SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3376
Providing Privacy in Healthcare Cloud for Medical Data using Fog
Computing and Cryptography
Miss. Pachore Poonam A1, Prof. S.D. Jondhale2
1Miss. Pachore Poonam A, Dept. of Computer Engineering, PREC, Loni, Maharashtra, India.
2Prof. S. D. Jondhale, Dept. of Computer Engineering, PREC, Loni, Maharashtra, India
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Today internet is getting faster and cheaper to
use with the introduction of 4G network. Thus due to this
external storage sources such as cloud is used by many on
daily basis. There emerged various cloud providers both in
private and public cloud computing scenarios. Thus with the
fast and massive growth of data that is being stored on the
cloud gave development opportunitiestomakethecloudmore
secure and reliable. The major sector among all that was
heath related services which started using cloud to satisfy
their daily needs.
So in this paper we are going to concentrate on
securing health services using cloud and ways to make it safe
and secure to use. However, in currentstoragescenario, health
care data is totally stored in cloud servers. Thus, users who
upload their data on cloud lose their right of control of the
data on cloud and face privacy leakage risk. The other privacy
protection schemes and technologies are usually based on
encryption technology, but these kinds of methods cannot
effectively resist attack that are originated from the inside of
cloud server by a cloud provider whoseservicesarehandled by
a third party source. So we thought of implementing a novel
approach which will spilt data and store on cloud and local
servers simultaneously. This technique will be explained as
Split and Combine (SaC). To upload data, the data will be split
in to two where the first will be saved on the cloud and the
other will be saved on the local server. To request data, wewill
again combine the data from the cloud and the local server.
We are intending to use Google Drive as the Cloud. In this
project, the main focus has been given to secure healthcare
private data in the cloud using a local server computing
facility and AES algorithm.
Key Words: Cloud, Healthcare, Security, Local Server,
Spreadsheet, AES, SaC.
1. INTRODUCTION
Today computer technology isbecomeanintegral partof our
day to day life. Cloud computing is the hot topic today that is
being used by many. Thus cloud computing is used in large
amount of applications from social networks to health care
and many more. Thus as the use of cloud increased it gave
rise to misuse of user data by an attacker. Thus security
challenges arose from it as most of the application data is
handled by third party cloud handlers. Withtheintroduction
of 3G and 4G networks the internetgotfasterthusincreasing
the amount of data that is being sent on the cloud. Thus to
track this amount of data from attackers got a very
challenging task. Thus the privacy of data on the cloud
providers was unpredictable. There were many cyber-
attacks
2. REVIEW OF LITERATURE
This topic of previous studies describes the fundamentals of
various techniques and technologies used to protect data
that is stored on the cloud. It helps in understanding and
evaluating various ideas put forward by various technical
papers published by various publishers.
Ashish Singh et al.[1] authors explains the idea of
about the basic features of the cloud computing, security
issues, threats and their solutions that can be achieved by
using various techniques used to overcome them. It also
explains some key topics related to cloud such as cloud
architecture framework, service and deployment model,
cloud technologies, cloud security concepts, threats, and
attacks that come with cloud computing.Italsoconcentrates
a lot of open research issues related to the cloud security
that can be improved upon. The Main Limitation of this
paper is that it concentrates on saving data as whole on the
cloud only.
Tian Wang et al.[2] authors explains the idea of
taking full advantage of cloud storage and protect the
privacy of data from leakage together. In this paper they
explain a technique named, Hash-Solomon codealgorithmis
designed to divide data into different parts to store data at
various steps. Then, a small part of data is saved in local
machine and fog server in order to protect the privacy of a
whole data. It has high accuracy to store data.TheLimitation
of the paper is that it concentrates on only splitting data and
not the security of the split data which is achieved by the
concept in our paper.
S. Seema et al. [3] authors explain the idea of using
multi keyword search approachforfindingdata onthecloud.
The approach presented in this paper is known as secure
multi-keyword ranked search over encrypted cloud data.
This approach in the paper supports some of the functions
like uploading and deletion of les which can be done by
multiusers. Here RSA algorithm is used. The proposed
technique in this paper makes use of a structure known as
tree-based indexing to develop search competence and also
provides adaptable uploading and deletion of les. The
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3377
Limitation of the paper is that it concentrates on RSA
algorithm and not on SaC technique which is more efficient
then it.
Sherman S.M. Chow, et al.[4] authors explain the
idea of public auditing of the data that is stored on the cloud.
It introduces a third party auditor (TPA) to check the
integrity of outsourced data and be worry free and be
tension free. Thus the work proposed in thispaperincreases
a securecloudstoragesystemsupporting privacy-preserving
public auditing for easy cloud use. It also extends TPA to
perform audits for multiple users simultaneously and
efficiently without any extra cost and efforts. This proposed
schemes are provably secure and highly efficient for various
cloud providers. The Limitation of the paper is that it
concentrates on public auditing and not on SaC technique
which is more efficient then it.
R. Kowsik et al. [5] authors explain the idea for
securing data in the cloud using offensive decoy technology
for data security. In this paper abnormal data activity is
found using a thread . The unauthorized access is detected
using challenge questions set during registration. When
unauthorized access is detected disinformation attack is
launched by returning large amounts of decoy in formation
to the attacker to misguide him. It protects the misuse of
