Scalable and secure sharing of data in cloud computing using attribute based encryption
|
|
|
- Veronica Davis
- 10 years ago
- Views:
Transcription
1 Volume :2, Issue :4, April e-issn: p-issn: Impact Factor: Ghodake Shubhangi Joshi Priyanka Khobragade Pranjali Chandak Manjiri Scalable and secure sharing of data in cloud computing using attribute based encryption Ghodake Shubhangi, Joshi Priyanka, Khobragade Pranjali, Chandak Manjiri Abstract Each and every hospital provides personal health record to their patients. These records are provided to patient and only patient should have full access to it. It should decision of patient to whom he want to show his PHR and to whom not. A PHR service allow patient to create, manage and control his personal health data. As these records normally prepared and shared by third party services so there is so much chance of privacy and security risk. Also If any patient want to share his PHR only to his doctor from specific hospital, he can t share it privately only to him. Develop system for Scalable and secure sharing of data in cloud computing using Attribute Based Encryption which will store PHR data of patients with functionality of accessing and generating report in secure and authenticated way. Patient can have only and full control over his Personal Health Record. Patient or any User can decide with whom he wants to share his personal health record. Authorized person can check PHR details via HSN (Health Social Network) which will be our user interface for public and general access. Every data should be encrypted before reaching any third party like cloud services. Before handing reports to particular person or organization PHR will be encrypted with Attribution based Encryption (ABE) technique. We will use cloud service which will add additional features like security and scalability and efficiently. Keywords: Personal Health Record, Health Social Network, Data Encryption Standard, Attribute Based Encryption Correspondence: Ghodake Shubhangi 1. Introduction Health is full of uncertainty. Patients are frequently in the dark about their condition, about their options, about what will happen to them. And even for the well informed, there is full of complexity and difficulty. Many patients and families report the frustrations of being passed from pillar to post, of being made to tell their story over and over again, of hospitals losing their notes. And also here is no privacy and Security on health records. Anyone can Access easily no such particular kind of security is there. Technology is now at a point where it can help us overcome these problems. People can go Online and request for their own records for viewing and accessing with security[1],[2]. In previous systems no such records in patients hand for accessing but now new emerging system is PHRs means Personal Health Record with Attribute-Based Encryption. Technology is now at a point where it can help us overcome these problems. People can go Online and request for their own records for viewing n accessing with security. In previous systems no such records in patients hand for accessing but now new emerging system is PHRs means Personal Health Record with Attribute-Based- Encryption. The lot of technology we can integrate in Cloud Computing. In cloud security is one of the problems. Cloud data should be secure for that we provide security. Medical Records are sensitive information. In cloud handling this medical records are very difficult. In cloud computing there is some security problem. So overcome the security threat while maintaining the medical records we need to improve the security level of the PHR system in cloud computing. A Survey on Improving the Security of Public Health Record System in Cloud Computing. Attribute-Based-Encryption is technique for Encryption records with using attributes and keys. In internet data is store which should be in encrypted form because data is sensitive anyone can hack this data. There is some drawback of encrypting data i.e. we gave the private key to third party. We develop new Microsystems for fine-grained sharing of encrypted data that we call Key-Policy Attribute-Based Encryption (KP-ABE). In our ~ 416 ~
