SlideShare a Scribd company logo
1 of 5
Download to read offline
Available online at https://www.ijasrd.org/
International Journal of Advanced Scientific
Research & Development
Vol. 06, Iss. 03, Ver. I, Mar’ 2019, pp. 34 – 38
Cite this article as: Kumar, S. K., Anusiya, N., Mahalakshmi, P., & Manimegalai, P., “Secure Medical Data Computation
using Virtual_ID Authentication and File Swapping”. International Journal of Advanced Scientific Research & Development
(IJASRD), 06 (03/I), 2019, pp. 34 – 38. https://doi.org/10.26836/ijasrd/2019/v6/i3/60305.
* Corresponding Author: K. Satheesh Kumar, satheesh@aucetk.edu.in
e-ISSN: 2395-6089
p-ISSN: 2394-8906
SECURE MEDICAL DATA COMPUTATION USING VIRTUAL_ID
AUTHENTICATION AND FILE SWAPPING
K. Satheesh Kumar1*, N. Anusiya2, P. Mahalakshmi2, and P. Manimegalai2
1 Asst. Prof., Department of Computer Science and Engineering, University College of Engineering,
Thirukkuvalai, Nagapattinam, India.
2 Student, Department of Computer Science and Engineering, University College of Engineering,
Thirukkuvalai, Nagapattinam, India.
ARTICLE INFO
Article History:
Received: 19 Mar 2019;
Received in revised form:
30 Mar 2019;
Accepted: 30 Mar 2019;
Published online: 10 Apr 2019.
Key words:
Hashing,
Homomorphic Encryption,
NTRU,
Medical Application,
File Swapping,
IDS.
ABSTRACT
PHR provides users with a great deal in leakage of sensitive
information. However, securing the sensitive medical data
also brings very serious security problems, especially for the
data security which is stored in the medical cloud data. Once
the data is leaked to a third party, then the data privacy has
become a major problem, mainly such as authentication,
availability of data, confidentiality etc., and which is to be
taken into consideration very effectively. An authentication
scheme based on virtual smartcard using hashing function
for medical data is proposed to solve the problem of in which
the illegal users access the resources of servers. Here, we also
maintain PHR sensitive data in the cloud by using file
swapping concept. Once the user access the data. The user
data will be swapped into different places by file swapping
concept, so the file will be more secured and no one can hack
or theft our data.
Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original
work is properly cited.
INTRODUCTION
Healthcare data security is very much essential in the Health Insurance and
Accountability Act Rules. The HIPAA belongs to Security Rule that requires fully covered
entities to assess data security manage by conducting a risk assessment, and implement a
risk management program to address any vulnerabilities that are identified. In 2015 there
were 750 breaches found and the 193 million personal records opened to make fraud. In
June 2016 alone, more than 11 million health care records were exposed because of cyber-
attacks and over millions of data where hacked in 2018. Looking at these numbers, it is
obvious that cyber and data security is a major concern to health care.
Kumar et al., (2019)
35 Volume 06, Issue 03, Version I, Mar’ 2019
In the existing system the medical data in cloud is secured by using
GPU_Accelerated homomorphic encryption scheme which is used for securing only the
medical Cloud data, the major problem is Authentication( in every aspects such as big data,
cloud computing, and etc.),and identification of file location after decryption may allow
hacker to access data .
In this paper we proposed an idea in order to avoid such problem we have used using
hashing technique[1] with SHA-2 for authentication and file swapping[2] for changing the
location of the decrypted file. We have used IDS[3] for monitoring unauthorized access and
NTRU[4] based homomorphic encryption[5] for cloud data.
HASHING TECHNIQUE
A hash value is unique which helps to identify secret information. The hash function
is the collision-resistant is needed to find data which will generate the same hash value.
There are two types of functions in hashing which are listed as follows
1) Cryptographic hash function
2) Provably secure hash function
The provably secure hash function is very slow but it is very secured. For generating
the very large hash value the collision resistance is accomplished. But cryptographic is too
fast as well as secure, hence we have used it for our implementation.
