SlideShare a Scribd company logo
1 of 4
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 200
ENHANCING SECURITY FEATURES IN CLOUD COMPUTING FOR
HEALTHCARE USING CIPHER AND INTER CLOUD
Aruna Devi. S1
, Manju.A2
1, 2
Assistant Professor, Department of Computer Science and Engineering, Saveetha Engineering College, Tamilnadu,
India
Abstract
Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are
large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will
be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as
part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare
industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces
the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the
cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records.
Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work.
Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Cloud computing is an emerging trend in software field as it
focuses on shared resources. Application areas of cloud
computing are not only limited to IT field but also extended
for e-Government, Healthcare, e-Business, Libraries etc.,
Cloud computing purely relies on virtualization, which
increases the infrastructure deployment in reduced cost and IT
operations are scampered up. On-demand access attracts more
number of users towards cloud. Cloud imposes pay-per-use
model. Users tend to pay only for actually consumed
resources. The resources stored in cloud can be accessed
anywhere anytime. Fig.1 visualizes cloud deployment models
and its services such as SaaS (Software as a Service), PaaS
(Platform as a Service), and IaaS (Infrastructure as a Service).
Cloud can be called as EaaS (Everything as a Service). Fig. 2
gives the different types of cloud viz. Public cloud, Private
cloud, Community cloud, Hybrid cloud. Yet, in the beginning
people falter to use cloud because of the security and privacy
concerns while storing the highly confidential and sensitive
data into the cloud. Moving to cloud in Health Care is the
major challenge rather than other fields because of the above
stated reason. So, we are proposing architecture to overcome
the pitfalls in the cloud by moving to cipher cloud.
Fig. 1 Cloud Deployment Model
Fig. 2 Types of Cloud
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 201
In this paper we combine the topics of cloud computing and
trust in the cloud which can be called as cipher cloud. We
discuss how security can be imposed in a cloud so that highly
sensitive data in all fields can be stored in a cloud without any
hesitation. This offers cloud service providers the possibility
to penetrate market areas where higher security requirements
need to be met. For achieving this, we extended the inter cloud
and cipher cloud models.
The paper is structured as follows. First, we briefly introduce
basics of cloud computing with its deployment models and
services rendered by it. Section 2 deals with the related work
from the literature. A motivation behind cloud computing in
Healthcare is also provided. In Section 3, we discuss about the
proposed work in which cipher cloud architecture is combined
with inter cloud models to enhance data security and
reliability. Section 4 presents the methodology to achieve the
above. Section 5 draws some concluding remarks and some
ideas for future work.
2. RELATED WORK
In [3], the authors describe various applications of cloud
computing over Healthcare, its implications. Patients and
health organizations take advantages of the new technology by
improving patients quality of service through a distributed
high-integrated platform (Wang, 2010), coordinating of
medical process as well as reducing IT infrastructure
investment or maintenance costs which leads to a better
healthcare environment. Concentrating on the Global Market
for Cloud Computing in Healthcare, IT industries invest
heavily to build infrastructure for cloud to support it and help
organizations take benefit from it. The rate of increase in
adopting cloud is directly proportional to the rate of achieving
greater efficiencies. This results in providing extraordinary
sharing capabilities between the healthcare organizations and
patients alike.
The Challenges of Cloud Computing in Health Care is mostly
due to two important concerns associated with security and
interoperability (Sanjay P. Ahuja 2012).
By taking advantage of solutions available, the above
mentioned issues can be overcome. This leads to movement
towards cloud and taking advantage of the solutions it provide.
Since Healthcare data is highly confidential, its privacy and
security concerns need to be tackled. Security concerns can be
addressed by following Health Insurance Portability and
Accountability Act (HIPAA) when moving health record to
