SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 224
AUTHENDICATION PERMISSION GRANTING ALGORITHM FOR
TRANSACTION OF SENSITIVE INFORMATION USING QR CODE
J. Sharon Chella Priyanga1, A.S Balaji2
1PG Student, Dept. of Computer Science and Engineering, Anand Institute of Higher Technology,
Tamil Nadu, India.
2Assistant Professor, Dept. of Computer Science and Engineering, Anand Institute of Higher Technology,
Tamil Nadu, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - A remote data integrity document is highly
confidential data stored in the cloud. Encrypting the whole
shared file can discern the confidentialinformationhiding, but
still this shared set of file will be unable to be accessed by third
party. A remote document reference id automaticallyconverts
to the QR code can be scanned by the entity module. The
access to the shared remote data integrity is permitted to
download the particular documentintegritythatrealizes data
sharing with sensitive information hiding. ImplementingRFID
techniques can emerge a problem, where the liquid and metal
surfaces tend to reflect radio waves. When this RFID reader
reads the information in case the tags are installed inliquid or
metal products becomes tedious process. IntroducingQR-code
generate algorithm documents can be remotely stored in
the cloud and realize the data sharing with other entities
which also contains some sensitive data. QR code proves to be
too expensive for many applications as compared to other
tracking and identification methods, such as the simple
barcode. The sensitive information should not be exposed to
third party entities when the cloud file is shared. Signatures
are used to verify the file in the phase of integrity to realize
data sharing with sensitive information hiding in remotedata
integrity.
Key Words: Cloud storage; Data sharing; Data integrity
auditing; confidential information hiding.
1. INTRODUCTION
Nowadays context-aware applications have multiply with
the increasing popularity of smart phones and are prepare
with a different sensor types namely GPS,light,microphone,
accelerometers, and proximity sensors. Thesesensorscould
sense the surroundings and the status regarding to a
Smartphone, and the sensed data can be used to infer the
present context or the behavioroftheuser.Forexample, GPS
data can provide information about location
By using the contexts, an increasing number of applications
on smart phones are designed and developed to provide
personalized context aware services.
Examples of such context-aware applicationsL.Zhangand X.
Wang are with the Ministry of Education Key Laboratory for
Modern Teaching Technology, Xi’an710062,China,and with
the School of Computer Science, Shaanxi Normal University,
Xi’an 710119, and China. Z. Cai is with the Department of
Data mining is the procedure of finding patterns in
large data sets that implicate the intersecting the concept of
database systems and statistics, machine learning. In
addition for field like businesses, data mining isusedtolearn
and understand the patterns and relationships in thedata in
order to proceed by uttering better business decisions.
A cloud refers to an environment that is designed for the
purpose of remotely provisioning scalable and measured IT
resources. Where the network providing remote access to a
set of decentralized IT resources.
The idea behind the project is to design an mobile
application for Data Sharing through cloud storage service,
users can remotely store their data to the cloud and realize
the data sharing with other entities which also contains
some sensitive data.
The sensitive informationshouldensureitisretrievedby the
authenticated user when the cloud file is shared. In this
scheme, a sanitizer is used to sanitize the information
corresponding to file and transforms these information's
signatures into valid ones for the sanitized file.
These signatures are used to check the rectitude of the
sanitized file in the phase of integrity auditing. In data
sharing between two entities in cloud one part hospital
management to treat as the admin part and then patient to
treated as the user part. Admin to upload the medical record
in our cloud (Data and patient ID) then search the particular
patient id and medical document reference id automatically
convert to the QR code then just scan user module then
download the particular document.
The main advantage is to have more secured transition
between two sides, more flexible, easy-access;finallywecan
download the document as a free report. In existing system
they have used RFID technology which is not suitable for
more sensible data storing and not compact for all sectors.
There are many organizations and individuals who might
like to store their data in the cloud. However, thedata stored
in the cloud might be corrupted or lost due to the inevitable
software bugs, hardware faults and human errors in the
cloud Providing Security for the medical documentusing QR
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 225
code base Android application. Where User can store their
documents in cloud
Which will be converted into QR code which can be
downloaded by the particular person who have gained the
access to the document and they can share it with the
corresponding entities. This brings the trust worthy among
the users to upload their catalogue in cloud where admin
uploads the document along the reference id which then
automatically generates the QR code.
A remote data integrity document is suggested to
assurance the integrity of the highly confidential data stored
in the cloud. Encrypting the whole sharedfilecandiscern the
confidential information hiding, but still this shared set of
file will be unable to be used by any other third party.
User can store their documents in cloud which will be
converted into QR code which can be downloaded by the
particular person who have the access todocumentandthey
can share it with the person whom they are willing to.
In order to verify whether the data isstoredcorrectlyinthe
cloud, many remote data integrity checking schemes have
been proposed.
In remote data integrity auditing schemes, the data owner
firstly needs to generate signatures for data blocks before
up-loading them to the cloud. These shared data stored in
the cloud might contains some sensitive information of the
patient such as patient’s name, telephone number and ID
number, etc. and it might also contain some hospital’s
Sensitive information relating to hospital details such as
hospital’s name, etc.. Hence patient and hospital details will
be inevitably exposed to the cloud and the researchers.
Hence, it is necessary to accomplish remotedata integrity on
the condition that the sensitive information ofshareddatais
protected.
To solve this problem efficiently, we can initially, encrypt
the whole shared document before transferring it to the
cloud, secondly generate the signature that is used to check
the integrity of this encrypted file, and then upload the
encrypted file with its correspondingsignaturestothecloud.
Using this method the sensitive information hiding can be
decrypted by the owner of the document. Hence it prevents
unauthorized access.
The result that we try to attain is, it is impractical to hide
sensitive information by encrypting the whole shared
document.
Figure 1.1
PROBLEM STATEMENT
Remote data integrity documents are suggested to
assurance the integrity of the highly confidential data stored
in the cloud. Encrypting the whole sharedfilecandiscern the
confidential information hiding, but still this shared set of
file will be unable to be used by the other enties. We
introduce a remote document reference id automatically
convert to the QR code then just scan user module. Were
access is permitted to download the particular document
integrity that realizes data sharing with sensitive
information hiding. Signatures are used to verify the file in
the phase of integrity auditing.
1.1 OBJECTIVE
User can store their documents in cloud generating a QR-
code where the document will be hidden in this QR-code
that can be downloaded by the particular personwhohave
the authenticated key to access the document.
1.2 SCOPE
 Easily send the auditing documents in QR
code.
 Medical field, where the patients documents
can be viewed by the particular concern doctors.
