Submit Search
Upload
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Records based on Secret Sharing
•
0 likes
•
15 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i9/IRJET-V6I983.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET Journal
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET Journal
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
ijiert bestjournal
Recommended
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET Journal
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
IRJET Journal
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
Secure Data Self-Destructing with Time Constraint in Clouds
Secure Data Self-Destructing with Time Constraint in Clouds
IRJET Journal
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET- Cipher Text-Policy Attribute-Based Encryption and with Delegation ...
IRJET Journal
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
ijcsit
Data integrity proof techniques in cloud storage
Data integrity proof techniques in cloud storage
IAEME Publication
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
DATA INTEGRITY PROOF (DIP) IN CLOUD STORAGE
ijiert bestjournal
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
50120140503020
50120140503020
IAEME Publication
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
INTRODUCTION TO INTERNET OF THINGS
INTRODUCTION TO INTERNET OF THINGS
Vikram Nandini
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
csandit
IoTReport
IoTReport
Marc Bacvanski
50120140507005 2
50120140507005 2
IAEME Publication
H1803035056
H1803035056
IOSR Journals
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET Journal
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ijgca
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
V04405122126
V04405122126
IJERA Editor
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
More Related Content
What's hot
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
IRJET Journal
50120140503020
50120140503020
IAEME Publication
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET Journal
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET Journal
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
IRJET Journal
INTRODUCTION TO INTERNET OF THINGS
INTRODUCTION TO INTERNET OF THINGS
Vikram Nandini
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
csandit
IoTReport
IoTReport
Marc Bacvanski
50120140507005 2
50120140507005 2
IAEME Publication
H1803035056
H1803035056
IOSR Journals
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET Journal
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ijgca
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
IOSR Journals
V04405122126
V04405122126
IJERA Editor
What's hot
(18)
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
50120140503020
50120140503020
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Deduplication of Encrypted Bigdata on Cloud
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
Implementing Proof of Retriavaibility for Multiple Replica of Data File using...
INTRODUCTION TO INTERNET OF THINGS
INTRODUCTION TO INTERNET OF THINGS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
IoTReport
IoTReport
50120140507005 2
50120140507005 2
H1803035056
H1803035056
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
IRJET- Cost Effective Scheme for Delay Tolerant Data Transmission
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
ON FAULT TOLERANCE OF RESOURCES IN COMPUTATIONAL GRIDS
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
Enabling Public Audit Ability and Data Dynamics for Storage Security in Clou...
V04405122126
V04405122126
Similar to IRJET- Enhancement of Security in Cloud Storage of Electronic Health Records based on Secret Sharing
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
IRJET Journal
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
ijsrd.com
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
IOSR Journals
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Editor IJMTER
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
IRJET Journal
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET Journal
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET Journal
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET Journal
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
IRJET Journal
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
AIRCC Publishing Corporation
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
AIRCC Publishing Corporation
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET Journal
50120140507005
50120140507005
IAEME Publication
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IAEME Publication
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
IOSR Journals
Similar to IRJET- Enhancement of Security in Cloud Storage of Electronic Health Records based on Secret Sharing
(20)
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Privacy Preserving in Authentication Protocol for Shared Authority Based Clou...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Effective & Flexible Cryptography Based Scheme for Ensuring User`s Data Secur...
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Data Security in Cloud Computing Using Linear Programming
Data Security in Cloud Computing Using Linear Programming
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
Enhanced Data Partitioning Technique for Improving Cloud Data Storage Security
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
DATA SHARING PROTOCOL TO MINIMIZE THE SECURITY AND PRIVACY RISKS OF CLOUD STO...