the cloud. The healthcare data comprises of sensitive
information yet migration of the medical records to the cloud (
third party ) may be trusted. To prevent uncovering of
information to unauthorized persons, security activities such
as imposing access controls, providing authentication,
checking authorization can be done. These issues are an
obstacle that have slowed the cloud implementation and
should be addressed in order to enable the trustworthiness of
cloud systems.
Interoperability is also another concern to be dealt with when
moving data to outside provider. This arises because of
diverse data modeling constructs adopted in different
Medicare organizations which leads to different database
designs, implementation, management, platforms,
programming languages and incompatible systems. The
Healthcare systems interoperability may occur either at the
provider, or software, or computer, or data levels and /or
system integration.
Ming Li(2013), describes a novel patient centric framework
and mechanisms for data access control to PHRs stored in
semi-trusted servers. Attribute-Based Encryption (ABE)
technique was used to encrypt each patient’s PHR file. It
exploits multi-authority ABE for the privacy of patient’s by
dynamic modification of access policies. Revoking of access
policy is not possible at all the moments and the attributes
which were known to the user leads to privacy concern.
In Attribute-based encryption [2], the owner of data has to
predefine the attributes based on which the encryption needs
to be done. The number of users in the system doesn’t matters.
Each attribute has public key, secret key, and a random
polynomial, so different users cannot combine their attributes
to recover the data, and different users cannot carry out
collusion attacks. Only the user who possesses the authorized
attributes can satisfy the access policy to decrypt data. The
access policy contains a boolean formula such as AND, OR et
al. which can let the access structure be flexible to control
users' access.
Almost all key generation schemes used by authority are
prevailing. Since these schemes contain the authority that just
suits the private cloud environments, the authority should be
removed in the future.
3. PROPOSED WORK
Data encryption should be adopted to enforce privacy policies
in the cloud since the cloud server is no longer assumed to be
fully trusted. In ABE scheme, as the number of users’
increases, their attributes for generating cryptographic keys
also increases and this leads to complexity in key
management.
In the proposed work, for ensuring security, encryption tools
are used along with attributes of user. Usage of tools
overcomes the complexity in key management in ABE
schemes. So we are proposing architecture by combining the
concepts of cipher cloud and ABE in which the PHR
encrypted by encryption tool is again encrypted by using
attribute based encryption (ABE).
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 202
3.1 Methodology
Our methodology implements security in two stages. In stage
1, the PHR is encrypted by tools such as TrueCrypt 7.0 /
Boxcryptor 1.0 and stored into cloud. In stage 2, the encrypted
PHR is encrypted by the cloud service provider using
attributes of user.
The architecture of our proposed work is given in Fig.3. The
user consults doctor and the doctor generates Personal Health
Record which comprises the patient’s history of health issues,
symptoms, diagnosis undergone. This PHR is encrypted by
encryption tools such as TrueCrypt / Boxcryptor and stored
into cloud. Again this encrypted PHR is encrypted using the
attributes of user. In order to manage the keys generated, inter
cloud is taken into account to minimize the complexity.
When the patient is under treatment, his/her PHR is retrieved
from cloud by decrypting it with key and tools. This can be
used for further references and helps in diagnosis.
1 Encryption / Decryption by Encryption tool
2Encryption using attributes of user
3Key Sharing
Fig.3 Architecture of Proposed System
TrueCrypt 7.0 is a software system for establishing and
maintaining an on-the-fly-encrypted volume (data storage
device). Without user intercession, the data is automatically
encrypted or decrypted right before it is loaded or saved. Only
by using the correct keyfile / password or encryption key, the
stored encrypted data can be decrypted (read).Not only the
data in file gets encrypted but also the meta data, file name,
folder name and everything related to the file will be
encrypted. In addition to resilient and translucent encryption,
TrueCrypt also creates more secure (and obscured) file
protection by creating hidden volumes within encrypted
volumes. Since online backup is increasingly popular,
Boxcryptor 1.0 tool allows the user to create an encrypted