data by the attacker. The Limitation of the paper is that it
concentrates on offensive decoy technology and not on SaC
technique which is more efficient then it.
3. PROPOSED METHODOLOGY
In the proposed system we consider of dropping the
traditional approach of storing the data as a wholeusing SaC
technique. Furthermore, data security is the mostimportant
part in cloud storage security and it includes three aspects:
data privacy, data integrity and data availability at a given
time a user intends to use them. Thus to add extra security
for the SaC we are going to use encryption and decryption
techniques with it. We are proposingtouseGoogleDriveand
Google Spreadsheet for demonstration of out technique.
3.1 Architecture
Fig -1: Proposed System Architecture
Fig 1 shows the proposed system architecture which will be
explained in brief as follows:
1) Healthcare User: This entity may be anyonefrom
the health sector such as doctor, patient, Staff etc. This will
be a mobile application with various users.
2) Send Data: Here data is sent for uploading which
is received on the local server for further processing. The
data will be received using internet and cloud.
3) Split Data: Here data is split on local server for
uploading. The Split data calculation will depend on the
formula applied to number of fields in the table that is to be
uploaded.
4) Encryption: Here the split data isencryptedusing
AES Algorithm. The AES algorithm increases the security of
the data.
5) Upload: Here the 80 percent split data is
uploaded to cloud and the remaining is kept on the local
server. The local server database may be oracle etc. and the
cloud server database will be Google Spreadsheet.
6) Request Data: Here data is requested by user for
downloading which is receivedonthelocal serverforfurther
processing. The Request is first received by the local server.
7) Download data: Here data is downloaded from
the cloud and local server.
8) Combine Data: Here the split data is combined
together with help of formula to split and combine
technique.
9) Decryption: Here the combineddata isdecrypted
and shown to the user. The user can view the data on the
mobile
3.2 Algorithm
AES is a short form of Rijndael block cipher . It was
developed by two Belgian cryptographers, Vincent Rijmen
and Joan Daemen, who submitted a proposal to NIST during
the AES selection process. Rijndael is a familyofcipherswith
different key and block sizes each with a block size of 128
bits, but three different key lengths: 128, 192 and 256 bits.
AES was first adopted by the U.S. government for
security and is now used worldwide. It is the advanced
version of the Data Encryption Standard (DES), which was
published in 1977. The AES algorithm is a symmetric-key
algorithm, meaning the same key is used forbothencrypting
and decrypting the data using AES. AES is included in the
ISO/IEC 18033-3 standard for security features.
AES is the rst (and only) publicly accessible cipher
approved by the National Security Agency(NSA) for top
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3378
secret information when used in an NSA approved
cryptographic module (see Security of AES, below).
4. RESULT ANALYSIS AND DISCUSSION
4.1 Results for communication with cloud
1) Upload and View Data: In the screenshot a
communication with the cloud is made and the data can be
uploaded and downloaded using the application.
Fig-2 : Result to Upload and View Data
Fig-3: Result to Show Data on Cloud
2) Data on the Cloud: In the screenshotthedata that
is to be uploaded and downloaded is stored on the Google
Drive Spreadsheet.
4.2 Discussion for communication with cloud
Fig-4: Time to Upload Data
1) Upload: In the above bar chart time to upload
data using SaC is shown which is milliseconds (ms).
Fig-5: Time to Download Data
2) Download: In the above line chart time to
download data using SaC is shown which is milliseconds
(ms).
5. CONCLUSION
This Project explain a novel approach with various
techniques to improve the security of a Health care data
using cloud and Split and Combine (SaC) technique. At first
data is split and uploaded successfully. Then the data is
downloaded and Combined together. To enhance the
security, the data after split id encrypted using AES
algorithm and decrypted after combining the data. The
current system is very good in increasingthesecurityofdata
on the cloud as the data is partially stored on the cloud. The
drawback of the system is thatthelocal servershouldalways
be on to combine the data together.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3379
REFERENCES
[1] Cloud security issues and challenges:Asurvey byAshish
Singh and Kakali Chatterjee in Journal of Network and
Computer Application Volume 79, 1 February 2017,
Pages 88-115
[2] A Three-Layer PrivacyPreservingCloudStorageScheme
Based on Computational Intelligence in Fog Computing
on Cloud Computing by Tian Wang , Jiyuan Zhou, Xinlei
Chen , Guojun Wang , Anfeng Liu and Yang Liu in IEEE
Transactions on Emerging Topics in Computational
Intelligence ( Volume: 2 , Issue: 1 , Feb. 2018 )
[3] Centralized multi-user and dynamic multi-keywords
search scheme over encrypted cloud data by S. Seema ;
Y. Harshitha ; P. Apoorva in 2017 International
Conference on Communication and Signal Processing
(ICCSP)
[4] Privacy-Preserving Public Auditing for Secure Cloud
Storage by Cong Wang ; Sherman S.M.Chow;QianWang
; Kui Ren ; Wenjing Lou in IEEE Transactions on
Computers ( Volume: 62 , Issue: 2 , Feb. 2013 )
[5] “Mitigating Insider Data Theft Attacks in the Cloud on
Cloud Computing by R. Kowsik ; L. Vignesh in 2016
Second International ConferenceonScienceTechnology
Engineering and Management (ICONSTEM)
[6] J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloud-
assisted urban data sharing framework for ubiquitous-
cities,” Pervasive Mobile Computing., vol. 41, pp. 219–
230, 2017.
[7] Z. Fu, F. Huang, K. Ren, J.Weng, and C.Wang, “Privacy-
preserving smart semantic search based on conceptual
graphs over encryptedoutsourceddata,”IEEETrans.Inf.
Forensics Security, vol. 12, no. 8, pp. 1874–1884, Aug.
2017.
[8] J. Hou, C. Piao, and T. Fan, “Privacy preservation cloud
storage architecture research,” J. Hebei Acad. Sci., vol.
30, no. 2, pp. 45–48, 2013. 12
[9] Q. Hou, Y. Wu, W. Zheng, and G. Yang, “A method on
protection of user data privacy in cloud storage
platform,” J. Comput. Res. Develop., vol. 48, no. 7, pp.
1146–1154, 2011.
[10] P. Barham et al., “Xen and the art of virtualization,” ACM
SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 164–177,
2003.

