Submit Search
Upload
IRJET - SPMR: Security Preserving Medical Recommendation Scheme
•
0 likes
•
9 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i3/IRJET-V7I3955.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
Shivlal Mewada
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management System
CSCJournals
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
PortalGuard
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET Journal
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
IJERA Editor
Analyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing Environment
iosrjce
group project
group project
Adam Woolley
MCS EMR & EHR And mMd. Net 2010
MCS EMR & EHR And mMd. Net 2010
edwardabrown3
Recommended
29 ijcse-01238-7 sumathi
29 ijcse-01238-7 sumathi
Shivlal Mewada
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management System
CSCJournals
Contextual Authentication: A Multi-factor Approach
Contextual Authentication: A Multi-factor Approach
PortalGuard
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET - Precise and Efficient Processing of Data in Permissioned Blockchain
IRJET Journal
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
Priority Based Prediction Mechanism for Ranking Providers in Federated Cloud ...
IJERA Editor
Analyzing and Surveying Trust In Cloud Computing Environment
Analyzing and Surveying Trust In Cloud Computing Environment
iosrjce
group project
group project
Adam Woolley
MCS EMR & EHR And mMd. Net 2010
MCS EMR & EHR And mMd. Net 2010
edwardabrown3
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Happiest Minds Technologies
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
IRJET Journal
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
IRJET Journal
A Novel Technique for Improving Group Recommendation in Recommender System
A Novel Technique for Improving Group Recommendation in Recommender System
IRJET Journal
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET Journal
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
IRJET Journal
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET Journal
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
J017316670
J017316670
IOSR Journals
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Happiest Minds Technologies
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
1crore projects
MMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service Selection
IJAEMSJORNAL
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
RMK ENGINEERING COLLEGE, CHENNAI
Preferences Based Customized Trust Model for Assessment of Cloud Services
Preferences Based Customized Trust Model for Assessment of Cloud Services
IJECEIAES
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ijwscjournal
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ijwscjournal
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
IRJET Journal
Sel csp a framework to facilitate
Sel csp a framework to facilitate
jpstudcorner
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to IRJET - SPMR: Security Preserving Medical Recommendation Scheme
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Happiest Minds Technologies
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
IRJET Journal
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
IRJET Journal
A Novel Technique for Improving Group Recommendation in Recommender System
A Novel Technique for Improving Group Recommendation in Recommender System
IRJET Journal
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET Journal
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
IRJET Journal
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET Journal
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET Journal
J017316670
J017316670
IOSR Journals
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Happiest Minds Technologies
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
1crore projects
MMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service Selection
IJAEMSJORNAL
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET Journal
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
RMK ENGINEERING COLLEGE, CHENNAI
Preferences Based Customized Trust Model for Assessment of Cloud Services
Preferences Based Customized Trust Model for Assessment of Cloud Services
IJECEIAES
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET Journal
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ijwscjournal
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ijwscjournal
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
IRJET Journal
Sel csp a framework to facilitate
Sel csp a framework to facilitate
jpstudcorner
Similar to IRJET - SPMR: Security Preserving Medical Recommendation Scheme
(20)
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Whitepaper: Moving to Clouds? Simplify your approach to understand the risks ...
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Online Service Rating Prediction by Removing Paid Users and Jaccard Coefficient
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
Cloud Armor: An Overview of Trusty Supporting Reputation based Management for...
A Novel Technique for Improving Group Recommendation in Recommender System
A Novel Technique for Improving Group Recommendation in Recommender System
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
IRJET - Sentiment Similarity Analysis and Building Users Trust from E-Commerc...
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
J017316670
J017316670
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
Simplify Your Approach To_Assess The Risks Of Moving Into The Cloud
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers
MMB Cloud-Tree: Verifiable Cloud Service Selection
MMB Cloud-Tree: Verifiable Cloud Service Selection
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
IRJET- SAAS Attacks Defense Mechanisms and Digital Forensic
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
Preferences Based Customized Trust Model for Assessment of Cloud Services
Preferences Based Customized Trust Model for Assessment of Cloud Services
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
ASPECTUAL PATTERNS FOR WEB SERVICES ADAPTATION
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Providing Highly Accurate Service Recommendation over Big Data using Adaptive...