folder of the user’s PHR and synchronizing that folder with
cloud provider. This improves privacy as even a third-party
gets the PHR, the encrypted folder can be decrypted only by
the user and their relatives.
The cloud service provider needs to manage this software as a
service. Once the encrypted PHR stored into cloud, the CSP
encrypts their record by using user’s attributes which results in
more secured data storage in the cloud. Whenever the PHR is
needed by the physician for diagnosis, he/she will decrypt the
record using the attributes of concerned patient and then it is
decrypted automatically by TrueCrypt/ Boxcryptor software
by using correct password. This system is more secure as
encryption and decryption are done twice by software and
attributes.
Complexity in key management can be reduced by having
managing resources in another cloud so that key management
and secured storage will be carried over in separate clouds.
This needs inter cloud implementation.
4. CONCLUSIONS
In this paper, we have proposed a novel framework to realize
patient-centric privacy for personal health records in cloud
computing. Patients themselves encrypt the data using
encryption tools and their attributes are used for double
encryption by CSP. The framework addresses the challenges
brought by multiple PHR owners and users, by reducing the
complexity of key management when the number of owners
and users in the system is large. We utilize encryption tools
and multi-authority attribute-based encryption to encrypt the
PHR data.
The work can be extended by enhancing the features of inter
cloud while storing the data.
REFERENCES
[1]. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and
Wenjing Lou, “Scalable and Secure Sharing of Personal
Health Records in Cloud Computing Using Attribute-Based
Encryption” , IEEE Transactions on Parallel and Distributed
Systems, (Vol. 24 No. 1) pp. 131-143, Jan. 2013.
[2]. Cheng Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang,
“A Survey on Attribute-based Encryption Schemes of Access
Control in Cloud Environments”, International Journal of
Network Security, Vol.15, No.4, PP.231-240, July 2013.
[3]. Sanjay P. Ahuja, Sindhu Mani & Jesus Zambrano, “A
Survey of the State of Cloud Computing in Healthcare”,
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 203
Network and Communication Technologies; Vol. 1, No. 2;
2012.
[4]. Rolim, C.O, Koch, F.L. ; Westphall, C.B. ; Werner, J. ;
Fracalossi, A. ; Salvador, G.S, ”A Cloud Computing Solution
for Patient’s Data Collection in Health Care Institutions”,
Second International Conference on eHealth, Telemedicine,
and Social Medicine, pp. 95 - 99 , 2010.
[5]. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, “Securing
Personal Health Records in Cloud Computing: Patient-centric
and Fine-grained Data Access Control in Multi-owner
Settings”, Social Informatics and Telecommunications
Engineering, Volume 50, pp 89-106, 2010.
[6]. Wang, X. (2010). Application of Cloud Computing in the
Health Information System. Computer Application and
System
Modeling(ICCASM).Retrievedfromhttp://ieeexplore.ieee.org/s
tamp/stamp.jsp?tp=&arnumber=5619051
[7]. M. Armbrust, A. Fox, R. Grith, A. D. Joseph, R. Katz, A.
Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M.
Zaharia, “A view of cloud computing," Communications of
the ACM,vol. 53, pp. 50,58, 2010.
[8]. J. Bethencourt, A. Sahai, and B. Waters, ”Ciphertext-
policy attribute-based encryption," in Proceedings of IEEE
Symposium on Security andPrivacy, pp. 321V334, 2007.
[9]. P. Kresimir and H. Zeljko "Cloud computing security
issues and challenges." In PROC Third International
Conference on Advances in Human-oriented and Personalized
Mechanisms, Technologies, and Services, 2010, pp. 344-349
[10]. B. Grobauer, T. Walloschek and E. Stöcker,
"Understanding Cloud Computing Vulnerabilities," IEEE
Security and Privacy, vol. 99, 2010
[11]. S. Subashini, and V. Kavitha. (2010) “A survey on
security issues in service delivery models of cloud
computing.” Journal of Network and Computer Applications,
Volume 34, Issue 1, pp. No. 1-11, Jan 2011.
[12]. S. Ramgovind, M. M. Eloff, E. Smith. “The Management
of Security in Cloud Computing” In PROC 2010 IEEE
International Conference on Cloud Computing 2010.
[13]. M. Jensen, J. Schwenk, N. Gruschka and L. L. Iacono,
"On Technical Security Issues in Cloud Computing." in PROC
IEEE ICCC, Bangalore 2009, pp. 109-116.
[14]. http://www.zurich.ibm.com
BIOGRAPHIES
Aruna Devi. S, working as Assistant Professor
in Saveetha Engineering College, Areas of
interest includes Data Mining, Compiler
Design, Cloud Computing and Big Data
Analytics
Manju A, working as Assistant Professor in
Saveetha Engineering College, Areas of
interest includes Networks, Network Security,
Cloud Computing.