2 cryptologist, cipher texts are labeled with sets of attributes and private keys are associated with access structures that control which cipher texts a user is able to decrypt. sharing with health care providers. Device such as a CD-ROM, DVD, smart card, or USB flash drive used for copying health record[8]. 2] Leterature Survey The past and current information about health is collect, store and track, for this purpose we used toll called as PHR. By using this we can save our time and money as well as repetition of medical test should be avoided. A PHR is health record where all data about health is manipulated by patient itself. PHR is totally opposite to the current used electronic medical record. The electronic medical record is operated by different hospital and institution. The main purpose of PHR is to give the complete, good and correct summary of each patient s medical history and all this data is access via internet. PHR report mainly consists of lab result data from wireless result of patient data and patient data is collected from different hospital s computer[9]. A personal Health Record, or PHR, is a health record where health data and information related to the care of a patient is maintained by the patient. This stands in contrast to the more widely used electronic medical record, which is operated by institutions, such as hospitals and contains data entered by clinicians or billing data to support insurance claims[4]. The intention of a PHR is to provide a complete and accurate summary of an individual's medical history which is accessible Online. The health data on a PHR might include patientreported outcome data, lab results, and data from devices such as wireless electronic weighing scales or collected passively from other devices like Hospital's computers. To realize the potential of PHRs and PHR systems to improve health and healthcare, significant steps are needed in the areas of privacy, security. Security is a critical component of a PHR system especially if it is accessible via the Internet. so according to survey of previous systems n health records can conclude that new systems are very well efficient and easy to accessible for patients use. In cloud computing we can combine the lot of technology. The main problem in cloud is security, for that purpose security is required when data is present in cloud. Handling the medical records in cloud is a very complex one[10]. There is the security threat in cloud computing. So overcome the security threat while maintaining the medical records we need to improve the security level of the PHR system in cloud computing. A Survey on Improving the Security of Public Health Record System in Cloud Computing[7]. 3] Phr Solution Types A] Paper-based PHRs Personal health information is recorded and stored in paper format. Paper-based PHR consist of Printed laboratory reports, Hospital notes, and health data of each individual patient. Cost required is less, access without use of computer. The paper-based PHR is developed in 1980 and used for pregnancy record. It is difficult to update, share with other. Paper-based PHRs are concern to physical loss [8]. B] Electronic device-based PHRs Personal health information is recorded and saved in personal computer-based software that may have the capability to encrypt, and import data from other authority such as a hospital. PHR software can provide more sophisticated features such as data encryption, data importation, and data ~ 417 ~ C] Web-based PHR solutions Web-based PHR solutions are similar electronic device PHR solutions. The advantage of web-based solutions is that it can be easily combine with other services. For e.g. Medical data imported from other sources. Patients allow for data sharing with external authority [8]. 4] Present System In previous systems PHR is available publically. That means anyone can access data without taking any type of permission from patient. Patients don t have any type of control over his records. Technique used now is not reliable and secure because reporting is done by third party companies. In this system PHRs are stored publically no security is there so there are number of resources that can access patients record easily because no privacy and security is there[6]. Resources are from which patient s information can get easily like hospitals, school nurse, specialist doctor, payer data center, primary doctor, lab, pharmacy, LIC policies etc. so these are the resources from which patients data can be misplaced. Fig 1: Present PHR system The present system is shown in Fig.1 which is used to store the patient s record. Hospital give raw data to third parties for processing and these third parties generate reports. Even transfer of data is not secure so data can be theft in between during transfer also. Patient should have full control over his own records. It is plainly silly that patient can t have only access to their records just like they would access their bank accounts. And it s good that patients able to see their records at any time without any condition. Present system is not efficient and good for use for storing records. There is big issue of safety, because its social network for every citizen should register and generate their PHR. But this system keeps all the records using cloud. Security is provided to the data by using algorithms. [3],[5] 5] Proposed System: 5.1 System architecture Design is done according to, the modules needed for the system. Complete System can be ex-plain in two architectural diagrams. First diagram explain flow of patient data to cloud through our system. Second explain retrieving of data on basis of ABE and generation of report.