Example: SHA-2 is most popular cryptographic function which is designed by
National Security Agency (NSA). It contain six different types of hashing algorithm, they
are
 SHA-256
 SHA-512
 SHA-224
 SHA-384
 SHA-512/224
 SHA-512/256
It has undergone 64-rounds of hashing and also it calculate hash code (i.e.,) 64-digit
hexadecimal number.
Secure Medical Data Computation using Virtual_ID Authentication and File Swapping
Volume 06, Issue 03, Version I, Mar’ 2019 36
2.1 Input Format
A single alphanumeric string is denoted by s.
2.2 Constraints
6 ≤ |s| ≥ 20 and String s consists of alphabetic letters (i.e., [a-z A-Z]), and decimal
digits (i.e., 0 through 9) only.
2.3 Output Format
Print the SHA-256 encryption value of s on a new line.
NTRU SCHEME
The NTRU operation will increases quadratically and it is a open source public key
cryptosystem which uses lattice based cryptography for encryption and decryption of data,
whereas RSA operation increases as cubically, hence NTRU is chosen which consist of two
algorithm
1) NTRUEncrypt
2) NTRUSign
NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for
digital signatures and the attacks are resisted by using Shor’s algorithm and its
performance is much better than others. It was placed in public domain in 2017 and it can
be used by software under the GPL[6][7]. Here the NTRUEncrypt is preferred to make safe of
cloud storage data in an Encrypted form.
NTRU BASED HOMOMORPHIC EVOLUTION
In this section, we describe our implementation in detail. We know that prince
cipher is most relevant for Homomorphic evolution. Then later we implemented the shallow
circuit and for implementation we need to select the optimal parameter based on DHS FHE
scheme
While permitting a shallow circuit implementation picking up a lightweight block
cipher will provide the efficient encryption which means the level of multiplication should
be minimized. Therefore we turn around ourself to use the lightweight block ciphers[8].
There are two linear factors which increase the number of multiplication is: size and the
complexity of s-boxes and if higher linearity occur then it results in higher degree terms.
PRESENT[9] it has simple s-boxes for individual s-box resulting in shallow circuit. Where
PRESENT is less optimal because of higher rounds. Prince is a recent model of block
cipher[10] which has same complexity for s-boxes but it has 12 round for the efficient process,
the more complex layer does not make a problem because it does not introduce any new
binary multiplication.
The complexity of different lightweight cipher can be overviewed and note that the
cipher depth is determined by consecutive levels of binary AND-statement. There are two
types of software-oriented ciphers they are, SEA and HEIGHT. Feistel-structure and high
number of rounds results in high depth circuit which make bad choice. The addition of mod
2 n gives significant output due to high nonlinearity. In FHE supports for evaluating
integer operation and not to the mixed integer hence bit-oriented operation is required by
Kumar et al., (2019)
37 Volume 06, Issue 03, Version I, Mar’ 2019
most block cipher. Hence, the hardware oriented cipher such as Present and Prince is
mostly preferred. Example, the evolution of few rounds in parallel, since the bits are
processed in consecutive rounds. AES offers a low depth due to the low number of rounds. In
resent 30 implementation of AES gives rise to several multiplications, instead depth 40
implementation is used in current practice. The ANF (Algebraic Normal Form) is used to
represent the optimal representation of the S-boxes in the form of XOR or AND statements.
FILE SWAPPING
The file swapping for exchanging access database in single IP is as same as the
swapping of two numbers concept.
We all know that our data is hacked by the unauthorized user if they find the
location of our file, where it is found in a user’s single IP and hence in order to avoid this
hacking we introduced the concept called FILE SWAPPING[11].
Here the file swapping concept implements after a decryption of a file, when the file
is accessed by user it is swapped into other place within singleIP and make secure
arrangements.
INTRUSION DETECTION SYSTEM (IDS)
An Intrusion Detection System (IDS) is a device or software application which is
