SlideShare a Scribd company logo
Available online at https://www.ijasrd.org/
International Journal of Advanced Scientific
Research & Development
Vol. 06, Iss. 03, Ver. I, Mar’ 2019, pp. 34 – 38
Cite this article as: Kumar, S. K., Anusiya, N., Mahalakshmi, P., & Manimegalai, P., “Secure Medical Data Computation
using Virtual_ID Authentication and File Swapping”. International Journal of Advanced Scientific Research & Development
(IJASRD), 06 (03/I), 2019, pp. 34 – 38. https://doi.org/10.26836/ijasrd/2019/v6/i3/60305.
* Corresponding Author: K. Satheesh Kumar, satheesh@aucetk.edu.in
e-ISSN: 2395-6089
p-ISSN: 2394-8906
SECURE MEDICAL DATA COMPUTATION USING VIRTUAL_ID
AUTHENTICATION AND FILE SWAPPING
K. Satheesh Kumar1*, N. Anusiya2, P. Mahalakshmi2, and P. Manimegalai2
1 Asst. Prof., Department of Computer Science and Engineering, University College of Engineering,
Thirukkuvalai, Nagapattinam, India.
2 Student, Department of Computer Science and Engineering, University College of Engineering,
Thirukkuvalai, Nagapattinam, India.
ARTICLE INFO
Article History:
Received: 19 Mar 2019;
Received in revised form:
30 Mar 2019;
Accepted: 30 Mar 2019;
Published online: 10 Apr 2019.
Key words:
Hashing,
Homomorphic Encryption,
NTRU,
Medical Application,
File Swapping,
IDS.
ABSTRACT
PHR provides users with a great deal in leakage of sensitive
information. However, securing the sensitive medical data
also brings very serious security problems, especially for the
data security which is stored in the medical cloud data. Once
the data is leaked to a third party, then the data privacy has
become a major problem, mainly such as authentication,
availability of data, confidentiality etc., and which is to be
taken into consideration very effectively. An authentication
scheme based on virtual smartcard using hashing function
for medical data is proposed to solve the problem of in which
the illegal users access the resources of servers. Here, we also
maintain PHR sensitive data in the cloud by using file
swapping concept. Once the user access the data. The user
data will be swapped into different places by file swapping
concept, so the file will be more secured and no one can hack
or theft our data.
Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original
work is properly cited.
INTRODUCTION
Healthcare data security is very much essential in the Health Insurance and
Accountability Act Rules. The HIPAA belongs to Security Rule that requires fully covered
entities to assess data security manage by conducting a risk assessment, and implement a
risk management program to address any vulnerabilities that are identified. In 2015 there
were 750 breaches found and the 193 million personal records opened to make fraud. In
June 2016 alone, more than 11 million health care records were exposed because of cyber-
attacks and over millions of data where hacked in 2018. Looking at these numbers, it is
obvious that cyber and data security is a major concern to health care.
Kumar et al., (2019)
35 Volume 06, Issue 03, Version I, Mar’ 2019
In the existing system the medical data in cloud is secured by using
GPU_Accelerated homomorphic encryption scheme which is used for securing only the
medical Cloud data, the major problem is Authentication( in every aspects such as big data,
cloud computing, and etc.),and identification of file location after decryption may allow
hacker to access data .
In this paper we proposed an idea in order to avoid such problem we have used using
hashing technique[1] with SHA-2 for authentication and file swapping[2] for changing the
location of the decrypted file. We have used IDS[3] for monitoring unauthorized access and
NTRU[4] based homomorphic encryption[5] for cloud data.
HASHING TECHNIQUE
A hash value is unique which helps to identify secret information. The hash function
is the collision-resistant is needed to find data which will generate the same hash value.
There are two types of functions in hashing which are listed as follows
1) Cryptographic hash function
2) Provably secure hash function
The provably secure hash function is very slow but it is very secured. For generating
the very large hash value the collision resistance is accomplished. But cryptographic is too
fast as well as secure, hence we have used it for our implementation.
Example: SHA-2 is most popular cryptographic function which is designed by
National Security Agency (NSA). It contain six different types of hashing algorithm, they
are
 SHA-256
 SHA-512
 SHA-224
 SHA-384
 SHA-512/224
 SHA-512/256
It has undergone 64-rounds of hashing and also it calculate hash code (i.e.,) 64-digit
hexadecimal number.