More Related Content

What's hot

Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET Journal
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET Journal
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyIRJET Journal
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...ElavarasaN GanesaN
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Publishing House
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudeSAT Journals
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET Journal
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyIJERA Editor
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...IJNSA Journal
 

What's hot (20)

Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Crypto...
 
IRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET - Multimedia Security on Cloud Computing using Cryptography
IRJET - Multimedia Security on Cloud Computing using Cryptography
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in CloudIRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A SurveyTowards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
Towards Secure Data Distribution Systems in Mobile Cloud Computing: A Survey
 
Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...Efficient technique for privacy preserving publishing of set valued data on c...
Efficient technique for privacy preserving publishing of set valued data on c...
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
Survey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloudSurvey on securing outsourced storages in cloud
Survey on securing outsourced storages in cloud
 
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
IRJET-Survey Paper on Security for Data Storage and Regeneration of Code by A...
 
Cloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge PrivacyCloud Auditing With Zero Knowledge Privacy
Cloud Auditing With Zero Knowledge Privacy
 
Br36413417
Br36413417Br36413417
Br36413417
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 

Similar to IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Computing and Cryptography

An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudIRJET Journal
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...IJECEIAES
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingIRJET Journal
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the MassesIRJET Journal
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmIRJET Journal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET Journal
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGAIRCC Publishing Corporation
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGijcsit
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...IRJET Journal
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET Journal
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityAssociate Professor in VSB Coimbatore
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environmentsijfcstjournal
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...IRJET Journal
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageIJERA Editor
 

Similar to IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Computing and Cryptography (20)

An Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in CloudAn Approach towards Shuffling of Data to Avoid Tampering in Cloud
An Approach towards Shuffling of Data to Avoid Tampering in Cloud
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Proposed system for data security in distributed computing in using triple d...
Proposed system for data security in distributed computing in  using triple d...Proposed system for data security in distributed computing in  using triple d...
Proposed system for data security in distributed computing in using triple d...
 