used for monitoring a network of a systems or for malicious activity. It sends the activity of
unauthorized user information to an administrator or otherwise it collects centrally using
security information. Any malicious activity or violation is typically reported either to an
administrator or collected centrally using a security information and event management
(SIEM) system. A SIEM system is used to combines outputs from multiple sources, and the
alarm filtering techniques is used to distinguish malicious activity from false alarms.
Intrusion Prevention Systems (IPS), also known as intrusion detection and
prevention systems (IDPS) are network security appliances which is used for monitoring the
network activities are network security appliances that monitor network or system
activities for malicious activity.
The IPS is classified into 4 different types which are listed as follows
1) Network-based intrusion prevention system (NIPS)
2) Wireless intrusion prevention system (WIPS)
3) Network behavior analysis (NBA)
4) Host-based intrusion prevention system (HIPS)
It uses three different types of detection methods in Intrution Prevention System
namely, Signature-based detection, Statistical anomaly-based detection, Stateful protocol
analysis detection.
Secure Medical Data Computation using Virtual_ID Authentication and File Swapping
Volume 06, Issue 03, Version I, Mar’ 2019 38
The main functions of intrusion prevention systems are to identify malicious activity,
log information about the intrusion detection system.
CONCLUSION
We formulated, optimized, and implemented an NTRU-based variant of the HE
scheme of which achieves much slower growth of noise, and thus much better parameters
than previous HE schemes. Compared to the work in, our GPU Implementation (GM204
Maxwell Architecture) achieves a speedup of 6085xin Ctxt multiplication, which represents
the bottleneck for most HE schemes. Representative medical applications, namely Pearson
Goodness-of-fit test, Cochran-Armitage Test for Trend (CATT), predictive analysis, and
relational operations were implemented and scored speedups of 160.9x, 162.9x, 80000x, and
12.2x, respectively.
REFERENCES
[1] Konheim, A., (2010). "7. Hashing for Storage: Data Management". Hashing in Computer Science:
Fifty Years of Slicing and Dicing. Wile Interscience. ISBN 9780470344736
[2] Turcan, E., (2002), “Peer-to-Peer: The Third Generation Internet”. Retreived from
http://csdl.computer.org/comp/proceedings/p2p/2001/1503/00/15030095.pdf
[3] Vilela, Douglas W. F. L.; Lotufo, Anna Diva P.; Santos, Carlos R. (2018). Fuzzy ARTMAP Neural
Network IDS Evaluation applied for real IEEE 802.11w data base. 2018 International Joint
Conference on Neural Networks (IJCNN). IEEE. doi:10.1109/ijcnn.2018.8489217. ISBN
9781509060146.
[4] Robertson, Elizabeth D. (August 1, 2002). "RE: NTRU Public Key Algorithms IP Assurance
Statement for 802.15.3" (PDF). IEEE. Retrieved February 4, 2013.
[5] S. Carpov, R. Sirdey, "Another compression method for homomorphicciphertexts", Proceedings of
the 4th InternationalWorkshop on Security in Cloud Computing, 2016.
[6] https://www.securityinnovation.com/company/news-and-events/press-releases/security-innovation-
makes-ntruencrypt-patent-free
[7] https://github.com/NTRUOpenSourceProject/ntru-crypto#is-ntru-patented
[8] T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A survey oflightweight-
cryptography implementations. IEEE Design Test of Computers, 24(6):522{533, Nov 2007.
[9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B.Robshaw, Y. Seurin,
and C. Vikkelsoe. PRESENT: An Ultra-Lightweight BlockCipher, pages 450{466. Springer
Berlin Heidelberg, Berlin, Heidelberg, 2007.
[10] Julia Borgho, Anne Canteaut, Tim G•uneysu, Elif Bilge Kavun, MiroslavKnezevic, Lars R.
Knudsen, Gregor Leander, VentzislavNikov, ChristofPaar, Christian Rechberger, Peter
Rombouts, S_ren S. Thomsen, and Tolga Yal_c_n.PRINCE{ A Low-Latency Block Cipher for
Pervasive Computing Applications,pages 208{225. Springer Berlin Heidelberg, Berlin,
Heidelberg, 2012.
[11] "Copyright and Peer-To-Peer Music File Sharing: The Napster Case and the Argument Against
Legislative Reform". murdoch.edu.au. March 2004.]
[12] Jump up to:a b Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and
Prevention Systems (IDPS)" (PDF). Computer Security Resource Center (800–94). Retrieved
1 January 2010.