Sel csp a framework to facilitate
Sel csp a framework to facilitate
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
Kamal Acharya
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Online banking management system project.pdf
Online banking management system project.pdf
Kamal Acharya
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Asst.prof M.Gokilavani
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Call Girls in Nagpur High Profile
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control
University management System project report..pdf
University management System project report..pdf
Kamal Acharya
Recently uploaded
(20)
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Online banking management system project.pdf
Online banking management system project.pdf
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
University management System project report..pdf
University management System project report..pdf
IRJET - SPMR: Security Preserving Medical Recommendation Scheme
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4783 SPMR: Security Preserving Medical Recommendation Scheme RAHIMOL K V Department of Computer Science and Engineering, APJ Abdul Kalam Technological University, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - With the ceaseless advancement of eHealthcare frameworks, clinical help suggestion has gotten incredible consideration. In any case, in spite of the fact that it can prescribe specialists to clients, there are still difficulties in guaranteeing the exactness and protection of proposal. Right now, guarantee the precision of the suggestion, we consider specialist’s reputation scores and similitudes between client’s requests and specialist’s data as the premise of the clinical help proposal. The specialist’s reputation scoresareestimated by different inputs from clients. We propose two solid calculations to process the comparability and the reputation scores in a protection safeguarding route dependent on the Modified Paillier cryptosystem, truthdiscoverytechnology and the Dirichlet distribution. Point by point security examination is given to show its security successes. Furthermore, broad trials show the efficiency as far as computational time for truth revelation and proposal process. Key Words: Cryptosystem, Dirichlet distribution, ehealthcare frameworks, etc 1. INTRODUCTION Onlinemedical servicerecommendationhasbecome an indispensable part of day by day life, because of the fast improvement of eHealthcare industry . In a clinical help recommender framework, clients present their requests to the clinical server, and afterward the clinical server will prescribe the reasonable specialists as per the requests of the clients. A progression of existing examinations have put forth attempts to structure the suggestion frameworks. A portion of these embrace trust and reputation as the premise of suggestion, while others givemoresignificanceto requests and interests of clients. In the first type, trust and reputation are a reflection of the specialist organization's nature of administrationand a decent specialistorganization will have a high reputation scores. The server will suggest the specialist organization with high reputation scores to clients. In the second sort of works, the server coordinates the reasonable specialist organization as indicated by the client’s requests (e.g., individual necessities or interests). Nonetheless, considering just the single factor (i.e., reputation or client’s requests) as the premise of proposal may influence the exactness of the suggestion results. The server prescribes the specialist co-op withhigh reputation score to clients, anyway note that the specialist organization with high reputation score will be unable to satisfy the client's needs well. In addition, reputation is a factor gotten from criticismofpatients,whichmight possibly really reflect the administrations required by the clients. Bogus input malignantly entered can likewise influence the reputation score, henceforth filtering it turns out to be incredibly important. The server suggests the specialists dependent on the similitudes between client’s requests and specialists' data. In any case, the suggestion conspire dependent on likeness just, may prescribe specialists with awful nature of administration. In genuine world, so as to show signs of improvement proposal result, other than similarity of basic information, the feedbacks of multiple users on the service provider need to be considered. For instance, if just likenesses are considered, there is a chance that the server may prescribe a specialist who fulfills the fundamental needs (e.g., specialist's specialty, title) of the client yet has a good reputation score to the client. 2. RELATED WORKS Researchers have developed many mechanisms mainly focus on reliable data transmission in a mobile eHealth network and rapid data processing in a central server. A progression of suggestion plans have been proposed by scientists. Some used interest based pseudonyms to hide user’s personal information from server. Nonetheless, this plan isn't reasonableforsuggesting specialists in an eHealth framework. Proposed a companion suggestion plot foronlineinformal organizations,whichuses client’s social credits and trust connections to prescribe companions in a private way. Be that as it may, in clinical proposal situation, there is no immediate social connections among clients and specialists, so suggestion dependent on characteristics and connections can't be utilized to acknowledge specialist suggestion. To accomplish precise clinical assistance proposal, we consider both comparability and reputation scores. A progression of works have been proposed to accomplish similitude figurings. Some proposed a security saving vector similitude count technique, which ensures information protection by adding aggravation information to the vector. Be that as it may, this strategy isn't effective in light of the fact that different jobs, for example, trust authority, server, and clients are engaged with likeness calculations. Some proposed an ailment forecast plotforthecloud.Theyutilized frameworks to structure an infectionforecastcalculation.Be that as it may, it isn't reasonable for eHealth frameworks to suggest clinical administrations dependent on grids. So as to as certain the reputation scores, a reputation score computation strategy dependent on Dirichlet dissemination. Be that as it may, as the characteristics of client’s input scores are extraordinary.