3 5.1.1 Architecture diagram part 1(Patient side approach) This is the proposed system for generating or storing personal health records of patients. The proposed system is divided into five modules for better understanding. Architecture diagram have two approaches and this is architecture diagram is for patient side approach. Fig 2: Flow of Patient Data to Cloud In Fig.2 the initial flow of Patient Data to Cloud is described, in which all the hospitals sends their raw data in a encrypted form to the module 1 of system. In the system module 1 collects this data and arranged in proper manner. Raw data is the collection of patient s records in block of data. At this level partial level of encryption is done with using DES (Data Encryption Standard). At module 1 the data is decrypted and it stores in cloud. When patient wants their record then he can fetch data from cloud and creation of keys is done in keygenerator server with using attributes which had given by patient. After that system generates a PHR report that can be viewed by Patient itself or he a give the authority of access to others. Module 1: This module will get raw data from Hospital trusted servers in encrypted mode and load it into cloud. We will call it raw data Loader. Module 2: Also called client module. Here patient can access his reports. From client module patient will define attribute set and group policy for encryption. Also PHR encryption will do by taking Master key from Keygen Server or module 3. Module 3: This server will handle all main tasks like Encryption, decryption, creating policy tree, managing public Keys, Generating Master Key. Module 4: This module will be cloud where we will store reports and data Architecture diagram part 2(Doctor side approach) This is the proposed system for doctor side approach. The proposed system is divided into five modules for better understanding. Architecture diagram have two approaches and this is second part of architecture diagram is for Data retrieval and report generation. After giving access to a doctor or whom he want to give access generation of report using attribute is done accordingly. A doctor can view the report only if all attributes are matched. Here the main role of Keygen server. The cipher text is related with an access policy over attributes. A user secret key is related with a set of attributes. If the access policy of cipher text and attribute set of secrete key matches then user can decrypt the cipher text. Module 3: This server will handle all main tasks like Encryption, decryption, creating policy tree, managing public Keys, Generating Master Key. Module 4: This module will be cloud where we will store reports and data. Module 5: This module is Health Social Network (HSN) which will be public access for viewing, editing and deleting reports with authorized permission from patient. 6. ALGORITHMS 6.1 ABE algorithm ƛ- security parameter provided by patient. G- collection of all identity or attributes. U- universe description (collection of all identity or attributes user specified). M- Message (Report). S Set of attribute provided by user. Ȁ- Set of identity provided by receiver. RD- Raw Data provided by hospital. PK- public key generated by ABE algorithm. MK- Master Key generated by ABE algorithm and Access tree (T). CT- encrypted Report. SK-private key generated by Key Generator. M-Decrypted report. T- Access tree. 1. Setup (ƛ, U) (PK, MK). The setup algorithm takes as input a security parameter ƛ and universe description U, which defines the set of allowed attribute in the system. It output the public parameter PK and masters secret key MK. 2. Encrypt (PK, M, S) CT. The encryption algorithm takes as input the public parameters PK a message M and a set of attribute S and output a cipher text CT associated with the attribute set. 3. Keygen (MK, Ȁ) SK. This method gives private key SK as output. The key Generation algorithm takes as input the master secret key and an access structure Ȁ and output a private key SK associated with the attribute. 4. Decrypt (SK, CT) M. The decryption algorithm takes as input a private key SK associated with access structure A and a cipher text CT associated with attribute set S and outputs a message if S satisfies or the error message otherwise. The correctness property requires that for all sufficiently large ƛ ɛ N, all universe descriptions U, all (PK, MK) ɛ Setup (ƛ, U), all S is subset of U, all SK ɛ KeyGen (MK, Ȁ), all M ɛ M, all A ɛ G and all CT ɛ Encrypt (PK, M, S), if S satisfies A, then Decrypt (SK, CT) outputs M. Fig 3: Data retrieval and report generation. ~ 418 ~ 7. Future Enhancement Hospitals uses third party services for managing PHR records of patients. Present system is not secure and a big threat to patients personal data. Proposed system provides unique security which will be based on attribute based encryption. So it is completely depends on patient that with whom he want to