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
IRJET-Auditing and Resisting Key Exposure on Cloud Storage
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
A Survey on A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
SECURE FILE STORAGE IN THE CLOUD WITH HYBRID ENCRYPTION
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
IRJET-2 Proxy-Oriented Data Uploading in Multi Cloud Storage
50120140507005
50120140507005
Protection of data using linear programming and fhe technique in cloud computing
Protection of data using linear programming and fhe technique in cloud computing
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
Privacy and Integrity Preserving in Cloud Storage Devices
Privacy and Integrity Preserving in Cloud Storage Devices
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
ssuser5c9d4b1
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
RajkumarAkumalla
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
Call girls in Ahmedabad High profile
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
ranjana rawat
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Recently uploaded
(20)
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
High Profile Call Girls Dahisar Arpita 9907093804 Independent Escort Service ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Records based on Secret Sharing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 580 Enhancement of Security in Cloud Storage of Electronic Health Records based on Secret Sharing Mohith Gowda HR1, Adithya MV2 1B.E in Computer Science and Engineering, Mandya – 571401, Karnataka, India 2B.E in Computer Science and Engineering, Mandya – 571401, Karnataka, India -----------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - Establishment of Security for Electronic Health Records (EHRs) has become an unresolved issue in the field of healthcare processing system. Among varies present trends in the field, the most effective method that provides flexibility, Economical is, the Cloud Storage Technology which provides Efficient way to store, manage and retrieve the electronic dataNevertheless, storing sensitive information such as health records on the cloud incurs severe security and privacy risks. This paper provides an effective and secure method to store EHRs in cloud using secret sharing and AES Algorithm. In this system, an EHR is divided into multiple segments by a healthcare centre, and the segments are distributed to numerous cloud servers. When retrieving the EHR, the healthcare centre captures segments from partial cloud servers and reconstructs the EHRs. Meanwhile, in reality, the reconstruction of a shared EHR could be much burdensome for a healthcare centre or a patient, we thus propose a practical cloud storage scheme which outsources the reconstruction of a shared EHR to a cloud computing service provider. Such a solution can drastically boost the efficiency of the proposed scheme, and the results of outsourcing reconstruction can be verified by healthcare centres or patients in our scheme. This system proposed and experimented has proven to provide better security and efficiency for EHRs. Key Words: AES Algorithm, Elliptic Curve Diffie- Hellman, Secure Cloud Computing, Symmetric Bivariate Polynomial Based Secret Sharing, Verifiable Reconstruction Outsourcing Based Secret Sharing. 1. INTRODUCTION The use of conventional health record system is dramatically decreasing, giving rise to the electronic health record system during the past few years. EHRs have many considerable advantages such as economy, normativity, efficiency and accessibility. This advanced system is beneficial to healthcare centre (HC) as well as the patients as the huge amount of data is stored and maintained in the cloud. cloud service provider offers rapid access to flexible, low-cost resources, thus benefitting the people to use these services in various fields including healthcare. With the development of large- scale, on-demand, flexible storing and computing infrastructures provided by cloud computing services, HCs could avoid the burden of data management, reduce the cost of storing massive data by themselves and achieve universal data access with location independence. EHRs are usually private and confidential since they include patient identifiers and highly sensitive information. However, when using the cloud computing services, users do not have physical control over their data. And cloud service providers are not completely trusted , though the infrastructures under the cloud are much more reliable than personal computing devices. The ‘‘curious’’ clouds may have various incentives to be unfaithful toward the cloud users. They can either maliciously tamper the data or spy on some sensitive information. Therefore, cloud computing also brings security challenges while its advantages are appealing for EHRs storage. There have been numerous approaches discussing data security and privacy protection issues in cloud computing environments. Encryption is a traditional method to protect the privacy of sensitive data stored in clouds. However, the storage of encryption key is a high-risk tar- get and any negative incident may jeopardize all encrypted health records. Aiming to limit a single point failure problem, schemes based on secret sharing are proposed. Nonetheless, all