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud ComputingSurvey on Lightweight Secured Data Sharing Scheme for Cloud Computing
Survey on Lightweight Secured Data Sharing Scheme for Cloud Computing
 
Cloud Data Protection for the Masses
Cloud Data Protection for the MassesCloud Data Protection for the Masses
Cloud Data Protection for the Masses
 
Data Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA AlgorithmData Division in Cloud for Secured Data Storage using RSA Algorithm
Data Division in Cloud for Secured Data Storage using RSA Algorithm
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET-  	  Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASCIRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
IRJET- Secure Data Sharing Scheme for Mobile Cloud Computing using SEDASC
 
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud ComputingDistributed Scheme to Authenticate Data Storage Security in Cloud Computing
Distributed Scheme to Authenticate Data Storage Security in Cloud Computing
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTINGDISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
DISTRIBUTED SCHEME TO AUTHENTICATE DATA STORAGE SECURITY IN CLOUD COMPUTING
 
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
 
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation IRJET- Simultaneous ammunition for the multi-cloud computing simulation
IRJET- Simultaneous ammunition for the multi-cloud computing simulation
 
A Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing SecurityA Brief Survey on Various Technologies Involved in Cloud Computing Security
A Brief Survey on Various Technologies Involved in Cloud Computing Security
 
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing EnvironmentsEvaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
 
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...IRJET-  	  A Novel Framework for Three Level Isolation in Cloud System based ...
IRJET- A Novel Framework for Three Level Isolation in Cloud System based ...
 
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud StorageBio-Cryptography Based Secured Data Replication Management in Cloud Storage
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
 