4 share his personal health information. Our system will encrypt report accordingly and make sure that only authorized person can see that report. Any hospital can install our system and provide this functionality to their patients without using any third party services. All data storage will be into cloud so there will be no extra setup cost for database servers. Also because of cloud scalability of system can be easily managed. The main concern is about the privacy of patient personal health data and who could gain access to medical record when they are stored in a cloud server. The data owner and cloud servers are in two different domains in cloud computing storage. On one hand, cloud servers are not entitled to access the outsourced data contents for data confidentiality on other hand, the data recourses are not physically under the full control of data owner. Storing personal medical records on the cloud server leads to need of encryption mechanism to protect the medical health records, before outsourcing to the cloud. To deal with this the potential risks of privacy exposure, instead of letting the service provides encrypt patients data, medical records sharing services should patient s full control over the selective sharing of their own medical data. To this end, the medical records should be encrypted in addition to traditional access control mechanisms provide by the server. Even in case of failure of one node other cloud node can provide data security. There is big issue of safety, because its social network for every citizen should register and generate their PHR. But this system keeps all the records using cloud. 9. Advantages of Proposed System Attribute based encryption is used for secure sharing of report. Patient has Full control over his PHR. This system has scalable database because cloud is use in this system. Data availability, Data will be present in different cloud replicas at any point of time. So even in case of failure of one node other cloud node can provide data. Data security, all data is encrypted using DES algorithm before transferring to another server or machine. In cloud data is stored in unknown multiple servers (Called nodes), so it s hard to hack data from cloud. There is no third party service. This will not be any third party services. This system can be installed where patient s data is generated. This system will take data and store it in cloud. That s why there is no third party. Conclusion This system is fully patient-centric concept. Patients have full control of its privacy through encrypting their PHR files to allow particular access to other. The system we has develop is able to cater both statistical reports and ad-hoc reporting in the client- server platform as well as web based platform.because of cloud Data availability,data security is more.this system has scalable database as we are using cloud. We will focus on redesigning the model using keys security, time dimension, database fine tuning to improve on performance and ability to cater for more patient data. References 1. Ming Li and Shucheng Yu, Member, IEEE, Yao Zheng, Student Member, Scalable and Secure Sharing of Personal Health Records in Cloud Computing using Attribute-Based Encryption IEEE JANUARY Bharti Ratan Madnani, Sreedevi in Interna-tional Journal of Innovative Research in Computer and Communication Engineering Attribute Based Encryption for Scalable and Secure Sharing of Medical Records in Cloud Computing Design and Implementation white paper MAY Stiffy Sunny and L. Agilandeeswari in International Journal of Applied Engineering Research, Secure Data Sharing of Patient Record in Cloud Environment using Attribute Based Encryption JUNE Y. Zheng, Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption, master s thesis, Worcester Polytechnic Inst, DEC J.Hur and D.K.Noh, Attribute-Based Access Control with efficient Revocation in Data Outsourcning system, IEEE Trans.Parallel and Distributed system, July S. Narayan, M. Gagne, and R. Safavi-Naini, Privacy preserving ehr system using attribute-based infrastructure, ser. CCSW,JUNE Yu, C. Wang, K. Ren, and W. Lou, Attribute based data sharing with attribute revocation, in ASIACCS 10, DEC S. Yu, C. Wang, K. Ren, and W. Lou, Achieving secure, scalable and fine-grained data access control in cloud computing, in IEEE IN FOCOM 10, MAY M. Chase and S.S. Chow, Improving privacy and security in multi-authority attribute-based encryption. in CCS, MAY Benaloh, M. Chase, E. Horvitz, and K. Lauter, Patient controlled encryption: ensuring privacy of electronic medical record-s, in CCSW 09, JUNE Biographies Miss.Ghodake Shubhangi Dept Of computer [email protected] Miss.Khobragade Pranjali Dept Of computer Engineering [email protected] ~ 419 ~
5 Miss.Joshi Priyanka Dept Of computer Miss.Chandak Manjiri Dept Of computer ~ 420 ~
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
Securing Patient Privacy in E-Health Cloud Using Homomorphic Encryption and Access Control
International Journal of Computer Networks and Communications Security VOL.2, NO.1, JANUARY 2014, 15 21 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Securing Patient Privacy in E-Health Cloud
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul
AN ENHANCED ATTRIBUTE BASED ENCRYPTION WITH MULTI PARTIES ACCESS IN CLOUD AREA
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