the existing cloud storage solutions for EHRs based on secret sharing have some com- mon disadvantages: first, the management of encrypted key is too complicated; second, it is not practical for patients or HCs to execute the expensive reconstruction of shared EHRs. The encrypted key is an obvious and weak target for the whole actual implementation regardless of what symmetric or public-key encryption algorithm is employed. More- over, it demands tremendous time and resources of clients (patients or HCs) to perform the EHR reconstruction that involves time-consuming modular exponentiation operations, especially when a HC deal with enormous amount of EHRs. In order to avoid the complicated key management problem, we plan to pre- process the original EHR before its shares are stored in different clouds. Also, we tend to outsource the EHR
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 581 reconstruction to a cloud computing provider to reduce the local computation burden. It is our essential goal to propose a practical cloud storage solution for EHRs by using secret sharing to solve the single point failure problem. Unavoidably though, the reconstruc- tion of EHR can become a issue for personal or health- care hosts. As a response, we outsource the reconstruction operation to a cloud computing provider, which brings some other challenges. First, the cloud computing server might be curious on user’s sensitive data, so we have to make sure that cloud computing server executing the reconstruction out- sourcing cannot obtain the original EHRs. Second, the cloud server might return incorrect results intentionally or unintentionally, so HCs have to be able to verify the correctness of the reconstructed EHR. Also, the recovery operation of the original EHR by client hosts should be simpler than the recon- structing operation. To address all the above challenges, we propose our cloud storage for electronic health records based on secret sharing with verifiable reconstruction outsourcing. Our contribution can be summarized as follows: 1. We enhance a cloud storage system architecture for EHRs which employs the secret sharing and AES algorithm. 2. We propose a practical cloud storage scheme which satisfies the architecture. This system accounts reconstruction outsourcing technique in all cloud storage schemes for EHRs based on secret sharing, which can significantly improve the client side efficiency and security. The rest of the paper is Structured as follows: in Section II, we conduct a literature review with their drawbacks. We illustrate the present system and the proposed model in Section III. In Section IV, we explain the modules of our secure cloud storage model. Finally, the conclusion is made in Section V. 2. LITERATURE REVIEW [1] (F. Alsolami & T. E. Boult, 2104) have proposed the Cloud Stash scheme, a system that applied the secret- sharing scheme directly on the file to store multi-shares of a file into multi- clouds. Cloud Stash utilizes secret- sharing, low cost cloud storage s and multi-threading to improve confidentiality, availability, performance and fault tolerance. Cloud Stash achieves this improvement by splitting a file into multi- shares of secret and distributing these multi-shares into multi-clouds simultaneously where threshold shares are required to reconstruct the file. Their experiments show that Cloud Stash is significantly faster for small files, and even for large files the added cost is not statistically worse. So the added security benefits are nearly free from the users’ perspective. Disadvantages: 1. On larger files, the algorithms large variance in communication time results in the baseline is failing to be statistically significantly better. [2] (M.J.Atallah, K.N.Pantazopoulos, J.R.Rice, & E.E. Spafford, 2002) have investigated the outsourcing of numerical and scientific computations using framework. A customer who needs computation to done lacks the computational resources, would use external agent to perform these computations. The outsourcing is secure if it is done without revealing to the external agent. In order to protect data, customer have to do some pre-processing and post-processing of data before sending and receiving respectively. So, they proposed a framework for disguising scientific computation. There is no single disguise technique to calculate accurate scientific computation but there is an array of disguise technique available so that almost any scientific computation could be disguised at a reasonable rate and with very high levels of security. Disadvantages: 1. Complex in computation. 2. It requires huge time for small applications also. [3] (X. Chen, J. Li, J. Ma, Q. Tang, & W. Lou, 2013) have proposed a new secure outsourcing algorithm for (variable-exponent, variable-base) exponentiation modulo a prime in the two untrusted program model. Authors claim that when compared with the state-of-the-art algorithm, the proposed algorithm is superior in both efficiency and check ability. Results demonstrate how to achieve outsource-secure Cramer-Shoup encryption s and Schnorr signatures. Another algorithm named first efficient outsource-secure algorithm is proposed for simultaneous modular exponentiation s. Finally, they report the experimental evaluation that demonstrates the efficiency and effectiveness of the proposed outsourcing algorithms and schemes.