More Related Content

What's hot

A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...IJERA Editor
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingIJMER
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Recordsijtsrd
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Editor IJCATR
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionEditor IJCATR
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...IJCSIS Research Publications
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationIJSRD
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET Journal
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
 
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technologyHealthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technologyIJECEIAES
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringIEEEFINALYEARPROJECTS
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET Journal
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...IJAAS Team
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Editor IJARCET
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServiceYogeshIJTSRD
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 

What's hot (20)

Cloudcomputingthesis
CloudcomputingthesisCloudcomputingthesis
Cloudcomputingthesis
 
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
 
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud ComputingA Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
 
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health RecordsCloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
 
Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption Secure Personal Health Records Using Encryption
Secure Personal Health Records Using Encryption
 
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using EncryptionSecure Sharing of Personal Health Records in Cloud Computing using Encryption
Secure Sharing of Personal Health Records in Cloud Computing using Encryption
 
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
 
Data Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud ApplicationData Stream Controller for Enterprise Cloud Application
Data Stream Controller for Enterprise Cloud Application
 
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...IRJET-  	  A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
IRJET- A Review Paper on an Efficient File Hierarchy Attribute Based Encr...
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technologyHealthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technology
 
Cam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoringCam cloud assisted privacy preserving mobile health monitoring
Cam cloud assisted privacy preserving mobile health monitoring
 
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
 
A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...A study secure multi authentication based data classification model in cloud ...
A study secure multi authentication based data classification model in cloud ...
 
Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932Ijarcet vol-2-issue-3-925-932
Ijarcet vol-2-issue-3-925-932
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud ServicePersonal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
I42024349
I42024349I42024349
I42024349
 
50120140503020
5012014050302050120140503020
50120140503020
 

Viewers also liked

Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labvieweSAT Publishing House
 
Survey and analysis of underground water of five
Survey and analysis of underground water of fiveSurvey and analysis of underground water of five
Survey and analysis of underground water of fiveeSAT Publishing House
 
Performance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wearPerformance of high pressure coolant on tool wear
Performance of high pressure coolant on tool weareSAT Publishing House
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...eSAT Publishing House
 
Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...eSAT Publishing House
 
Fuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingFuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingeSAT Publishing House
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...eSAT Publishing House
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureeSAT Publishing House
 
Online review mining for forecasting sales
Online review mining for forecasting salesOnline review mining for forecasting sales
Online review mining for forecasting saleseSAT Publishing House
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain ofeSAT Publishing House
 
Swarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing anSwarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing aneSAT Publishing House
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack oneSAT Publishing House
 
Diffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractionDiffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractioneSAT Publishing House
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumeSAT Publishing House
 
Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...eSAT Publishing House
 
Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...eSAT Publishing House
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perceptioneSAT Publishing House
 
Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...eSAT Publishing House
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencleSAT Publishing House
 

Viewers also liked (20)

Smart automobile security system using labview
Smart automobile security system using labviewSmart automobile security system using labview
Smart automobile security system using labview
 
Survey and analysis of underground water of five
Survey and analysis of underground water of fiveSurvey and analysis of underground water of five
Survey and analysis of underground water of five
 
Performance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wearPerformance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wear
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...
 
Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...Galerkin’s indirect variational method in elastic stability analysis of all e...
Galerkin’s indirect variational method in elastic stability analysis of all e...
 
Fuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingFuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecasting
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...
 
Reconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architectureReconfigurable and versatile bil rc architecture
Reconfigurable and versatile bil rc architecture
 
Online review mining for forecasting sales
Online review mining for forecasting salesOnline review mining for forecasting sales
Online review mining for forecasting sales
 
Technological and cross border mixture value chain of
Technological and cross border mixture value chain ofTechnological and cross border mixture value chain of
Technological and cross border mixture value chain of
 
Swarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing anSwarm robotics for intelligent warehousing an
Swarm robotics for intelligent warehousing an
 
Effect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack onEffect of anions in seawater to corrosion attack on
Effect of anions in seawater to corrosion attack on
 
Diffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extractionDiffusion rate analysis in palm kernel oil extraction
Diffusion rate analysis in palm kernel oil extraction
 
Experimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminumExperimental study on ultrasonic welding of aluminum
Experimental study on ultrasonic welding of aluminum
 
.Net compiler using cloud computing
.Net compiler using cloud computing.Net compiler using cloud computing
.Net compiler using cloud computing
 
Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...Production of lactic acid from sweet meat industry waste by lactobacillus del...
Production of lactic acid from sweet meat industry waste by lactobacillus del...
 
Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...Costomization of recommendation system using collaborative filtering algorith...
Costomization of recommendation system using collaborative filtering algorith...
 
An understanding of graphical perception
An understanding of graphical perceptionAn understanding of graphical perception
An understanding of graphical perception
 
Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...Noise reduction in speech processing using improved active noise control (anc...
Noise reduction in speech processing using improved active noise control (anc...
 
Parallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using openclParallel k nn on gpu architecture using opencl
Parallel k nn on gpu architecture using opencl
 

Similar to Enhancing security features in cloud computing for healthcare using cipher and inter cloud

Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionIRJET Journal
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...eSAT Journals
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data securityeSAT Publishing House
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET Journal
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Journals
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniqueseSAT Publishing House
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET Journal
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING Akshay Mittal
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudIRJET Journal
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET Journal
 
A Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud SecurityA Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud Securityijsrd.com
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...IJCNCJournal
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd Iaetsd
 
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARETRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCAREMervat Bamiah
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentIRJET Journal
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. IJCERT JOURNAL
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...IRJET Journal
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
 

Similar to Enhancing security features in cloud computing for healthcare using cipher and inter cloud (20)

Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data EncryptionCloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud ComputingIRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
Survey on cloud computing security techniques
Survey on cloud computing security techniquesSurvey on cloud computing security techniques
Survey on cloud computing security techniques
 
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using CloudIRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
 
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING DIGITAL HEALTH:  DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
 
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in CloudAnonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
 
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
 
A Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud SecurityA Third Party Auditor Based Technique for Cloud Security
A Third Party Auditor Based Technique for Cloud Security
 
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
APPLYING GEO-ENCRYPTION AND ATTRIBUTE BASED ENCRYPTION TO IMPLEMENT SECURE AC...
 
Iaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal healthIaetsd scalable and secure sharing of personal health
Iaetsd scalable and secure sharing of personal health
 
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARETRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
TRUSTED_CLOUD_COMPUTING_FRAMEWORK_FOR_HEALTHCARE
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud EnvironmentSmart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
 
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRUSurvey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 

Enhancing security features in cloud computing for healthcare using cipher and inter cloud