More Related Content

What's hot

Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qcIAESIJEECS
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET Journal
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreLuisa Francisco
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...IJSRED
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paperLuisa Francisco
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET Journal
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMJournal For Research
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingIJERA Editor
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET Journal
 

What's hot (20)

Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
J018145862
J018145862J018145862
J018145862
 

Similar to Secure Medical Data Computation using Virtual_ID Authentication and File Swapping

Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case StudyEvelyn Donaldson
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...ijtsrd
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKijmnct
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationAM Publications,India
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemIRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 

Similar to Secure Medical Data Computation using Virtual_ID Authentication and File Swapping (20)

Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Dnssec Case Study
Dnssec Case StudyDnssec Case Study
Dnssec Case Study
 
IJET-V3I2P10
IJET-V3I2P10IJET-V3I2P10
IJET-V3I2P10
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 

More from IJASRD Journal

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringIJASRD Journal
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...IJASRD Journal
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...IJASRD Journal
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementIJASRD Journal
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...IJASRD Journal
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...IJASRD Journal
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...IJASRD Journal
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste ManagementIJASRD Journal
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIJASRD Journal
 
A Survey on IoT Architecture
A Survey on IoT ArchitectureA Survey on IoT Architecture
A Survey on IoT ArchitectureIJASRD Journal
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmIJASRD Journal
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesIJASRD Journal
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered MulticarrierIJASRD Journal
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...IJASRD Journal
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...IJASRD Journal
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesIJASRD Journal
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll CollectionIJASRD Journal
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionIJASRD Journal
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...IJASRD Journal
 

More from IJASRD Journal (20)

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial Engineering
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace Management
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste Management
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two Wheelers
 
A Survey on IoT Architecture
A Survey on IoT ArchitectureA Survey on IoT Architecture
A Survey on IoT Architecture
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic Algorithm
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered Multicarrier
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll Collection
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC Encryption
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
 

Recently uploaded

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 

Recently uploaded (20)

Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 

Secure Medical Data Computation using Virtual_ID Authentication and File Swapping