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 582 Disadvantages: 1. Prevents collusion attack inside the cloud server. 2. Does not consider the access revocation. [4] (R.D’Souza, D.Jao, I.Mironov, & O.Pandey, 2011) have constructed a new scheme based on pairings which is much more efficient than Stadler’s scheme. Their scheme is non interactive and can support any monotone access structure. In addition, it is proven secure in the standard model under the Bilinear Diffie-Hellman (BDH) assumption. The PVSS scheme is the non-interactive scheme proven secure in the standard model; all previous non-interactive PVSS schemes assume the existence of a Random Oracle. The proposed scheme is simple, efficient and further their implementation demonstrates the scheme compares well with the current fastest known PVSS schemes. Disadvantages: 1. There is no forward security and backward security. [5] (T. Ermakova & B. Fabian, 2013) have evaluated and selected a secret-sharing algorithm for our multi-cloud architecture. They have implemented both Shamir's secret-sharing scheme and Rabin's information dispersal algorithm and performed several experiments measuring the execution time. Their results indicate that an adoption of Rabin’s algorithm would create a low overhead, giving strong indicators to the feasibility of their approach. Disadvantages: 1. In the case of key compromise, or if encryption algorithms are broken their implementation turns out to be insecure. 3. SYSTEM ANALYSIS 3.1 Existing System Secret sharing schemes are ideal for storing information that is highly sensitive and highly important. Aiming to limit a single point failure problem, schemes based on secret sharing were proposed. Ermakova [5] proposed a scheme based on Shamir’s (t, n) secret sharing which divided the encrypted EHRs into shares to be stored in different cloud service providers. This approach guaranteed that cloud service providers colluding to break the privacy cannot obtain EHRs, even if the encryption of EHRs is broken. Secret sharing is adopted in many cryptographic schemes in cloud computing environment. F. Alsolami [1] proposed a system named Cloud Stash, which applied the secret-sharing scheme directly on the file to store multi-shares of a file into multi-clouds. Compared with the traditional cloud storage, the proposed scheme achieved improvement on confidentiality, availability, performance and fault tolerance. Disadvantages of Existing System: 1. The basic cryptographic operations are sometimes too expensive for resource- constrained devices. 2. Less secure. 3. Huge computation resources required to secure data. 3.2 Proposed System In this section, we present our cloud storage scheme for EHRs based on secret sharing, which includes a novel concept-reconstruction outsourcing. The proposed cloud storage scheme for EHRs consists of four phases, namely the pre-processing phase, the distribution phase, the reconstruction outsourcing phase, and the recovery and verification phase. Before elaborating the proposed scheme, we first give the definition of reconstruction outsourcing. Reconstruction outsourcing is a processing method of reconstruction in a cloud storage solution based on secret sharing. Unlike a conventional way, the reconstruction of stored data in different cloud service providers is outsourced to a cloud computing provider, so that the computing resources of client hosts can be saved. In our case, the reconstruction outsourcing of pre- processed EHRs must make sure that the outsourcing cloud service provider cannot obtain any content of the EHRs during the reconstruction. 3.3 System Design Fig- 1: Architecture of Cloud Storage System
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 583 Fig- 1 illustrates the system architecture. The system architecture is designed to store EHRs on different HCs using secret sharing. As shown in figure 1, the key components include: the pre-processing of EHRs, distribution of pre-processed EHRs, reconstruction outsourcing, verification and recovery of EHRs. We now describe the workflow of the system. Assuming that the EHRs are created by a healthcare centre named HC − A. After HC − A uploads the EHR to a healthcare system, the healthcare system generates an unique identifier for it, which is relevant to patient’s ID, HC − A ’s ID, time stamp, etc. In the pre-processing phase, the healthcare system performs a bitwise exclusive OR operation between the EHR and its hash value. Then healthcare system dis- tributes the pre-processed EHR into n shares using Shamir’s threshold secret sharing algorithm and sends the n shares to n different cloud service providers CP1,...,CPn according the protocols between healthcare institutions and CPs. When the owner of the EHR or an authorized healthcare centre HC − B wants to get the EHR, they send a request through the healthcare system. After confirming the request, health- care system assigns a cloud service provider CPre (CP′re) to do the reconstruction operation. The assigned outsourcing cloud service provider CPre (CP′re) gets t or more shares from CP1, . . . , CPn. After finishing the reconstruction, CPre (CP′re ) returns the result s′ to HC − B (or the patient) through healthcare system. At last, HC −B (or the patient) can recover the original EHR with its hash value stored in healthcare system by simply performing a bitwise exclusive OR operation. 