Control and Assured Deletion. Patrick P. C. Lee
FADE: A Secure Overlay Cloud Storage System with Access Control and Assured Deletion Patrick P. C. Lee 1 Cloud Storage is Emerging Cloud storage is now an emerging business model for data outsourcing Individual
More informationIntroduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell
Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering
More informationData Store and Multi-Keyword Search on Encrypted Cloud Data
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY CONTENT Introduction Problem statements Literature Review Existing system Proposed system Application Conclusion Future work MOTIVATIONS
More informationSCRIBBLE LEGALIZATION CRYPTOGRAPHIC ASPECT BASED ON DATA ACCESS CONTROL FOR STEAM COUNT
SCRIBBLE LEGALIZATION CRYPTOGRAPHIC ASPECT BASED ON DATA ACCESS CONTROL FOR STEAM COUNT Yerragudipadu, Subba Rayudu, R M Noorullah and C Praveen Kumar Department of Computer Science and Engineering, Institute
More informationPublic Verifiability of Stored Data in Cloud using Disassembly of Data Segment
Public Verifiability of Stored Data in Cloud using Disassembly of Data Segment Adhikrao.Y.Jadhav Department of Computer Science & Engg. Sachin P. Patil Department of Information Technology, Annasaheb Dange
More informationA Methodology for Assigning Access Control to Public Clouds
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationInsecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme
2014 Tenth 10th International Conference on Computational Intelligence and Security Insecurity of an Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption Scheme Changji Wang, Haitao
More informationCryptography III. Public-Key Cryptography Digital Signatures. 2/1/18 Cryptography III
Cryptography III Public-Key Cryptography Digital Signatures 2/1/18 Cryptography III 1 Public Key Cryptography 2/1/18 Cryptography III 2 Key pair Public key: shared with everyone Secret key: kept secret,
More informationImproved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space
Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,
More information