Ad4502189193
Ad4502189193Ad4502189193
Ad4502189193
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Computing and Cryptography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3376 Providing Privacy in Healthcare Cloud for Medical Data using Fog Computing and Cryptography Miss. Pachore Poonam A1, Prof. S.D. Jondhale2 1Miss. Pachore Poonam A, Dept. of Computer Engineering, PREC, Loni, Maharashtra, India. 2Prof. S. D. Jondhale, Dept. of Computer Engineering, PREC, Loni, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Today internet is getting faster and cheaper to use with the introduction of 4G network. Thus due to this external storage sources such as cloud is used by many on daily basis. There emerged various cloud providers both in private and public cloud computing scenarios. Thus with the fast and massive growth of data that is being stored on the cloud gave development opportunitiestomakethecloudmore secure and reliable. The major sector among all that was heath related services which started using cloud to satisfy their daily needs. So in this paper we are going to concentrate on securing health services using cloud and ways to make it safe and secure to use. However, in currentstoragescenario, health care data is totally stored in cloud servers. Thus, users who upload their data on cloud lose their right of control of the data on cloud and face privacy leakage risk. The other privacy protection schemes and technologies are usually based on encryption technology, but these kinds of methods cannot effectively resist attack that are originated from the inside of cloud server by a cloud provider whoseservicesarehandled by a third party source. So we thought of implementing a novel approach which will spilt data and store on cloud and local servers simultaneously. This technique will be explained as Split and Combine (SaC). To upload data, the data will be split in to two where the first will be saved on the cloud and the other will be saved on the local server. To request data, wewill again combine the data from the cloud and the local server. We are intending to use Google Drive as the Cloud. In this project, the main focus has been given to secure healthcare private data in the cloud using a local server computing facility and AES algorithm. Key Words: Cloud, Healthcare, Security, Local Server, Spreadsheet, AES, SaC. 1. INTRODUCTION Today computer technology isbecomeanintegral partof our day to day life. Cloud computing is the hot topic today that is being used by many. Thus cloud computing is used in large amount of applications from social networks to health care and many more. Thus as the use of cloud increased it gave rise to misuse of user data by an attacker. Thus security challenges arose from it as most of the application data is handled by third party cloud handlers. Withtheintroduction of 3G and 4G networks the internetgotfasterthusincreasing the amount of data that is being sent on the cloud. Thus to track this amount of data from attackers got a very challenging task. Thus the privacy of data on the cloud providers was unpredictable. There were many cyber- attacks 2. REVIEW OF LITERATURE This topic of previous studies describes the fundamentals of various techniques and technologies used to protect data that is stored on the cloud. It helps in understanding and evaluating various ideas put forward by various technical papers published by various publishers. Ashish Singh et al.[1] authors explains the idea of about the basic features of the cloud computing, security issues, threats and their solutions that can be achieved by using various techniques used to overcome them. It also explains some key topics related to cloud such as cloud architecture framework, service and deployment model, cloud technologies, cloud security concepts, threats, and attacks that come with cloud computing.Italsoconcentrates a lot of open research issues related to the cloud security that can be improved upon. The Main Limitation of this paper is that it concentrates on saving data as whole on the cloud only. Tian Wang et al.[2] authors explains the idea of taking full advantage of cloud storage and protect the privacy of data from leakage together. In this paper they explain a technique named, Hash-Solomon codealgorithmis designed to divide data into different parts to store data at various steps. Then, a small part of data is saved in local machine and fog server in order to protect the privacy of a whole data. It has high accuracy to store data.TheLimitation of the paper is that it concentrates on only splitting data and not the security of the split data which is achieved by the concept in our paper. S. Seema et al. [3] authors explain the idea of using multi keyword search approachforfindingdata onthecloud. The approach presented in this paper is known as secure multi-keyword ranked search over encrypted cloud data. This approach in the paper supports some of the functions like uploading and deletion of les which can be done by multiusers. Here RSA algorithm is used. The proposed technique in this paper makes use of a structure known as tree-based indexing to develop search competence and also provides adaptable uploading and deletion of les. The
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3377 Limitation of the paper is that it concentrates on RSA algorithm and not on SaC technique which is more efficient then it. Sherman S.M. Chow, et al.[4] authors explain the idea of public auditing of the data that is stored on the cloud. It introduces a third party auditor (TPA) to check the integrity of outsourced data and be worry free and be tension free. Thus the work proposed in thispaperincreases a securecloudstoragesystemsupporting privacy-preserving public auditing for easy cloud use. It also extends TPA to perform audits for multiple users simultaneously and efficiently without any extra cost and efforts. This proposed schemes are provably secure and highly efficient for various cloud providers. The Limitation of the paper is that it concentrates on public auditing and not on SaC technique which is more efficient then it. R. Kowsik et al. [5] authors explain the idea for securing data in the cloud using offensive decoy technology for data security. In this paper abnormal data activity is found using a thread . The unauthorized access is detected using challenge questions set during registration. When unauthorized access is detected disinformation attack is launched by returning large amounts of decoy in formation to the attacker to misguide him. It protects the misuse of data by the attacker. The Limitation of the paper is that it concentrates on offensive decoy technology and not on SaC technique which is more efficient then it. 3. PROPOSED METHODOLOGY In the proposed system we consider of dropping the traditional approach of storing the data as a wholeusing SaC technique. Furthermore, data security is the mostimportant part in cloud storage security and it includes three aspects: data privacy, data integrity and data availability at a given time a user intends to use them. Thus to add extra security for the SaC we are going to use encryption and decryption techniques with it. We are proposingtouseGoogleDriveand Google Spreadsheet for demonstration of out technique. 