3.4 Sequence Diagram Fig- 2: Sequence Diagram for Owner and User Interaction This system designed to store EHRs on different HCs using secret sharing is represented in the form of Sequence diagram as show in Fig- 2. 4. Methodology 4.1 Modules A. Delegator Owner Module In the owner module, Owner first login by patient Id. Owner uploads patient data. The authority delegation is realized mainly by proxy re-encryption mechanism. The proxy server makes use of the re-encryption key to transform the cipher text encrypted by owner’s public key into another form, which can be searched by the user using his own private key. B. User Module In the User module, User like doctor, nurse login by their Id, Search for patient details and send the request to Owner. The delegate will be divested of the search authority when the effective time expires. In order to achieve the time-controlled access right revocation, the predefined time information is embedded in the re- encrypted cipher text with time seal. With the help of the time seal, the user is able to generate a valid delegation trapdoor by TrapdoorR algorithm. If the time information hidden in the re-encrypted cipher text is inconsistent with that in the delegation trapdoor, the equation in algorithm will not hold. The search query of the user will be rejected by the data server if the current time beyond the preset time. C. Emergency The Emergency will work based when patient is not in conscious emergency will send the request to take care to access the patient file. The Emergency will login by their Id’s and send the request to caretaker of patient. D. Time Controlled Revocation An important design goal is to enable time-controlled access right revocation. The delegation appointment will terminate when the preset effective time period disagrees with the current time. It should prevent the authorized user from accessing the record's overtime. E. AES Algorithm The Advance Encryption Standard (AES) is a symmetric-key algorithm for encryption of electronic data. It is highly influential in the advancement of modern cryptography.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 09 | Sep 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 584 It consists of a series of linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits around (permutations). In this project, we are using 128 bits of key for encryption and decryption. Steps involved for encryption of data: a) Byte Substitution b) Shift Rows c) Mix Column d) Add round key Same steps are required for decryption but in reverse order. F. Shamir Secret Sharing Algorithm Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir. Shamir's Secret Sharing is used to secure a secret in a distributed way, most often to secure other encryption keys. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part. To unlock the secret via Shamir's secret sharing, you need a minimum number of shares. 5. FINAL REMARKS In this research, we proposed a privacy-preserving cloud storage scheme for electronic health records based on Shamir's Secret Sharing. To address the problem that the reconstruction of shared EHR is burdensome for a healthcare center or a patient in a real- world application, we proposed a secure outsourcing approach for the secret reconstruction of shared EHR. Through theoretical analysis, we demonstrated that our project satisfies the security requirements. As a conclusion, both the distribution phase and the reconstruction phase are time- consuming. This outsourcing approach effectively reduces the burden for the reconstruction phase. As for the distribution phase, since the user only needs to execute it once, we did not take it into concern when we design the scheme. Therefore, the outsourcing for distribution was not designed. As per now, we have gone through many papers, and we have observed that other paper lacks reconstruction of data, which make it less secure. As we know that, EHR is very sensitive data. So, we cannot take any risks regarding its security. This project can be further improved which can make it even more reliable in the future. The web pages will be constantly updated as data owner uploads the data of patients in cloud. Future development of user-friendly GUI, testing it on test users and finally publish the application on android which will be really helpful for hospitals. REFERENCES [1] F. Alsolami, & T. E. Boult. (2104). Cloudstash: Using secret sharing scheme to secure data, not keys, in multiclouds. Information Technology: New Generations (pp. 315-320). Las Vegas, NV, USA: IEEE. [2] M.J.Atallah, K.N.Pantazopoulos, J.R.Rice, & E.E. Spafford. (2002). Secure outsourcing of scientific computations. Advances in Computers, 215-272. [3] X. Chen, J. Li, J. Ma, Q. Tang, & W. Lou. (2013). New Algorithms for Secure Outsourcing of Modular Exponentiations. IEEE, 2386 - 2396. [4] R.D’Souza, D.Jao, I.Mironov, & O.Pandey. (2011). Publicly Verifiable Secret Sharing for Cloud-Based Key Management. Progress in Cryptology – INDOCRYPT 2011 (pp. 290-309). Springer, Berlin, Heidelberg. [5] T. Ermakova, & B. Fabian. (2013). Secret Sharing for Health Data in Multi-provider Clouds. Business Informatics (pp. 93–100). Vienna: IEEE.
Download now