  • 1. Available online at https://www.ijasrd.org/ International Journal of Advanced Scientific Research & Development Vol. 06, Iss. 03, Ver. I, Mar’ 2019, pp. 34 – 38 Cite this article as: Kumar, S. K., Anusiya, N., Mahalakshmi, P., & Manimegalai, P., “Secure Medical Data Computation using Virtual_ID Authentication and File Swapping”. International Journal of Advanced Scientific Research & Development (IJASRD), 06 (03/I), 2019, pp. 34 – 38. https://doi.org/10.26836/ijasrd/2019/v6/i3/60305. * Corresponding Author: K. Satheesh Kumar, satheesh@aucetk.edu.in e-ISSN: 2395-6089 p-ISSN: 2394-8906 SECURE MEDICAL DATA COMPUTATION USING VIRTUAL_ID AUTHENTICATION AND FILE SWAPPING K. Satheesh Kumar1*, N. Anusiya2, P. Mahalakshmi2, and P. Manimegalai2 1 Asst. Prof., Department of Computer Science and Engineering, University College of Engineering, Thirukkuvalai, Nagapattinam, India. 2 Student, Department of Computer Science and Engineering, University College of Engineering, Thirukkuvalai, Nagapattinam, India. ARTICLE INFO Article History: Received: 19 Mar 2019; Received in revised form: 30 Mar 2019; Accepted: 30 Mar 2019; Published online: 10 Apr 2019. Key words: Hashing, Homomorphic Encryption, NTRU, Medical Application, File Swapping, IDS. ABSTRACT PHR provides users with a great deal in leakage of sensitive information. However, securing the sensitive medical data also brings very serious security problems, especially for the data security which is stored in the medical cloud data. Once the data is leaked to a third party, then the data privacy has become a major problem, mainly such as authentication, availability of data, confidentiality etc., and which is to be taken into consideration very effectively. An authentication scheme based on virtual smartcard using hashing function for medical data is proposed to solve the problem of in which the illegal users access the resources of servers. Here, we also maintain PHR sensitive data in the cloud by using file swapping concept. Once the user access the data. The user data will be swapped into different places by file swapping concept, so the file will be more secured and no one can hack or theft our data. Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. INTRODUCTION Healthcare data security is very much essential in the Health Insurance and Accountability Act Rules. The HIPAA belongs to Security Rule that requires fully covered entities to assess data security manage by conducting a risk assessment, and implement a risk management program to address any vulnerabilities that are identified. In 2015 there were 750 breaches found and the 193 million personal records opened to make fraud. In June 2016 alone, more than 11 million health care records were exposed because of cyber- attacks and over millions of data where hacked in 2018. Looking at these numbers, it is obvious that cyber and data security is a major concern to health care.
  • 2. Kumar et al., (2019) 35 Volume 06, Issue 03, Version I, Mar’ 2019 In the existing system the medical data in cloud is secured by using GPU_Accelerated homomorphic encryption scheme which is used for securing only the medical Cloud data, the major problem is Authentication( in every aspects such as big data, cloud computing, and etc.),and identification of file location after decryption may allow hacker to access data . In this paper we proposed an idea in order to avoid such problem we have used using hashing technique[1] with SHA-2 for authentication and file swapping[2] for changing the location of the decrypted file. We have used IDS[3] for monitoring unauthorized access and NTRU[4] based homomorphic encryption[5] for cloud data. HASHING TECHNIQUE A hash value is unique which helps to identify secret information. The hash function is the collision-resistant is needed to find data which will generate the same hash value. There are two types of functions in hashing which are listed as follows 1) Cryptographic hash function 2) Provably secure hash function The provably secure hash function is very slow but it is very secured. For generating the very large hash value the collision resistance is accomplished. But cryptographic is too fast as well as secure, hence we have used it for our implementation. Example: SHA-2 is most popular cryptographic function which is designed by National Security Agency (NSA). It contain six different types of hashing algorithm, they are  SHA-256  SHA-512  SHA-224  SHA-384  SHA-512/224  SHA-512/256 It has undergone 64-rounds of hashing and also it calculate hash code (i.e.,) 64-digit hexadecimal number.
  • 3. Secure Medical Data Computation using Virtual_ID Authentication and File Swapping Volume 06, Issue 03, Version I, Mar’ 2019 36 2.1 Input Format A single alphanumeric string is denoted by s. 2.2 Constraints 6 ≤ |s| ≥ 20 and String s consists of alphabetic letters (i.e., [a-z A-Z]), and decimal digits (i.e., 0 through 9) only. 2.3 Output Format Print the SHA-256 encryption value of s on a new line. NTRU SCHEME The NTRU operation will increases quadratically and it is a open source public key cryptosystem which uses lattice based cryptography for encryption and decryption of data, whereas RSA operation increases as cubically, hence NTRU is chosen which consist of two algorithm 1) NTRUEncrypt 2) NTRUSign NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures and the attacks are resisted by using Shor’s algorithm and its performance is much better than others. It was placed in public domain in 2017 and it can be used by software under the GPL[6][7]. Here the NTRUEncrypt is preferred to make safe of cloud storage data in an Encrypted form. NTRU BASED HOMOMORPHIC EVOLUTION In this section, we describe our implementation in detail. We know that prince cipher is most relevant for Homomorphic evolution. Then later we implemented the shallow circuit and for implementation we need to select the optimal parameter based on DHS FHE scheme While permitting a shallow circuit implementation picking up a lightweight block cipher will provide the efficient encryption which means the level of multiplication should be minimized. Therefore we turn around ourself to use the lightweight block ciphers[8]. There are two linear factors which increase the number of multiplication is: size and the complexity of s-boxes and if higher linearity occur then it results in higher degree terms. PRESENT[9] it has simple s-boxes for individual s-box resulting in shallow circuit. Where PRESENT is less optimal because of higher rounds. Prince is a recent model of block cipher[10] which has same complexity for s-boxes but it has 12 round for the efficient process, the more complex layer does not make a problem because it does not introduce any new binary multiplication. The complexity of different lightweight cipher can be overviewed and note that the cipher depth is determined by consecutive levels of binary AND-statement. There are two types of software-oriented ciphers they are, SEA and HEIGHT. Feistel-structure and high number of rounds results in high depth circuit which make bad choice. The addition of mod 2 n gives significant output due to high nonlinearity. In FHE supports for evaluating integer operation and not to the mixed integer hence bit-oriented operation is required by