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4784 Likewise, the server forms the client’s information in plaintexts, and it will raise protection issues. 3. SYSTEM DESIGN In our design, Security preserving Medical Recommendation scheme consists of three parts: System Initialization, Doctor Recommendation, and Reputation Calculation. These are depicted in detail beneath. The SPMR plot is applied in the security saving clinical assistance proposal situation, where theclientsends a solicitation to the server, and afterward the server prescribes specialists dependent on client's requests. After the clinical assistance is finished, the client will give a criticism as per the presentation of the specialist to assess the specialist's administration quality. In the System Initialization stage, TA will create security key materials anddispersethemtoclientsandcloud server. In the Doctor Recommendation stage, in the wake of getting the client’s requests and the worthy edge of closeness, the cloud server will compute the similitudes between client’s interest vectors and specialist’s quality vectors. At that point the server will recommend a suitable doctor to the user according to the similarities and the acceptable limit of likeness. In the Reputation Calculation stage, the server will total the client’s inputs and compute reality esteem. At last, these reality esteems will be utilized to compute the specialist’s reputation. 3.1 System Model Fig. 1 presents the conventional framework model, which has three elements: Trust Authority (TA), Cloud Server, and Users (U). TA is answerable for overseeing and appropriating the key materials to clients and cloud server. Cloud Server engages the requests from clients for recommendation and gets inputs from clientsforfiguringthe specialists' notoriety scores. Users are a gathering of patients with clinical necessities. Every client ui ∈ U = {u1, u2, ..., uN } can utilize a brilliant gadget to send requests and the worthy limit of closeness to the cloud server for suggesting an appropriate specialist. Subsequent to wrapping up a clinical assistance, the client offers input to cloud server as assessing of the nature of the specialist's administration. Fig -1: System Design Following presumptions are utilized in the security model for diverse framework elements. TA is trusted by all jobs in our frameworks and it can't be bargained. Cloud Server is considered to legit however inquisitive. This implies that it will follow the proposed plot for preparing client’s information. However,wedon'tdecideoutthelikelihoodthat it will reveal the security of clients. Besides, in our plan, we accept that the server doesn't plot with clients. Users accept that the nature of the criticism changes starting with one client then onto the next. For a similar specialist, a portion of the clients may give more precise and target criticism than others. Different noxious clients may give one-sided input scores to upset the framework.. In view of the previously mentioned models, we target planning a security protecting clinical assistance suggestion conspire, where the accompanying structure objectives must hold. -Security safeguarding. Client’s private data, for example, request vectors, criticisms, and specialists' data ought to be stayed discreet from different elements. - Accuracy. The closeness and notorietyscoreought to be computed to be as near evident qualities by the server. Accumulated information from numerous client’s criticisms ought to be determined precisely in order to get reality estimations of different criticisms. - Efficiency. The calculations ontheserverandclient side ought to be computationally productive. 4. PROPOSED SYSTEM Security Preserving Medical Recommendation Scheme consists of three sections: System Initialization, Doctor Recommendation, and ReputationCalculation.These are depicted in detail beneath. The SPMR conspireisapplied in the protection safeguarding prescription administration proposal situation, where the client sends a solicitation to the server, and afterward the server suggests specialists in view of client's requests. After the clinical assistanceis done,
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4785 the client will give an input by the exhibition of thespecialist to assess the specialist's administration quality. In the System Initialization stage, TA will create security key materials and convey them to clients and cloud server. In the Doctor Recommendation stage, in the wake of getting the client’s requests and the satisfactory edge of closeness, the cloud server will compute the similitudes between client’s request vectors and specialists' trait vectors. At that point the server will prescribe an appropriate specialist to the client as indicated by the likenesses and the adequate edge of comparability. In the Reputation Calculation stage, the server will aggregate the client’s inputs and ascertain reality esteem. At long last, these fact esteems will be utilizedtoascertainthespecialists' reputation. TA is totally trusted by all substances, and thus capable for bootstrapping the framework. As portrayed before, in view of the security parameter, the