 private message sharing and document
authentication using QR code
 Auditing field, where the business deals can
be maintained with high security.
 Army, navy, air force, the countryisour pride
where there is a necessary to maintain the highly
confidential document with high privacy.
 In addition this idea can also be used in the
research filed preventingfromunauthorizedaccess.
2. OPEN HANDSET ALLIANCE
The open handset alliance (OHA) is a business alliance
to develop open standard. By developing this technologies
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 226
will lower the cost of developing the mobile devices and
services.
ANDROID ARCHITECTURE
The software stack is split into Four Layers:
1. The application layer
2. The application framework
3. The libraries and runtime
4. The kernel
1. THE APPLICATION LAYER
This application layer is the upper layer in android
architecture. The applications features like Google map,
browsers, scanners, SMS messaging tools browsers, phone
contacts, navigation applications and calendars works with
end users with the help of applicationframework tooperate.
2. APPLICATION FRAMEWORK
In application frame work the classes and services are
mandatory for developing the application. Where the
developers are given access to reuse and extend their
components which is already present in API. Managers are
enabled in this application for accessing the data.
(i) ACTIVITY MANAGER:
The lifecycle of the application is managed by this
activity manager. Enabling the proper management for all
activities. Meanwhile thisactivityiscontrolledbytheactivity
manager.
(ii) RESOURCE MANAGER:
Resource manager enables the access to non-code
resources like graphics etc.
(iii) NOTIFICATION MANAGER:
It activates all application’s to be display under the
custom alerts in status bar.
(iv) LOCATION MANAGER:
It triggers alerts immediately user enters or leaves a
specified geographical location.
(v) PACKAGE MANAGER:
It is used to retrieve the data that is about to installed
packages on a particular device.
(vi) ACTIVITY MANAGER:
The lifecycle of the application is managed bythisactivity
manager. Enabling the proper management for all activities.
Meanwhile this activity is controlled bytheactivitymanager.
(vii) WINDOW MANAGER:
It creates views and layouts. Used to create the user
interface modules.
(viii) TELEPHONY MANAGER:
It is used to handle setting the information about all the
services device and for setting the network connection
(ix) ANDROID RUNTIME:
The android applications areexecutedinthissection.
Because android has its own virtual machine
I.e. DVM (Dalvik Virtual Machine), whichisdesigned and
used for execution of the android application. Where users
are given access to execute multiple applicationsat thesame
time.
3. LIBRARIES:
Android provide their own libraries which is written
using C/C++. These libraries are not given access to enable
directly. Hence application framework is used to enable the
access, they are provided with many libraries such as access
web browsers, libraries and, video format.
4. LINUX KERNEL:
This layer is the main layer for android architecture
because it provides service like memory management,
security, power management. This layer is used for better
binding for hardware and software to provide good
communication between them.
3. SECURITY
Android is a multi-process system, in which each
application is executed in its own process. The most
of the securities between applications and the system is
enforced at the process level through standard Linux
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 227
facilities, such as user and group IDs that are assigned to
applications.
Android provides flexibility becauseit wasdesigned with the
multilayer architecture hence it provides the security from
the attackers.
4. LIMITATIONS OF ANDROID:
Development requirements in
Java Android SDK Eclipse IDE (optional)
5. DISADVANTAGES
However, the current state of employing digital
humanities in teaching most innovative developments that
have taken the Internet from passive desktop publishing to
‘social media’ or from text to 3D immersive virtual realities.
Encrypting the shared file will realize the sensitive
information hiding, which cannot be used by others. Less
security hence, not trustable.
6. PROPOSED SYSTEM:
We propose a remote data integrity that realizes data
sharing with sensitive information hiding using QR code.
We hide the highly confidential documentusingtheQRcode.
In data sharing between two entities in cloud one part
hospital management to treat as the admin part and then
patient to treated as the user part. Admin to upload the
medical record in cloud (Data and patient ID) then search
the particular patient id and medical document reference id
automatically convert to the QR code then just scan user
module then download the particular document. The main
advantage is to have more secured transition between two
sides, more flexible,easy-access;finallywecandownloadthe
Document as a free report. A sanitizer is used to sanitizethe
data blocks containing any sensitive information of the file
and transforms these data blocks’ signatures into valid ones
for the sanitized file.
These signatures are used to verify the integrity of the
sanitized file in the phase of integrity of QR code generate
Algorithm.
QR code proves to be too expensive for many applications
as compared to other tracking and identification methods,
such as the simple barcode.
FEATURES OF QR-CODE:
High data encoding capacity:
The maximum QR code symbol can encode about
7089 characters.
High-speed scanning and reading:
QR code reader can recognize as many as QR code
symbols this helps them to read the data fast.
Capable of reading Japanese and Chinese encoding:
QR codes can also read Japanese and Chinese
characters as fast as English characters. Because the QR
code system was invented by the Japanese company
during the year 1994 for the purpose of tracking vehicles
along with it, it was also designed with the high speed
component scanning.
Can be read from any direction:
It is a matrix of 2D code, and it is possible to scan and
read the data from any direction.
7. MODULES
1. Registration
2. QR Code Generator
3. File Hiding
(a) The Correctness
(b) Sensitive Information Hiding
(c) Correctness Soundness
4. QR Code Scanner
5. File Sharing
6. Request for Permission
(a) Setup
7. Permission Generation
(b) Extract
(c) SigGen
1. REGISTRATION:
The modules describe signuppagecontainsemail idor
user name, password and conform password those kind
of details form the client should be stored in database.
Login screencontainsemail idorusernameand
password when the user to login the app it should
retrieve the data from the database and combine based
on user input if its match user name and password to
allow in the user to login otherwise alert and show a
message to the user.
2. QR CODE GENERATOR:
This module Used to Generate the QR- code for the User
enters Key and additionally what kind of data likes text,
image, etc.
3. FILE HIDING:
(a) The Correctness
(b) Sensitive Information Hiding
(c) Correctness Soundness
(a) THE CORRECTNESS:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 228
 The correctness has the three necessary
procedures which is followed one after the
other systematically
 Checking for the Private Key correctness
 The correctness of the blinded file and for its
corresponding signatures
(b) SENSITIVE INFORMATION HIDING:
 The user ID of a patient takes the input as
the original file F along with the user’s
private key Skid and outputs the blinded file
F
(c) CORRECTNESS SOUNDNESS:
To assure that if the cloud does not truly store
user’s intact sanitized data, it cannot pass the TPA’s
verification.
4. QR CODE SCANNER:
In, Additionally One type of application name as (QR-
droid) used in this project. QR-droid is used to scan the
any kind of User QR-code. Initially, User1 generate the
QR-code after that QR-code is sent to the User 2. Then
User2 Scan the QR-code and get the key.
5. FILE SHARING
(a) File uploading:
In this Module used to upload the document, the user 1
knowing the key, and what kind of data to be upload from
gallery to Server. Finally the data and key to uploaded to
the Server.
(b) File downloading:
In this Module Explain that, After Getting the Key from
User 2 then Enter the key in Download Process and Get the
File from Server.
6. REQUEST FOR PERMISSION:
In this request for permission Phase the PKG i.e.
(Primary key Generation) is generated by the client. This
PKG is trusted by other entities. It is responsible for
generating system public parameters and the private key
for the user according to his identity ID. This PKG run the
setup algorithm. It takes input as a security parameter (k).
Then outputs the master secret key MSK and the system
public parameters pp.
The user say for example, from the client side must
request for the patient report, this request is sent to the
admin portal, once this admin portal is viewed by the
admin and the access is permitted to the client, then
patient report hidden in the QR code is generated in the
patient portal. Now the patient can scan the QR code and
allowed to download the patient report.
STEP 1: Setup algorithm run by the PKG. It takes as input a
security parameter k. It outputs the master secretkeyMSK
and the system public parameters pp.
7. PERMISSION GENERATION:
The admin will grant the TPA (Third Party Authentication)
which is the public verifier. It is in-charge of verifying the
integrity of the data stored in the cloud on behalf of users.
PKG runs the extraction algorithm, where It takes the
system public parameters pp, themastersecretkeyMSKand
the user’s identity ID as input, and outputs the user’s private
key SKID.
The user can verify the correctness of SKID, only if it
passes the verification, then the QR code is generated in the
client’s portal; if the correctness is mismatched then the QR
code will not be generated in the client’s portal.
STEP 2: PKG perform extraction Taking input as,
system public parameters pp,themastersecretkeymsk,and
a user’s identity ID. It outputs the user’s private key skID.
The user can verify the correctness of skID and accept it as
his private key only if it passes the verification.
STEP 3: For each user ID requested for the patient
report assigns input as, the original file F, the user’s private
key SKID, the user’s signing private key ssk and the file
identifier name. And outputs a blinded file F*, along with its
corresponding signature set Φ.
8. ALGORITHM
(a) MERKLE HASH TREES ALGORITHM:
The aim of the algorithm is to verify the integrity
of the data stored in the cloud. The x hold elementsin Z*p
and G1 hold the elements such as µ0, µ1, µ2..., µn, g2
from a public value. The data stored in the cloud can be
retrieved and the integrity of these data can be ensured
based on pseudo random function and BLS signature.
The data integrity of the cloud is verified by the
following:
One large prime p contains Multiplicative cyclic groups
with order p
The Multiplicative cyclic groups G1, G2 are mapped by
bilinear pairing map
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 229
e: G2 F(X) G1 × G1
The original file F, such as F = {m1, m2, ..., mn} is blinded
by the cryptographic hash function: G1 H : {0,
1}*
The key is generated for the set of indexes of the data
blocks corresponding to the personal sensitive
information is indicated as K1
Φ = {σi}1≤i≤n the signature is generated for thesetofthe
blinded file F*
The msk (master secret key) and skID (private key of the
user ID) is generated in hash function G1 H : {0,
1}*
The F* = {m*1, m*2, ..., m*n} the blinded file F* is ready
to be sent to the sanitizer
Φ 0 = {σ 0 i}1≤i≤n the signature is generated for the set
of the sanitized file F0
Then the key is generated for the set of the indexes of the
data blocks corresponding to the organization’ssensitive
information
Finally, F0 = {m01, mo2, ..., m0n} the sanitized file F0
stored in the cloud
(b) AUTHENDICATION PERMISSION GRANTING
ALGORITHM:
STEP 1: Setup algorithm run by the PKG. It takes as
input a security parameter k. It outputs the master secret
key MSK and the system public parameters pp.
STEP 2: PKG perform extraction Taking input as,
system public parameters pp,themastersecretkeymsk,and
a user’s identity ID. It outputs the user’s private key skID.
The user can verify the correctness of skID and accept it as
his private key only if it passes the verification.
STEP 3: For each user ID requested for the patient
report assigns input as, the original file F, the user’s private
key SKID, the user’s signing private key ssk and the file
identifier name. And outputs a blinded file F*, along with its
corresponding signature set Φ.
9. FUTURE ENHANCEMENT
In future it will have more feature like Online chat,
video calling and these are used to get the details within the
minute. We are going to develop an Advance learning
system, which adopts the designed scheme to trace visitors’
trajectories in our campus. Besides, we are now going to
apply the designed scheme to analyze sport postures.
TECHNIQUE DEFINITION:
Human SegmentationAlgorithm wheretheHumanregion
segmentation algorithmfor real-timevideo-call applications.
Unlike conventional methods, the segmentation process is
automatically initialized and the motion of cameras is not
restricted. To be precise, our method is initialized by face
detection results and human/background regions are
modelled with spatial color Gaussian mixture models
(SCGMMs).
EXTR ADVANTAGES:
 User friendly
 It will take less time to transfer huge
volume of data.
 Efficient and secure to share the highly
confidential documents
10. CONCLUSION:
We used two layer QR code. This 2LQR code is of
two levels namely public level and private level.
The public level QR code can be read by any QR code
reading application. But the private level QR code
needs a specific application with specific input
information. And this private level QR code is created
by replacing black modules along with some specific
textured patterns. Any standard QR code reader
consider the textured pattern as a black modules thus
the private level is invisible to standardQRcode readers
and this private level QR code does not affect any of the
public levels
REFERENCES
1) Xiaojun Chen and Jea H. Choi. (2010), ‘Security
and Privacy in Mobile Social Networks: Challenges
and Solutions’13 Volume 3, No. 1.
2) HsinyiPeng and Po-Ya Chuang. (2012), ‘Ubiquitous
Performance-support System as Mind tool: A Case
Study of Instructional Decision Making and
Learning Assistant’ Educational Technology &
Society, 12 (1), 107–120.
3) M. C. Mayorga Toledano. (2006), ‘Learning objects
for mobile devices: A case study in the Actuarial
Sciences degree’ Current Developments in
Technology-Assisted Education
4) Z. Baharav and R. Kakarala.(2013), Visually
significant QR codes: Image blending and statistical
Analysis. In Multimedia and Expo (ICME), IEEE
International Conference on, pages 1–6.
5) C. Baras and F. Cayre. (2012),2D bar-codes for
authentication: A security approach. In Signal
Processing Conference (EUSIPCO), Proceedings of
the 20th European, pages 1760–1766.
6) T. V. Bui, N. K. Vu, T. T.P. Nguyen, I. Echizen, and T.
D. Nguyen.Robust message hiding for QR
code.(2014) In Intelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP), Tenth
International Conference on, IEEE pages 520–523.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 230
7) B. A. M. Hoang, W. Sawaya, and P. Bas.(2014)
Documentauthentication using graphical codes:
Reliable performance analysis and channel
optimization. EURASIP Journal on Information
Security.
8) T. Langlotz and O. Bimber.Unsynchronized 4D
barcodes.(2007) In Advances in Visual Computing,
Springer, pages 363–374.
9) C.-Y. Lin and S.-F.Chang.(1999)Distortionmodeling
and invariant extraction for digital image print-
and-scan process.In Int. Symp.Multimedia
Information Processing.
10) P.-Y. Lin, Y.-H. Chen, E. J.-L. Lu, and P.-J.Chen.(2013)
Secret hiding mechanism using QR barcode. In
Signal-ImageTechnology&Internet-BasedSystems
(SITIS), IEEE, International Conference on, pages
22–25.
BIOGRAPHIES
J. Sharon Chella Priyanga is PG Student at
Anand Institute of Higher Technology at
Chennai
Her area of interest includes Data mining,
Cloud computing, cryptography.
A,S Balaji is presently working as a
Assistant Professor in Anand
Institute of Higher Technology at Chennai.
His area of interest includes Computer
networks and Security, Cloud computing,
Wireless sensor networks and Software
Engineering etc.