Enhancing Security of Personal Health Records in Cloud Computing by Encryption
Enhancing Security of Personal Health Records in Cloud Computing by Encryption Nishitha Ramakrishnan 1, Sreerekha B 2 1 PG Student (M.Tech, CSE), Malabar Institute of Technology, Anjarakandy (P.O), Kannur,
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud Storage Abstract: Cloud computing is one of the emerge technologies. To protect the data and privacy of users the access
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Data management using Virtualization in Cloud Computing
Data management using Virtualization in Cloud Computing A.S.R. Krishna Kanth M.Tech (CST), Department of Computer Science & Systems Engineering, Andhra University, India. M.Sitha Ram Research Scholar Department
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE
EFFICIENT AND SECURE ATTRIBUTE REVOCATION OF DATA IN MULTI-AUTHORITY CLOUD STORAGE Reshma Mary Abraham and P. Sriramya Computer Science Engineering, Saveetha University, Chennai, India E-Mail: [email protected]
PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD
http:// PRIVACY PRESERVING OF HEALTH MONITORING SERVICES IN CLOUD Mrs. Ramya.R 1, Mrs. Shruthi.G 2 1 M. Tech. Student, 2 Assistant Professor, Department of CSE, Don Bosco Institute of Technology, Bangalore,
Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS
AN EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA IN TEGRITY IN CLOUDS Mrs.K.Saranya, M.E.,(CSE), Jay Shriram Group of Institutions, Tirupur. [email protected] Dr.S.Rajalakshmi, Associate Professor/CSE,
Data Security Using Reliable Re-Encryption in Unreliable Cloud
ISSN (Online): 2277-5420 www.ijcsn.org Data Security Using Reliable Re-Encryption in Unreliable Cloud 328 1 Ajinkya Adhau, 2 Payal Bobade, 3 Priyanka Zilpe, 4 Yashodhara Fulmali 1, 2, 3, 4 Student, Department
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
SECURING PERSONAL HEALTH RECORD IN CLOUD USING ATTRIBUTE-BASED ENCRYPTION
SECURING PERSONAL HEALTH RECORD IN CLOUD USING ATTRIBUTE-BASED ENCRYPTION MURALI N.S. PG SCHOLAR DEPT OF CSE ADHIYAMAAN COLLEGE OF ENGINEERING HOSUR Email:[email protected] Abstract- Personal Health
DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS
DECENTRALIZED ACCESS CONTROL TO SECURE DATA STORAGE ON CLOUDS Ankita N.Madde 1, Minal J. Joshi 2, Suchita Gutte 3, Sonal Asawa 4, # Prashant Jawalkar 5 1,2,3,4 UG Student, 5 Project Guide, Computer Dept.,
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
A Secure Decentralized Access Control Scheme for Data stored in Clouds
A Secure Decentralized Access Control Scheme for Data stored in Clouds Priyanka Palekar 1, Abhijeet Bharate 2, Nisar Anjum 3 1 SKNSITS, University of Pune 2 SKNSITS, University of Pune 3 SKNSITS, University
Highly Secure Data Sharing in Cloud Storage using Key-Pair Cryptosystem
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,
Secure Privacy Preserving Public Auditing for Cloud storage
Secure Privacy Preserving Public Auditing for Cloud storage Sathiskumar R 1, Dr.Jeberson Retnaraj 2 Department of Information Technology, Sathyabama University, Chennai, India 1 Department of Information
Secure Sharing of Health Records in Cloud Using ABE
Secure Sharing of Health Records in Cloud Using ABE Nithya.E, TousifAhamed Nadaf Abstract In recent years, Personal health record (PHR) has emerged as a patient-centric model of health information exchange.
KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD
KEY-POLICY ATTRIBUTE BASED ENCRYPTION TO SECURE DATA STORED IN CLOUD C.Vinoth 1, G.R.Anantha Raman 2 1 Computer Science and Engineering,ACE Hosur(India) 2 Assistant Professor, Computer Science and Engineering,
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Ranked Keyword Search Using RSE over Outsourced Cloud Data
Ranked Keyword Search Using RSE over Outsourced Cloud Data Payal Akriti 1, Ms. Preetha Mary Ann 2, D.Sarvanan 3 1 Final Year MCA, Sathyabama University, Tamilnadu, India 2&3 Assistant Professor, Sathyabama
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
Cloud Data Service for Issues in Scalable Data Integration Using Multi Authority Attribute Based Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control
Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control Shivarathri Ravinder M. Tech Student, Dept. of CSE, CMR College of Engineering and Technology, Kandlakoya Village, Medchal
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY
EFFICIENT AND SECURE DATA PRESERVING IN CLOUD USING ENHANCED SECURITY Siliveru Ashok kumar* S.G. Nawaz ## and M.Harathi # * Student of M.Tech, Sri Krishna Devaraya Engineering College, Gooty # Department
Multi Layered Securing of Health Records using Public and Private Model in Cloud
pp 97 102 Krishi Sanskriti Publications http://www.krishisanskriti.org/acsit.html Multi Layered Securing of Health Records using Public and Private Model in Cloud Vijay J 1, Anitha C.L 2 1 P.G.Student,
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Privacy in Electronic Health Care System Using Public and Private Cloud