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 200 ENHANCING SECURITY FEATURES IN CLOUD COMPUTING FOR HEALTHCARE USING CIPHER AND INTER CLOUD Aruna Devi. S1 , Manju.A2 1, 2 Assistant Professor, Department of Computer Science and Engineering, Saveetha Engineering College, Tamilnadu, India Abstract Health Care is the most important unindustrialized field. Cloud is an emerging trend in software industry. In medical field, there are large dataset comprising highly sensitive data about patient’s medical records. Based on these records, diagnosis for the patient will be given. Moving data to the cloud makes to explore a large information for diagnosis as expert documentation will also be stored as part of health record. Physicians from anywhere at any time can get access over these reports for better treatment. The Medicare industry vacillates to store these data to the cloud as the patients might feel insecure about their health records. This work introduces the idea of combining Cipher Cloud, Inter Cloud and ABE schemes, proposes an innovative method to enhance security features in the cloud by double encryption using algorithms and tools. By this, only authorized entities are proficient of accessing these records. Rather than storing data in single cloud, Inter Cloud (Multi-cloud) also adds advantage for our proposed work. Keywords: Virtualization, Cipher cloud, Trust, Encryption, Inter cloud --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Cloud computing is an emerging trend in software field as it focuses on shared resources. Application areas of cloud computing are not only limited to IT field but also extended for e-Government, Healthcare, e-Business, Libraries etc., Cloud computing purely relies on virtualization, which increases the infrastructure deployment in reduced cost and IT operations are scampered up. On-demand access attracts more number of users towards cloud. Cloud imposes pay-per-use model. Users tend to pay only for actually consumed resources. The resources stored in cloud can be accessed anywhere anytime. Fig.1 visualizes cloud deployment models and its services such as SaaS (Software as a Service), PaaS (Platform as a Service), and IaaS (Infrastructure as a Service). Cloud can be called as EaaS (Everything as a Service). Fig. 2 gives the different types of cloud viz. Public cloud, Private cloud, Community cloud, Hybrid cloud. Yet, in the beginning people falter to use cloud because of the security and privacy concerns while storing the highly confidential and sensitive data into the cloud. Moving to cloud in Health Care is the major challenge rather than other fields because of the above stated reason. So, we are proposing architecture to overcome the pitfalls in the cloud by moving to cipher cloud. Fig. 1 Cloud Deployment Model Fig. 2 Types of Cloud
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 201 In this paper we combine the topics of cloud computing and trust in the cloud which can be called as cipher cloud. We discuss how security can be imposed in a cloud so that highly sensitive data in all fields can be stored in a cloud without any hesitation. This offers cloud service providers the possibility to penetrate market areas where higher security requirements need to be met. For achieving this, we extended the inter cloud and cipher cloud models. The paper is structured as follows. First, we briefly introduce basics of cloud computing with its deployment models and services rendered by it. Section 2 deals with the related work from the literature. A motivation behind cloud computing in Healthcare is also provided. In Section 3, we discuss about the proposed work in which cipher cloud architecture is combined with inter cloud models to enhance data security and reliability. Section 4 presents the methodology to achieve the above. Section 5 draws some concluding remarks and some ideas for future work. 2. RELATED WORK In [3], the authors describe various applications of cloud computing over Healthcare, its implications. Patients and health organizations take advantages of the new technology by improving patients quality of service through a distributed high-integrated platform (Wang, 2010), coordinating of medical process as well as reducing IT infrastructure investment or maintenance costs which leads to a better healthcare environment. Concentrating on the Global Market for Cloud Computing in Healthcare, IT industries invest heavily to build infrastructure for cloud to support it and help organizations take benefit from it. The rate of increase in adopting cloud is directly proportional to the rate of achieving greater efficiencies. This results in providing extraordinary sharing capabilities between the healthcare organizations and patients alike. The Challenges of Cloud Computing in Health Care is mostly due to two important concerns associated with security and