More Related Content

What's hot

IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET Journal
 
A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time andijcseit
 
finalreportsoarnew (1).pdf
finalreportsoarnew (1).pdffinalreportsoarnew (1).pdf
finalreportsoarnew (1).pdfFirozkumar2
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET Journal
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...IJSRED
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET Journal
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Dalton Valadares
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardYogeshIJTSRD
 
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET Journal
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 

What's hot (16)

healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...healthcare supervising system to monitor heart rate to diagonize and alert he...
healthcare supervising system to monitor heart rate to diagonize and alert he...
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...
 
A smart, location based time and
A smart, location based time andA smart, location based time and
A smart, location based time and
 
firozreport.pdf
firozreport.pdffirozreport.pdf
firozreport.pdf
 
finalreportsoarnew (1).pdf
finalreportsoarnew (1).pdffinalreportsoarnew (1).pdf
finalreportsoarnew (1).pdf
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
Preventing Mirror Problem And Privacy Issues In Multistorage Area With Dimens...
 
Two Aspect Endorsement Access Control for web Based Cloud Computing
Two Aspect Endorsement Access Control for web Based   Cloud Computing     Two Aspect Endorsement Access Control for web Based   Cloud Computing
Two Aspect Endorsement Access Control for web Based Cloud Computing
 
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
IRJET- A Survey on Privacy Preserving Communication Protocol for IoT Applicat...
 