Privacy in Electronic Health Care System Using Public and Private Cloud 1 T.S.Mamatha, 2 Dr.S.N.Chandrashekara, 3 Dr.K.S.JagadeeshGowda, 4 Bharathi.M 1 Student, Dept. of CS&E, SJCIT, Chikkballapur, email:[email protected]
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud
Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud Ashish G. Ahuja 1, Prof. Komal B. Bijwe 2 1. M.E. Scholar, Dept Of CSE 2. Asst. Prof. Dept. Of CSE at P.R.P.C.E& M, Amravati
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption
Multi-Owner Data Sharing in Cloud Storage Using Policy Based Encryption Shani Raj 1, Dr. Varghese Paul 2, Nishana Rahim 3 1,3 Assistant Professor, College of Engineering, Kottarakara, Kerala, India 2 Professor
Secure and Scalable Cloud-based Architecture for e-health Wireless Sensor Networks
Secure and Scalable Cloud-based Architecture for e-health Wireless Sensor Networks Ahmed Lounis, Abdelkrim Hadjidj, Abdelmadjid Bouabdallah, Yacine Challal To cite this version: Ahmed Lounis, Abdelkrim
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud
Providing Access Permissions to Legitimate Users by Using Attribute Based Encryption Techniques In Cloud R.Udhayakumar 1, M. Jawahar 2, I.Ramasamy 3 PG Student, Dept. Of CSE,KSR Institute For Engineering
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Attribute Based Encryption with Privacy Preserving In Clouds
Attribute Based Encryption with Privacy Preserving In Clouds M. Suriyapriya 1, A. Joicy 2 PG Scholar 1 Assistant Professor CSE Department 2 St.Joseph College of Engineering Sriperumbudur, Chennai-602105
preliminary experiment conducted on Amazon EC2 instance further demonstrates the fast performance of the design.
Privacy-Preserving Public Auditing For Secure Cloud Storage ABSTRACT: Using cloud storage, users can remotely store their data and enjoy the on-demand high-quality applications and services from a shared
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms
Efficient Framework for Deploying Information in Cloud Virtual Datacenters with Cryptography Algorithms Radhika G #1, K.V.V. Satyanarayana *2, Tejaswi A #3 1,2,3 Dept of CSE, K L University, Vaddeswaram-522502,
Verifiable Outsourced Computations Outsourcing Computations to Untrusted Servers
Outsourcing Computations to Untrusted Servers Security of Symmetric Ciphers in Network Protocols ICMS, May 26, 2015, Edinburgh Problem Motivation Problem Motivation Problem Motivation Problem Motivation
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud
Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:[email protected] Contact: 8600200142
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage
Development of enhanced Third party Auditing Scheme for Secure Cloud Storage Bhanu Prakash Chamakuri*1, D. Srikar*2, Dr. M.Suresh Babu*3 M.Tech Scholar, Dept of CSE, Grandhi Varalakshmi Institute Of Technology,
CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY
SOWMIYA MURTHY: CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE RECOVERY CRYPTOGRAPHIC SECURE CLOUD STORAGE MODEL WITH ANONYMOUS AUTHENTICATION AND AUTOMATIC FILE
Privacy Preservation and Secure Data Sharing in Cloud Storage
OPEN ACCESS Int. Res. J. of Science & Engineering, 2015; Vol. 3 (6): 231-236 ISSN: 2322-0015 RESEARCH ARTICLE Privacy Preservation and Secure Data Sharing in Cloud Storage Chavhan Bhaurao* and Deshmukh
Facilitating Efficient Encrypted Document Storage and Retrieval in a Cloud Framework
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. IV (Sep Oct. 2014), PP 18-24 Facilitating Efficient Encrypted Document Storage and Retrieval
Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3
4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3 1,2College of Mathematical
A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD
A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
Attributed-based Access Control for Multi-Authority Systems in Cloud Storage
2012 32nd IEEE International Conference on Distributed Computing Systems Attributed-based Access Control for Multi-Authority Systems in Cloud Storage Kan Yang Department of Computer Science City University
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY
SURVEY ON: CLOUD DATA RETRIEVAL FOR MULTIKEYWORD BASED ON DATA MINING TECHNOLOGY 1 Kavya G, 2 K.S. Rajesh 1 P.G Scholar, Dept. of Computer Science & Engineering RajaRajeswari College of Engineering, Bangalore,
How To Ensure Data Integrity In Cloud Computing
A Novel Approach for public exploration Data with Effective user Denial in the cloud Mahankali Anitha PG Scholar Department of CSE J.Vijayasree Assistant professor Department of CSE Dr.M.V.Siva Prasad
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems
DAC-MACS: Effective Data Access Control for Multi-Authority Cloud Storage Systems Kan Yang, Xiaohua Jia, Kui Ren, Bo Zhang Dept. of CS, City University of Hong Kong Dept. of CSE, University at Buffalo,
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION
DATA SECURITY IN CLOUD USING ADVANCED SECURE DE-DUPLICATION Hasna.R 1, S.Sangeetha 2 1 PG Scholar, Dhanalakshmi Srinivasan College of Engineering, Coimbatore. 2 Assistant Professor, Dhanalakshmi Srinivasan
Index Terms: Cloud Computing, Third Party Auditor, Threats In Cloud Computing, Dynamic Encryption.