3.1 Architecture Fig -1: Proposed System Architecture Fig 1 shows the proposed system architecture which will be explained in brief as follows: 1) Healthcare User: This entity may be anyonefrom the health sector such as doctor, patient, Staff etc. This will be a mobile application with various users. 2) Send Data: Here data is sent for uploading which is received on the local server for further processing. The data will be received using internet and cloud. 3) Split Data: Here data is split on local server for uploading. The Split data calculation will depend on the formula applied to number of fields in the table that is to be uploaded. 4) Encryption: Here the split data isencryptedusing AES Algorithm. The AES algorithm increases the security of the data. 5) Upload: Here the 80 percent split data is uploaded to cloud and the remaining is kept on the local server. The local server database may be oracle etc. and the cloud server database will be Google Spreadsheet. 6) Request Data: Here data is requested by user for downloading which is receivedonthelocal serverforfurther processing. The Request is first received by the local server. 7) Download data: Here data is downloaded from the cloud and local server. 8) Combine Data: Here the split data is combined together with help of formula to split and combine technique. 9) Decryption: Here the combineddata isdecrypted and shown to the user. The user can view the data on the mobile 3.2 Algorithm AES is a short form of Rijndael block cipher . It was developed by two Belgian cryptographers, Vincent Rijmen and Joan Daemen, who submitted a proposal to NIST during the AES selection process. Rijndael is a familyofcipherswith different key and block sizes each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits. AES was first adopted by the U.S. government for security and is now used worldwide. It is the advanced version of the Data Encryption Standard (DES), which was published in 1977. The AES algorithm is a symmetric-key algorithm, meaning the same key is used forbothencrypting and decrypting the data using AES. AES is included in the ISO/IEC 18033-3 standard for security features. AES is the rst (and only) publicly accessible cipher approved by the National Security Agency(NSA) for top
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3378 secret information when used in an NSA approved cryptographic module (see Security of AES, below). 4. RESULT ANALYSIS AND DISCUSSION 4.1 Results for communication with cloud 1) Upload and View Data: In the screenshot a communication with the cloud is made and the data can be uploaded and downloaded using the application. Fig-2 : Result to Upload and View Data Fig-3: Result to Show Data on Cloud 2) Data on the Cloud: In the screenshotthedata that is to be uploaded and downloaded is stored on the Google Drive Spreadsheet. 4.2 Discussion for communication with cloud Fig-4: Time to Upload Data 1) Upload: In the above bar chart time to upload data using SaC is shown which is milliseconds (ms). Fig-5: Time to Download Data 2) Download: In the above line chart time to download data using SaC is shown which is milliseconds (ms). 5. CONCLUSION This Project explain a novel approach with various techniques to improve the security of a Health care data using cloud and Split and Combine (SaC) technique. At first data is split and uploaded successfully. Then the data is downloaded and Combined together. To enhance the security, the data after split id encrypted using AES algorithm and decrypted after combining the data. The current system is very good in increasingthesecurityofdata on the cloud as the data is partially stored on the cloud. The drawback of the system is thatthelocal servershouldalways be on to combine the data together.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3379 REFERENCES [1] Cloud security issues and challenges:Asurvey byAshish Singh and Kakali Chatterjee in Journal of Network and Computer Application Volume 79, 1 February 2017, Pages 88-115 [2] A Three-Layer PrivacyPreservingCloudStorageScheme Based on Computational Intelligence in Fog Computing on Cloud Computing by Tian Wang , Jiyuan Zhou, Xinlei Chen , Guojun Wang , Anfeng Liu and Yang Liu in IEEE Transactions on Emerging Topics in Computational Intelligence ( Volume: 2 , Issue: 1 , Feb. 2018 ) [3] Centralized multi-user and dynamic multi-keywords search scheme over encrypted cloud data by S. Seema ; Y. Harshitha ; P. Apoorva in 2017 International Conference on Communication and Signal Processing (ICCSP) [4] Privacy-Preserving Public Auditing for Secure Cloud Storage by Cong Wang ; Sherman S.M.Chow;QianWang ; Kui Ren ; Wenjing Lou in IEEE Transactions on Computers ( Volume: 62 , Issue: 2 , Feb. 2013 ) [5] “Mitigating Insider Data Theft Attacks in the Cloud on Cloud Computing by R. Kowsik ; L. Vignesh in 2016 Second International ConferenceonScienceTechnology Engineering and Management (ICONSTEM) [6] J. Shen, D. Liu, J. Shen, Q. Liu, and X. Sun, “A secure cloud- assisted urban data sharing framework for ubiquitous- cities,” Pervasive Mobile Computing., vol. 41, pp. 219– 230, 2017. [7] Z. Fu, F. Huang, K. Ren, J.Weng, and C.Wang, “Privacy- preserving smart semantic search based on conceptual graphs over encryptedoutsourceddata,”IEEETrans.Inf. Forensics Security, vol. 12, no. 8, pp. 1874–1884, Aug. 2017. [8] J. Hou, C. Piao, and T. Fan, “Privacy preservation cloud storage architecture research,” J. Hebei Acad. Sci., vol. 30, no. 2, pp. 45–48, 2013. 12 [9] Q. Hou, Y. Wu, W. Zheng, and G. Yang, “A method on protection of user data privacy in cloud storage platform,” J. Comput. Res. Develop., vol. 48, no. 7, pp. 1146–1154, 2011. [10] P. Barham et al., “Xen and the art of virtualization,” ACM SIGOPS Oper. Syst. Rev., vol. 37, no. 5, pp. 164–177, 2003.