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
Achieving Data Dissemination with Security using FIWARE and Intel Software Gu...
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption StandardData Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
 
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring SystemIRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
IRJET- Authorization for Wearable Biomedical Gadgets Monitoring System
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 

Similar to IRJET- Authendication Permission Granting Algorithm for Transaction of Sensitive Information using QR Code

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET Journal
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityIRJET Journal
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...ijtsrd
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...IRJET Journal
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudIRJET Journal
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Journals
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...eSAT Publishing House
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET Journal
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloudrahulmonikasharma
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODEIRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET Journal
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET Journal
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET Journal
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET Journal
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET Journal
 

Similar to IRJET- Authendication Permission Granting Algorithm for Transaction of Sensitive Information using QR Code (20)

IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
IRJET- Multifactor Authentication in IoT Devices for Ensuring Secure Cloud St...
 
Deep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT SecurityDeep Learning and Big Data technologies for IoT Security
Deep Learning and Big Data technologies for IoT Security
 
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
MULTI-FACTOR AUTHENTICATION SECURITY FRAMEWORK USING BlOCKCHAIN IN CLOUD COMP...
 
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public CloudProxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
Proxy-Oriented Data Uploading & Monitoring Remote Data Integrity in Public Cloud
 
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyLightweight Cryptography Algorithms for Security of IoT Devices: A Survey
Lightweight Cryptography Algorithms for Security of IoT Devices: A Survey
 
[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur[IJCT V3I2P33] Authors: Karandeep Kaur
[IJCT V3I2P33] Authors: Karandeep Kaur
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
 
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud SystemsIRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
IRJET- Secure and Efficient File Sharing and Shared Ownership in Cloud Systems
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
IRJET- Sensitive Data Sharing using QRCODE
IRJET-  	  Sensitive Data Sharing using QRCODEIRJET-  	  Sensitive Data Sharing using QRCODE
IRJET- Sensitive Data Sharing using QRCODE
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
IRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive DataIRJET- Highly Secure Data Chip for Highly Sensitive Data
IRJET- Highly Secure Data Chip for Highly Sensitive Data
 
IRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data StorageIRJET- Attribute based Access Control for Cloud Data Storage
IRJET- Attribute based Access Control for Cloud Data Storage
 
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...IRJET-  	  Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
 
IRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital AssistantsIRJET- Verbal Authentication for Personal Digital Assistants
IRJET- Verbal Authentication for Personal Digital Assistants
 
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
IRJET- Mutual Key Oversight Procedure for Cloud Security and Distribution of ...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

IRJET- Authendication Permission Granting Algorithm for Transaction of Sensitive Information using QR Code