Secure Privacy-Preserving Cloud Services. Abhaya Ghatkar, Reena Jadhav, Renju Georgekutty, Avriel William, Amita Jajoo DYPCOE, Akurdi, Pune [email protected], [email protected], [email protected],
Keywords: - Ring Signature, Homomorphic Authenticable Ring Signature (HARS), Privacy Preserving, Public Auditing, Cloud Computing.
Survey on Privacy Preserving Public Auditing Techniques for Shared Data in the Cloud Kedar Jayesh Rasal 1, Dr. S.V.Gumaste 2, Sandip A. Kahate 3 Computer Engineering, Pune University, SPCOE, Otur, Pune,
Privacy-Preserving Distributed Encrypted Data Storage and Retrieval
Privacy-Preserving Distributed Encrypted Data Storage and Retrieval Sibi Antony Master Thesis Starting Talk WS12/13 1 Overview Motivation Thesis Goals Methodology Initial Analysis Time Table 2 Motivation
Australian Journal of Basic and Applied Sciences. EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system
ISSN:1991-8178 Australian Journal of Basic and Applied Sciences Journal home page: www.ajbasweb.com EMPMCS: Enhanced Multilevel Privacy preserving m-healthcare Cloud computing system 1 Vidhya. A, 2 Dr.
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server
Data Security and Privacy in Cloud using RC6 Algorithm for Remote Data Back-up Server Ruchira. H. Titare 1, Prof. Pravin Kulurkar 2, 1 2nd year Mtech CSE, Vidarbha Institute of Technology, Nagpur, India,
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE
PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE Abstract: Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING
SECURITY ARCHITECTURE FOR MOBILE CLOUD COMPUTING Ali Newaz Bahar 1*, Md. Ahsan Habib 2, Md. Manowarul Islam 3 1, 2, 3 Department of Information and Communication Technology, Mawlana Bhashani Science and
Secure semantic based search over cloud
Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,
Implementation of Data Sharing in Cloud Storage Using Data Deduplication
Implementation of Data Sharing in Cloud Storage Using Data Deduplication 1. M.JITHENDRA, 2. Dr. G.V.S.N.R.V. PRASAD M.S, Ph.D. 1. M.Tech, Department of CSE, Gudlavalleru Engineering College. 2. Professor
G.J. E.D.T.,Vol.3(1):43-47 (January-February, 2014) ISSN: 2319 7293 SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic Groups
SUODY-Preserving Privacy in Sharing Data with Multi-Vendor for Dynamic s T.Vijayalakshmi 1, Balika J Chelliah 2 & R. Jegadeesan 3 1 M.Tech Student, Department of Computer Science and Engineering, S.R.M.
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD
SECURITY ENHANCEMENT OF GROUP SHARING AND PUBLIC AUDITING FOR DATA STORAGE IN CLOUD S.REVATHI B.HASEENA M.NOORUL IZZATH PG Student PG Student PG Student II- ME CSE II- ME CSE II- ME CSE Al-Ameen Engineering
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption
Decentralized Access Control Secure Cloud Storage using Key Policy Attribute Based Encryption 1 Thota Naresh Kumar, 2 K.SRINIVAS, 3 Y.Raju 2 Associate Professor, 3 Associate Professor 1,2,3 Department
Networked Personal Health Records
Networked Personal Health Records Table of Contents Potential of Personal Health Records (PHRs) What is a PHR? Common functions of a PHR Ideal attributes The PHR environment Consumer perceptions about
An in-building multi-server cloud system based on shortest Path algorithm depending on the distance and measured Signal strength
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. I (Jan Feb. 2015), PP 38-42 www.iosrjournals.org An in-building multi-server cloud system based