trust authority at first chooses two enormous safe prime number. Utilizing this, it produces the open key andprivatekeyinthemodified Paillier cryptosystem. TA will create public key and secret key for a client utilizing the accompanying steps: • Step 1: TA separates private key into two, where one is possessed by every client and other is claimed by the server. • Step 2: TA utilizes the symmetric encryption calculation furthermore, the symmetric key, and figures the secret key for every client. TA shares the secret keys with respective user for similarity calculation. • Step 3: TA distributes public and private key to respective user and the server. For every client we characterizetheclient'sdemand vector signifies that the client has this prerequisite. In particular, client’s requests can incorporate medical clinic name, office data, malady type, and so on. During the proposal procedure,clientsbothertheirowninterestvectors and send the annoyed vectors to the server for suggestion without uncovering their protection. For each Doctor, we characterize the double vector as specialist's trait vector. Specialist's characteristics can incorporate the specialist's essential data (e.g.,medical clinic name, division data, and so on.), treatable sickness type, etc. Right now, present how the server prescribes a reasonable specialist to a client. The entire procedurecanbe separated into three sections: requests sending, comparability count, and specialist suggestion. Demandssending:Beforesendingthesolicitationto clinical server for suggestion, a client needs to check its personality also, give certifications to server. a userneedsto verify its identity and provide credentials to server. However, in this work, we do not discuss the details of the identity authentication process because it is not the main points of recommendation. Once the server confirms that client is approved by TA, client sends the requests to the server. At the point when client applies for a clinical administration to the server, client sends his own demand vector also, a worthy comparability edge Ts to the server. In the wake of figuring thecomparabilityamongclientandeach specialist, the server chooses specialist. At thatpoint,among the chose specialists, the server chooses the specialist with the highest reputation score recommends to client. In the wake of finishing a clinical assistance, user will give an input score to assess the specialist's administration. These input scores are used to figure the reputation score of the specialist.Theentiretyprocedurecan be separated into two sections: protection safeguarding truth esteem figuring and reputation score computation. Protection safeguarding truth esteem count: We powerfully relegate various loads to the criticism scores of each client, and continually update reality estimation of various input scores so a reality worth can be registered to speaks to reputation scores. During this procedure of truth esteem computation, the client has the secret key s1 and the server has the secret key s2, consequently the client and the server cooperate to accomplish the protection safeguarding weight update and reality esteem update. In particular, reality esteem computation is partitioned into the accompanying two stages. One is secure weight update and other is Secure truth update. 3. CONCLUSION In this paper, designed an a security saving on the web clinical assistance suggestion plot for eHealthcare framework so as to help a client find a reasonable specialist. Compared with exiting schemes, thisschemecanaccomplish efficient and precise specialist suggestion. To acknowledge SPMR, have structured security protecting closeness count and security saving reputation score figuring plans. REFERENCES [1] K. Wang, Y. Shao, L. Shu, C. Zhu, and Y.Zhang,“Mobilebig data faulttolerant processing for ehealth networks,” IEEE Network, vol. 30, no. 1, pp. 36–42, 2016. M. Young, The Technical Writer’s Handbook. Mill Valley, CA: University Science, 1989. [2] H. Hu, R. Lu, and Z. Zhang, “Tpsq: Trust-based platoon service query via vehicular communications,” Peer-to- Peer Networking and Applications, pp. 1–16, 2017. [3] F. G. Marmol and G. M. Perez, “Trip, a trust and reputation infrastructure based proposal for vehicular ad hoc networks,” Journal of Net. and Comp. App., vol. 35, no. 3, pp. 934–941, 2012.
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 4786 [4] H. Hu, R. Lu, C. Huang, and Z. Zhang, “PTRS: A privacy- preserving trust-based relay selection scheme in vanets,” Peer-to-Peer Networking and Applications,vol. 10, no. 5, pp. 1204–1218, 2017. [5] C. Zhang, L. Zhu, C. Xu, K. Sharif, and X. Liu, “Pptds: A privacypreserving truth discovery scheme in crowd sensing systems,” Information Sciences, 2019. [6] C. Zhang, L. Zhu, C. Xu, K. Sharif, X. Du, and M. Guizani, “LPTD: achieving lightweight and privacy-preserving truth discovery in ciot,” Future Generation Comp. Syst., vol. 90, pp. 175–184, 2019. [7] J. Li, Y. Zhang, X. Chen, and Y. Xiang, “Secure attribute- based data sharing for resource-limited users in cloud computing,” Computers & Security, vol. 72, pp. 1–12, 2018. [8] R. Lu, K. Heung, A. H. Lashkari, and A. A. Ghorbani, “A lightweight privacy-preservingdata aggregationscheme for fog computing-enhanced iot,” IEEE Access, vol. 5,pp. 3302–3312, 2017. [9] PPMR: A Privacy-preserving online Medical service Recommendation scheme in eHealthcare system Chang Xu, Jiachen Wang, Liehuang Zhu, Member, IEEE, Chuan Zhang, and Kashif Sharif, Member, IEEE [10] K. Xue, Y. Xue, J. Hong, W. Li, H. Yue, D. S. L. Wei, and P. Hong, “RAAC: robust and auditable access control with multiple attribute authorities for public cloud storage,” IEEE Trans. Information Forensics and Security, vol. 12, no. 4, pp. 953–967, 2017. [Online]. Available: https://doi.org/10.1109/TIFS.2016.2647222
Download now