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 224 AUTHENDICATION PERMISSION GRANTING ALGORITHM FOR TRANSACTION OF SENSITIVE INFORMATION USING QR CODE J. Sharon Chella Priyanga1, A.S Balaji2 1PG Student, Dept. of Computer Science and Engineering, Anand Institute of Higher Technology, Tamil Nadu, India. 2Assistant Professor, Dept. of Computer Science and Engineering, Anand Institute of Higher Technology, Tamil Nadu, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - A remote data integrity document is highly confidential data stored in the cloud. Encrypting the whole shared file can discern the confidentialinformationhiding, but still this shared set of file will be unable to be accessed by third party. A remote document reference id automaticallyconverts to the QR code can be scanned by the entity module. The access to the shared remote data integrity is permitted to download the particular documentintegritythatrealizes data sharing with sensitive information hiding. ImplementingRFID techniques can emerge a problem, where the liquid and metal surfaces tend to reflect radio waves. When this RFID reader reads the information in case the tags are installed inliquid or metal products becomes tedious process. IntroducingQR-code generate algorithm documents can be remotely stored in the cloud and realize the data sharing with other entities which also contains some sensitive data. QR code proves to be too expensive for many applications as compared to other tracking and identification methods, such as the simple barcode. The sensitive information should not be exposed to third party entities when the cloud file is shared. Signatures are used to verify the file in the phase of integrity to realize data sharing with sensitive information hiding in remotedata integrity. Key Words: Cloud storage; Data sharing; Data integrity auditing; confidential information hiding. 1. INTRODUCTION Nowadays context-aware applications have multiply with the increasing popularity of smart phones and are prepare with a different sensor types namely GPS,light,microphone, accelerometers, and proximity sensors. Thesesensorscould sense the surroundings and the status regarding to a Smartphone, and the sensed data can be used to infer the present context or the behavioroftheuser.Forexample, GPS data can provide information about location By using the contexts, an increasing number of applications on smart phones are designed and developed to provide personalized context aware services. Examples of such context-aware applicationsL.Zhangand X. Wang are with the Ministry of Education Key Laboratory for Modern Teaching Technology, Xi’an710062,China,and with the School of Computer Science, Shaanxi Normal University, Xi’an 710119, and China. Z. Cai is with the Department of Data mining is the procedure of finding patterns in large data sets that implicate the intersecting the concept of database systems and statistics, machine learning. In addition for field like businesses, data mining isusedtolearn and understand the patterns and relationships in thedata in order to proceed by uttering better business decisions. A cloud refers to an environment that is designed for the purpose of remotely provisioning scalable and measured IT resources. Where the network providing remote access to a set of decentralized IT resources. The idea behind the project is to design an mobile application for Data Sharing through cloud storage service, users can remotely store their data to the cloud and realize the data sharing with other entities which also contains some sensitive data. The sensitive informationshouldensureitisretrievedby the authenticated user when the cloud file is shared. In this scheme, a sanitizer is used to sanitize the information corresponding to file and transforms these information's signatures into valid ones for the sanitized file. These signatures are used to check the rectitude of the sanitized file in the phase of integrity auditing. In data sharing between two entities in cloud one part hospital management to treat as the admin part and then patient to treated as the user part. Admin to upload the medical record in our cloud (Data and patient ID) then search the particular patient id and medical document reference id automatically convert to the QR code then just scan user module then download the particular document. The main advantage is to have more secured transition between two sides, more flexible, easy-access;finallywecan download the document as a free report. In existing system they have used RFID technology which is not suitable for more sensible data storing and not compact for all sectors. There are many organizations and individuals who might like to store their data in the cloud. However, thedata stored in the cloud might be corrupted or lost due to the inevitable software bugs, hardware faults and human errors in the cloud Providing Security for the medical documentusing QR
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 225 code base Android application. Where User can store their documents in cloud Which will be converted into QR code which can be downloaded by the particular person who have gained the access to the document and they can share it with the corresponding entities. This brings the trust worthy among the users to upload their catalogue in cloud where admin uploads the document along the reference id which then automatically generates the QR code. A remote data integrity document is suggested to assurance the integrity of the highly confidential data stored in the cloud. Encrypting the whole sharedfilecandiscern the confidential information hiding, but still this shared set of file will be unable to be used by any other third party. User can store their documents in cloud which will be converted into QR code which can be downloaded by the particular person who have the access todocumentandthey can share it with the person whom they are willing to. In order to verify whether the data isstoredcorrectlyinthe cloud, many remote data integrity checking schemes have been proposed. In remote data integrity auditing schemes, the data owner firstly needs to generate signatures for data blocks before up-loading them to the cloud. These shared data stored in the cloud might contains some sensitive information of the patient such as patient’s name, telephone number and ID number, etc. and it might also contain some hospital’s Sensitive information relating to hospital details such as hospital’s name, etc.. Hence patient and hospital details will be inevitably exposed to the cloud and the researchers. Hence, it is necessary to accomplish remotedata integrity on the condition that the sensitive information ofshareddatais protected. To solve this problem efficiently, we can initially, encrypt the whole shared document before transferring it to the cloud, secondly generate the signature that is used to check the integrity of this encrypted file, and then upload the encrypted file with its correspondingsignaturestothecloud. Using this method the sensitive information hiding can be decrypted by the owner of the document. Hence it prevents unauthorized access. The result that we try to attain is, it is impractical to hide sensitive information by encrypting the whole shared document. Figure 1.1 PROBLEM STATEMENT Remote data integrity documents are suggested to assurance the integrity of the highly confidential data stored in the cloud. Encrypting the whole sharedfilecandiscern the confidential information hiding, but still this shared set of file will be unable to be used by the other enties. We introduce a remote document reference id automatically convert to the QR code then just scan user module. Were access is permitted to download the particular document integrity that realizes data sharing with sensitive information hiding. Signatures are used to verify the file in the phase of integrity auditing. 1.1 OBJECTIVE User can store their documents in cloud generating a QR- code where the document will be hidden in this QR-code that can be downloaded by the particular personwhohave the authenticated key to access the document. 1.2 SCOPE  Easily send the auditing documents in QR code.  Medical field, where the patients documents can be viewed by the particular concern doctors.  private message sharing and document authentication using QR code  Auditing field, where the business deals can be maintained with high security.  Army, navy, air force, the countryisour pride where there is a necessary to maintain the highly confidential document with high privacy.  In addition this idea can also be used in the research filed preventingfromunauthorizedaccess. 2. OPEN HANDSET ALLIANCE The open handset alliance (OHA) is a business alliance to develop open standard. By developing this technologies