  • 4. Kumar et al., (2019) 37 Volume 06, Issue 03, Version I, Mar’ 2019 most block cipher. Hence, the hardware oriented cipher such as Present and Prince is mostly preferred. Example, the evolution of few rounds in parallel, since the bits are processed in consecutive rounds. AES offers a low depth due to the low number of rounds. In resent 30 implementation of AES gives rise to several multiplications, instead depth 40 implementation is used in current practice. The ANF (Algebraic Normal Form) is used to represent the optimal representation of the S-boxes in the form of XOR or AND statements. FILE SWAPPING The file swapping for exchanging access database in single IP is as same as the swapping of two numbers concept. We all know that our data is hacked by the unauthorized user if they find the location of our file, where it is found in a user’s single IP and hence in order to avoid this hacking we introduced the concept called FILE SWAPPING[11]. Here the file swapping concept implements after a decryption of a file, when the file is accessed by user it is swapped into other place within singleIP and make secure arrangements. INTRUSION DETECTION SYSTEM (IDS) An Intrusion Detection System (IDS) is a device or software application which is used for monitoring a network of a systems or for malicious activity. It sends the activity of unauthorized user information to an administrator or otherwise it collects centrally using security information. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system is used to combines outputs from multiple sources, and the alarm filtering techniques is used to distinguish malicious activity from false alarms. Intrusion Prevention Systems (IPS), also known as intrusion detection and prevention systems (IDPS) are network security appliances which is used for monitoring the network activities are network security appliances that monitor network or system activities for malicious activity. The IPS is classified into 4 different types which are listed as follows 1) Network-based intrusion prevention system (NIPS) 2) Wireless intrusion prevention system (WIPS) 3) Network behavior analysis (NBA) 4) Host-based intrusion prevention system (HIPS) It uses three different types of detection methods in Intrution Prevention System namely, Signature-based detection, Statistical anomaly-based detection, Stateful protocol analysis detection.
  • 5. Secure Medical Data Computation using Virtual_ID Authentication and File Swapping Volume 06, Issue 03, Version I, Mar’ 2019 38 The main functions of intrusion prevention systems are to identify malicious activity, log information about the intrusion detection system. CONCLUSION We formulated, optimized, and implemented an NTRU-based variant of the HE scheme of which achieves much slower growth of noise, and thus much better parameters than previous HE schemes. Compared to the work in, our GPU Implementation (GM204 Maxwell Architecture) achieves a speedup of 6085xin Ctxt multiplication, which represents the bottleneck for most HE schemes. Representative medical applications, namely Pearson Goodness-of-fit test, Cochran-Armitage Test for Trend (CATT), predictive analysis, and relational operations were implemented and scored speedups of 160.9x, 162.9x, 80000x, and 12.2x, respectively. REFERENCES [1] Konheim, A., (2010). "7. Hashing for Storage: Data Management". Hashing in Computer Science: Fifty Years of Slicing and Dicing. Wile Interscience. ISBN 9780470344736 [2] Turcan, E., (2002), “Peer-to-Peer: The Third Generation Internet”. Retreived from http://csdl.computer.org/comp/proceedings/p2p/2001/1503/00/15030095.pdf [3] Vilela, Douglas W. F. L.; Lotufo, Anna Diva P.; Santos, Carlos R. (2018). Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base. 2018 International Joint Conference on Neural Networks (IJCNN). IEEE. doi:10.1109/ijcnn.2018.8489217. ISBN 9781509060146. [4] Robertson, Elizabeth D. (August 1, 2002). "RE: NTRU Public Key Algorithms IP Assurance Statement for 802.15.3" (PDF). IEEE. Retrieved February 4, 2013. [5] S. Carpov, R. Sirdey, "Another compression method for homomorphicciphertexts", Proceedings of the 4th InternationalWorkshop on Security in Cloud Computing, 2016. [6] https://www.securityinnovation.com/company/news-and-events/press-releases/security-innovation- makes-ntruencrypt-patent-free [7] https://github.com/NTRUOpenSourceProject/ntru-crypto#is-ntru-patented [8] T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A survey oflightweight- cryptography implementations. IEEE Design Test of Computers, 24(6):522{533, Nov 2007. [9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B.Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An Ultra-Lightweight BlockCipher, pages 450{466. Springer Berlin Heidelberg, Berlin, Heidelberg, 2007. [10] Julia Borgho, Anne Canteaut, Tim G•uneysu, Elif Bilge Kavun, MiroslavKnezevic, Lars R. Knudsen, Gregor Leander, VentzislavNikov, ChristofPaar, Christian Rechberger, Peter Rombouts, S_ren S. Thomsen, and Tolga Yal_c_n.PRINCE{ A Low-Latency Block Cipher for Pervasive Computing Applications,pages 208{225. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012. [11] "Copyright and Peer-To-Peer Music File Sharing: The Napster Case and the Argument Against Legislative Reform". murdoch.edu.au. March 2004.] [12] Jump up to:a b Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)" (PDF). Computer Security Resource Center (800–94). Retrieved 1 January 2010.