interoperability (Sanjay P. Ahuja 2012). By taking advantage of solutions available, the above mentioned issues can be overcome. This leads to movement towards cloud and taking advantage of the solutions it provide. Since Healthcare data is highly confidential, its privacy and security concerns need to be tackled. Security concerns can be addressed by following Health Insurance Portability and Accountability Act (HIPAA) when moving health record to the cloud. The healthcare data comprises of sensitive information yet migration of the medical records to the cloud ( third party ) may be trusted. To prevent uncovering of information to unauthorized persons, security activities such as imposing access controls, providing authentication, checking authorization can be done. These issues are an obstacle that have slowed the cloud implementation and should be addressed in order to enable the trustworthiness of cloud systems. Interoperability is also another concern to be dealt with when moving data to outside provider. This arises because of diverse data modeling constructs adopted in different Medicare organizations which leads to different database designs, implementation, management, platforms, programming languages and incompatible systems. The Healthcare systems interoperability may occur either at the provider, or software, or computer, or data levels and /or system integration. Ming Li(2013), describes a novel patient centric framework and mechanisms for data access control to PHRs stored in semi-trusted servers. Attribute-Based Encryption (ABE) technique was used to encrypt each patient’s PHR file. It exploits multi-authority ABE for the privacy of patient’s by dynamic modification of access policies. Revoking of access policy is not possible at all the moments and the attributes which were known to the user leads to privacy concern. In Attribute-based encryption [2], the owner of data has to predefine the attributes based on which the encryption needs to be done. The number of users in the system doesn’t matters. Each attribute has public key, secret key, and a random polynomial, so different users cannot combine their attributes to recover the data, and different users cannot carry out collusion attacks. Only the user who possesses the authorized attributes can satisfy the access policy to decrypt data. The access policy contains a boolean formula such as AND, OR et al. which can let the access structure be flexible to control users' access. Almost all key generation schemes used by authority are prevailing. Since these schemes contain the authority that just suits the private cloud environments, the authority should be removed in the future. 3. PROPOSED WORK Data encryption should be adopted to enforce privacy policies in the cloud since the cloud server is no longer assumed to be fully trusted. In ABE scheme, as the number of users’ increases, their attributes for generating cryptographic keys also increases and this leads to complexity in key management. In the proposed work, for ensuring security, encryption tools are used along with attributes of user. Usage of tools overcomes the complexity in key management in ABE schemes. So we are proposing architecture by combining the concepts of cipher cloud and ABE in which the PHR encrypted by encryption tool is again encrypted by using attribute based encryption (ABE).
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 202 3.1 Methodology Our methodology implements security in two stages. In stage 1, the PHR is encrypted by tools such as TrueCrypt 7.0 / Boxcryptor 1.0 and stored into cloud. In stage 2, the encrypted PHR is encrypted by the cloud service provider using attributes of user. The architecture of our proposed work is given in Fig.3. The user consults doctor and the doctor generates Personal Health Record which comprises the patient’s history of health issues, symptoms, diagnosis undergone. This PHR is encrypted by encryption tools such as TrueCrypt / Boxcryptor and stored into cloud. Again this encrypted PHR is encrypted using the attributes of user. In order to manage the keys generated, inter cloud is taken into account to minimize the complexity. When the patient is under treatment, his/her PHR is retrieved from cloud by decrypting it with key and tools. This can be used for further references and helps in diagnosis. 