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 226 will lower the cost of developing the mobile devices and services. ANDROID ARCHITECTURE The software stack is split into Four Layers: 1. The application layer 2. The application framework 3. The libraries and runtime 4. The kernel 1. THE APPLICATION LAYER This application layer is the upper layer in android architecture. The applications features like Google map, browsers, scanners, SMS messaging tools browsers, phone contacts, navigation applications and calendars works with end users with the help of applicationframework tooperate. 2. APPLICATION FRAMEWORK In application frame work the classes and services are mandatory for developing the application. Where the developers are given access to reuse and extend their components which is already present in API. Managers are enabled in this application for accessing the data. (i) ACTIVITY MANAGER: The lifecycle of the application is managed by this activity manager. Enabling the proper management for all activities. Meanwhile thisactivityiscontrolledbytheactivity manager. (ii) RESOURCE MANAGER: Resource manager enables the access to non-code resources like graphics etc. (iii) NOTIFICATION MANAGER: It activates all application’s to be display under the custom alerts in status bar. (iv) LOCATION MANAGER: It triggers alerts immediately user enters or leaves a specified geographical location. (v) PACKAGE MANAGER: It is used to retrieve the data that is about to installed packages on a particular device. (vi) ACTIVITY MANAGER: The lifecycle of the application is managed bythisactivity manager. Enabling the proper management for all activities. Meanwhile this activity is controlled bytheactivitymanager. (vii) WINDOW MANAGER: It creates views and layouts. Used to create the user interface modules. (viii) TELEPHONY MANAGER: It is used to handle setting the information about all the services device and for setting the network connection (ix) ANDROID RUNTIME: The android applications areexecutedinthissection. Because android has its own virtual machine I.e. DVM (Dalvik Virtual Machine), whichisdesigned and used for execution of the android application. Where users are given access to execute multiple applicationsat thesame time. 3. LIBRARIES: Android provide their own libraries which is written using C/C++. These libraries are not given access to enable directly. Hence application framework is used to enable the access, they are provided with many libraries such as access web browsers, libraries and, video format. 4. LINUX KERNEL: This layer is the main layer for android architecture because it provides service like memory management, security, power management. This layer is used for better binding for hardware and software to provide good communication between them. 3. SECURITY Android is a multi-process system, in which each application is executed in its own process. The most of the securities between applications and the system is enforced at the process level through standard Linux
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 227 facilities, such as user and group IDs that are assigned to applications. Android provides flexibility becauseit wasdesigned with the multilayer architecture hence it provides the security from the attackers. 4. LIMITATIONS OF ANDROID: Development requirements in Java Android SDK Eclipse IDE (optional) 5. DISADVANTAGES However, the current state of employing digital humanities in teaching most innovative developments that have taken the Internet from passive desktop publishing to ‘social media’ or from text to 3D immersive virtual realities. Encrypting the shared file will realize the sensitive information hiding, which cannot be used by others. Less security hence, not trustable. 6. PROPOSED SYSTEM: We propose a remote data integrity that realizes data sharing with sensitive information hiding using QR code. We hide the highly confidential documentusingtheQRcode. In data sharing between two entities in cloud one part hospital management to treat as the admin part and then patient to treated as the user part. Admin to upload the medical record in cloud (Data and patient ID) then search the particular patient id and medical document reference id automatically convert to the QR code then just scan user module then download the particular document. The main advantage is to have more secured transition between two sides, more flexible,easy-access;finallywecandownloadthe Document as a free report. A sanitizer is used to sanitizethe data blocks containing any sensitive information of the file and transforms these data blocks’ signatures into valid ones for the sanitized file. These signatures are used to verify the integrity of the sanitized file in the phase of integrity of QR code generate Algorithm. QR code proves to be too expensive for many applications as compared to other tracking and identification methods, such as the simple barcode. FEATURES OF QR-CODE: High data encoding capacity: The maximum QR code symbol can encode about 7089 characters. High-speed scanning and reading: QR code reader can recognize as many as QR code symbols this helps them to read the data fast. Capable of reading Japanese and Chinese encoding: QR codes can also read Japanese and Chinese characters as fast as English characters. Because the QR code system was invented by the Japanese company during the year 1994 for the purpose of tracking vehicles along with it, it was also designed with the high speed component scanning. Can be read from any direction: It is a matrix of 2D code, and it is possible to scan and read the data from any direction. 7. MODULES 1. Registration 2. QR Code Generator 3. File Hiding (a) The Correctness (b) Sensitive Information Hiding (c) Correctness Soundness 4. QR Code Scanner 5. File Sharing 6. Request for Permission (a) Setup 7. Permission Generation (b) Extract (c) SigGen 1. REGISTRATION: The modules describe signuppagecontainsemail idor user name, password and conform password those kind of details form the client should be stored in database. Login screencontainsemail idorusernameand password when the user to login the app it should retrieve the data from the database and combine based on user input if its match user name and password to allow in the user to login otherwise alert and show a message to the user. 2. QR CODE GENERATOR: This module Used to Generate the QR- code for the User enters Key and additionally what kind of data likes text, image, etc. 3. FILE HIDING: (a) The Correctness (b) Sensitive Information Hiding (c) Correctness Soundness (a) THE CORRECTNESS:
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 228  The correctness has the three necessary procedures which is followed one after the other systematically  Checking for the Private Key correctness  The correctness of the blinded file and for its corresponding signatures (b) SENSITIVE INFORMATION HIDING:  The user ID of a patient takes the input as the original file F along with the user’s private key Skid and outputs the blinded file F (c) CORRECTNESS SOUNDNESS: To assure that if the cloud does not truly store user’s intact sanitized data, it cannot pass the TPA’s verification. 4. QR CODE SCANNER: In, Additionally One type of application name as (QR- droid) used in this project. QR-droid is used to scan the any kind of User QR-code. Initially, User1 generate the QR-code after that QR-code is sent to the User 2. Then User2 Scan the QR-code and get the key. 5. FILE SHARING (a) File uploading: In this Module used to upload the document, the user 1 knowing the key, and what kind of data to be upload from gallery to Server. Finally the data and key to uploaded to the Server. (b) File downloading: In this Module Explain that, After Getting the Key from User 2 then Enter the key in Download Process and Get the File from Server. 6. REQUEST FOR PERMISSION: In this request for permission Phase the PKG i.e. (Primary key Generation) is generated by the client. This PKG is trusted by other entities. It is responsible for generating system public parameters and the private key for the user according to his identity ID. This PKG run the setup algorithm. It takes input as a security parameter (k). Then outputs the master secret key MSK and the system public parameters pp. The user say for example, from the client side must request for the patient report, this request is sent to the admin portal, once this admin portal is viewed by the admin and the access is permitted to the client, then patient report hidden in the QR code is generated in the patient portal. Now the patient can scan the QR code and allowed to download the patient report. STEP 1: Setup algorithm run by the PKG. It takes as input a security parameter k. It outputs the master secretkeyMSK and the system public parameters pp. 7. PERMISSION GENERATION: The admin will grant the TPA (Third Party Authentication) which is the public verifier. It is in-charge of verifying the integrity of the data stored in the cloud on behalf of users. PKG runs the extraction algorithm, where It takes the system public parameters pp, themastersecretkeyMSKand the user’s identity ID as input, and outputs the user’s private key SKID. The user can verify the correctness of SKID, only if it passes the verification, then the QR code is generated in the client’s portal; if the correctness is mismatched then the QR code will not be generated in the client’s portal. STEP 2: PKG perform extraction Taking input as, system public parameters pp,themastersecretkeymsk,and a user’s identity ID. It outputs the user’s private key skID. The user can verify the correctness of skID and accept it as his private key only if it passes the verification. STEP 3: For each user ID requested for the patient report assigns input as, the original file F, the user’s private key SKID, the user’s signing private key ssk and the file identifier name. And outputs a blinded file F*, along with its corresponding signature set Φ. 8. ALGORITHM (a) MERKLE HASH TREES ALGORITHM: The aim of the algorithm is to verify the integrity of the data stored in the cloud. The x hold elementsin Z*p and G1 hold the elements such as µ0, µ1, µ2..., µn, g2 from a public value. The data stored in the cloud can be retrieved and the integrity of these data can be ensured based on pseudo random function and BLS signature. The data integrity of the cloud is verified by the following: One large prime p contains Multiplicative cyclic groups with order p The Multiplicative cyclic groups G1, G2 are mapped by bilinear pairing map
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 229 e: G2 F(X) G1 × G1 The original file F, such as F = {m1, m2, ..., mn} is blinded by the cryptographic hash function: G1 H : {0, 1}* The key is generated for the set of indexes of the data blocks corresponding to the personal sensitive information is indicated as K1 Φ = {σi}1≤i≤n the signature is generated for thesetofthe blinded file F* The msk (master secret key) and skID (private key of the user ID) is generated in hash function G1 H : {0, 1}* The F* = {m*1, m*2, ..., m*n} the blinded file F* is ready to be sent to the sanitizer Φ 0 = {σ 0 i}1≤i≤n the signature is generated for the set of the sanitized file F0 Then the key is generated for the set of the indexes of the data blocks corresponding to the organization’ssensitive information Finally, F0 = {m01, mo2, ..., m0n} the sanitized file F0 stored in the cloud (b) AUTHENDICATION PERMISSION GRANTING ALGORITHM: STEP 1: Setup algorithm run by the PKG. It takes as input a security parameter k. It outputs the master secret key MSK and the system public parameters pp. STEP 2: PKG perform extraction Taking input as, system public parameters pp,themastersecretkeymsk,and a user’s identity ID. It outputs the user’s private key skID. The user can verify the correctness of skID and accept it as his private key only if it passes the verification. STEP 3: For each user ID requested for the patient report assigns input as, the original file F, the user’s private key SKID, the user’s signing private key ssk and the file identifier name. And outputs a blinded file F*, along with its corresponding signature set Φ. 9. FUTURE ENHANCEMENT In future it will have more feature like Online chat, video calling and these are used to get the details within the minute. We are going to develop an Advance learning system, which adopts the designed scheme to trace visitors’ trajectories in our campus. Besides, we are now going to apply the designed scheme to analyze sport postures. TECHNIQUE DEFINITION: Human SegmentationAlgorithm wheretheHumanregion segmentation algorithmfor real-timevideo-call applications. Unlike conventional methods, the segmentation process is automatically initialized and the motion of cameras is not restricted. To be precise, our method is initialized by face detection results and human/background regions are modelled with spatial color Gaussian mixture models (SCGMMs). EXTR ADVANTAGES:  User friendly  It will take less time to transfer huge volume of data.  Efficient and secure to share the highly confidential documents 10. CONCLUSION: We used two layer QR code. This 2LQR code is of two levels namely public level and private level. The public level QR code can be read by any QR code reading application. But the private level QR code needs a specific application with specific input information. And this private level QR code is created by replacing black modules along with some specific textured patterns. Any standard QR code reader consider the textured pattern as a black modules thus the private level is invisible to standardQRcode readers and this private level QR code does not affect any of the public levels REFERENCES 1) Xiaojun Chen and Jea H. Choi. (2010), ‘Security and Privacy in Mobile Social Networks: Challenges and Solutions’13 Volume 3, No. 1. 2) HsinyiPeng and Po-Ya Chuang. (2012), ‘Ubiquitous Performance-support System as Mind tool: A Case Study of Instructional Decision Making and Learning Assistant’ Educational Technology & Society, 12 (1), 107–120. 3) M. C. Mayorga Toledano. (2006), ‘Learning objects for mobile devices: A case study in the Actuarial Sciences degree’ Current Developments in Technology-Assisted Education 4) Z. Baharav and R. Kakarala.(2013), Visually significant QR codes: Image blending and statistical Analysis. In Multimedia and Expo (ICME), IEEE International Conference on, pages 1–6. 5) C. Baras and F. Cayre. (2012),2D bar-codes for authentication: A security approach. In Signal Processing Conference (EUSIPCO), Proceedings of the 20th European, pages 1760–1766. 6) T. V. Bui, N. K. Vu, T. T.P. Nguyen, I. Echizen, and T. D. Nguyen.Robust message hiding for QR code.(2014) In Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), Tenth International Conference on, IEEE pages 520–523.
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 230 7) B. A. M. Hoang, W. Sawaya, and P. Bas.(2014) Documentauthentication using graphical codes: Reliable performance analysis and channel optimization. EURASIP Journal on Information Security. 8) T. Langlotz and O. Bimber.Unsynchronized 4D barcodes.(2007) In Advances in Visual Computing, Springer, pages 363–374. 9) C.-Y. Lin and S.-F.Chang.(1999)Distortionmodeling and invariant extraction for digital image print- and-scan process.In Int. Symp.Multimedia Information Processing. 10) P.-Y. Lin, Y.-H. Chen, E. J.-L. Lu, and P.-J.Chen.(2013) Secret hiding mechanism using QR barcode. In Signal-ImageTechnology&Internet-BasedSystems (SITIS), IEEE, International Conference on, pages 22–25. BIOGRAPHIES J. Sharon Chella Priyanga is PG Student at Anand Institute of Higher Technology at Chennai Her area of interest includes Data mining, Cloud computing, cryptography. A,S Balaji is presently working as a Assistant Professor in Anand Institute of Higher Technology at Chennai. His area of interest includes Computer networks and Security, Cloud computing, Wireless sensor networks and Software Engineering etc.