1 Encryption / Decryption by Encryption tool 2Encryption using attributes of user 3Key Sharing Fig.3 Architecture of Proposed System TrueCrypt 7.0 is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). Without user intercession, the data is automatically encrypted or decrypted right before it is loaded or saved. Only by using the correct keyfile / password or encryption key, the stored encrypted data can be decrypted (read).Not only the data in file gets encrypted but also the meta data, file name, folder name and everything related to the file will be encrypted. In addition to resilient and translucent encryption, TrueCrypt also creates more secure (and obscured) file protection by creating hidden volumes within encrypted volumes. Since online backup is increasingly popular, Boxcryptor 1.0 tool allows the user to create an encrypted folder of the user’s PHR and synchronizing that folder with cloud provider. This improves privacy as even a third-party gets the PHR, the encrypted folder can be decrypted only by the user and their relatives. The cloud service provider needs to manage this software as a service. Once the encrypted PHR stored into cloud, the CSP encrypts their record by using user’s attributes which results in more secured data storage in the cloud. Whenever the PHR is needed by the physician for diagnosis, he/she will decrypt the record using the attributes of concerned patient and then it is decrypted automatically by TrueCrypt/ Boxcryptor software by using correct password. This system is more secure as encryption and decryption are done twice by software and attributes. Complexity in key management can be reduced by having managing resources in another cloud so that key management and secured storage will be carried over in separate clouds. This needs inter cloud implementation. 4. CONCLUSIONS In this paper, we have proposed a novel framework to realize patient-centric privacy for personal health records in cloud computing. Patients themselves encrypt the data using encryption tools and their attributes are used for double encryption by CSP. The framework addresses the challenges brought by multiple PHR owners and users, by reducing the complexity of key management when the number of owners and users in the system is large. We utilize encryption tools and multi-authority attribute-based encryption to encrypt the PHR data. The work can be extended by enhancing the features of inter cloud while storing the data. REFERENCES [1]. Ming Li, Shucheng Yu, Yao Zheng, Kui Ren, and Wenjing Lou, “Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption” , IEEE Transactions on Parallel and Distributed Systems, (Vol. 24 No. 1) pp. 131-143, Jan. 2013. [2]. Cheng Chi Lee, Pei-Shan Chung, and Min-Shiang Hwang, “A Survey on Attribute-based Encryption Schemes of Access Control in Cloud Environments”, International Journal of Network Security, Vol.15, No.4, PP.231-240, July 2013. [3]. Sanjay P. Ahuja, Sindhu Mani & Jesus Zambrano, “A Survey of the State of Cloud Computing in Healthcare”,
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 203 Network and Communication Technologies; Vol. 1, No. 2; 2012. [4]. Rolim, C.O, Koch, F.L. ; Westphall, C.B. ; Werner, J. ; Fracalossi, A. ; Salvador, G.S, ”A Cloud Computing Solution for Patient’s Data Collection in Health Care Institutions”, Second International Conference on eHealth, Telemedicine, and Social Medicine, pp. 95 - 99 , 2010. [5]. Ming Li, Shucheng Yu, Kui Ren, Wenjing Lou, “Securing Personal Health Records in Cloud Computing: Patient-centric and Fine-grained Data Access Control in Multi-owner Settings”, Social Informatics and Telecommunications Engineering, Volume 50, pp 89-106, 2010. [6]. Wang, X. (2010). Application of Cloud Computing in the Health Information System. Computer Application and System Modeling(ICCASM).Retrievedfromhttp://ieeexplore.ieee.org/s tamp/stamp.jsp?tp=&arnumber=5619051 [7]. M. Armbrust, A. Fox, R. Grith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing," Communications of the ACM,vol. 53, pp. 50,58, 2010. [8]. J. Bethencourt, A. Sahai, and B. Waters, ”Ciphertext- policy attribute-based encryption," in Proceedings of IEEE Symposium on Security andPrivacy, pp. 321V334, 2007. [9]. P. Kresimir and H. Zeljko "Cloud computing security issues and challenges." In PROC Third International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services, 2010, pp. 344-349 [10]. B. Grobauer, T. Walloschek and E. Stöcker, "Understanding Cloud Computing Vulnerabilities," IEEE Security and Privacy, vol. 99, 2010 [11]. S. Subashini, and V. Kavitha. (2010) “A survey on security issues in service delivery models of cloud computing.” Journal of Network and Computer Applications, Volume 34, Issue 1, pp. No. 1-11, Jan 2011. [12]. S. Ramgovind, M. M. Eloff, E. Smith. “The Management of Security in Cloud Computing” In PROC 2010 IEEE International Conference on Cloud Computing 2010. [13]. M. Jensen, J. Schwenk, N. Gruschka and L. L. Iacono, "On Technical Security Issues in Cloud Computing." in PROC IEEE ICCC, Bangalore 2009, pp. 109-116. [14]. http://www.zurich.ibm.com BIOGRAPHIES Aruna Devi. S, working as Assistant Professor in Saveetha Engineering College, Areas of interest includes Data Mining, Compiler Design, Cloud Computing and Big Data Analytics Manju A, working as Assistant Professor in Saveetha Engineering College, Areas of interest includes Networks, Network Security, Cloud Computing.