Secure Medical Data Computation using Virtual_ID Authentication and File Swapping
Volume 06, Issue 03, Version I, Mar’ 2019 36
2.1 Input Format
A single alphanumeric string is denoted by s.
2.2 Constraints
6 ≤ |s| ≥ 20 and String s consists of alphabetic letters (i.e., [a-z A-Z]), and decimal
digits (i.e., 0 through 9) only.
2.3 Output Format
Print the SHA-256 encryption value of s on a new line.
NTRU SCHEME
The NTRU operation will increases quadratically and it is a open source public key
cryptosystem which uses lattice based cryptography for encryption and decryption of data,
whereas RSA operation increases as cubically, hence NTRU is chosen which consist of two
algorithm
1) NTRUEncrypt
2) NTRUSign
NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for
digital signatures and the attacks are resisted by using Shor’s algorithm and its
performance is much better than others. It was placed in public domain in 2017 and it can
be used by software under the GPL[6][7]. Here the NTRUEncrypt is preferred to make safe of
cloud storage data in an Encrypted form.
NTRU BASED HOMOMORPHIC EVOLUTION
In this section, we describe our implementation in detail. We know that prince
cipher is most relevant for Homomorphic evolution. Then later we implemented the shallow
circuit and for implementation we need to select the optimal parameter based on DHS FHE
scheme
While permitting a shallow circuit implementation picking up a lightweight block
cipher will provide the efficient encryption which means the level of multiplication should
be minimized. Therefore we turn around ourself to use the lightweight block ciphers[8].
There are two linear factors which increase the number of multiplication is: size and the
complexity of s-boxes and if higher linearity occur then it results in higher degree terms.
PRESENT[9] it has simple s-boxes for individual s-box resulting in shallow circuit. Where
PRESENT is less optimal because of higher rounds. Prince is a recent model of block
cipher[10] which has same complexity for s-boxes but it has 12 round for the efficient process,
the more complex layer does not make a problem because it does not introduce any new
binary multiplication.
The complexity of different lightweight cipher can be overviewed and note that the
cipher depth is determined by consecutive levels of binary AND-statement. There are two
types of software-oriented ciphers they are, SEA and HEIGHT. Feistel-structure and high
number of rounds results in high depth circuit which make bad choice. The addition of mod
2 n gives significant output due to high nonlinearity. In FHE supports for evaluating
integer operation and not to the mixed integer hence bit-oriented operation is required by
Kumar et al., (2019)
37 Volume 06, Issue 03, Version I, Mar’ 2019
most block cipher. Hence, the hardware oriented cipher such as Present and Prince is
mostly preferred. Example, the evolution of few rounds in parallel, since the bits are
processed in consecutive rounds. AES offers a low depth due to the low number of rounds. In
resent 30 implementation of AES gives rise to several multiplications, instead depth 40
implementation is used in current practice. The ANF (Algebraic Normal Form) is used to
represent the optimal representation of the S-boxes in the form of XOR or AND statements.
FILE SWAPPING
The file swapping for exchanging access database in single IP is as same as the
swapping of two numbers concept.
We all know that our data is hacked by the unauthorized user if they find the
location of our file, where it is found in a user’s single IP and hence in order to avoid this
hacking we introduced the concept called FILE SWAPPING[11].
Here the file swapping concept implements after a decryption of a file, when the file
is accessed by user it is swapped into other place within singleIP and make secure
arrangements.
INTRUSION DETECTION SYSTEM (IDS)
An Intrusion Detection System (IDS) is a device or software application which is
used for monitoring a network of a systems or for malicious activity. It sends the activity of
unauthorized user information to an administrator or otherwise it collects centrally using
security information. Any malicious activity or violation is typically reported either to an
administrator or collected centrally using a security information and event management
(SIEM) system. A SIEM system is used to combines outputs from multiple sources, and the
alarm filtering techniques is used to distinguish malicious activity from false alarms.
Intrusion Prevention Systems (IPS), also known as intrusion detection and
prevention systems (IDPS) are network security appliances which is used for monitoring the
network activities are network security appliances that monitor network or system
activities for malicious activity.
The IPS is classified into 4 different types which are listed as follows
1) Network-based intrusion prevention system (NIPS)
2) Wireless intrusion prevention system (WIPS)
3) Network behavior analysis (NBA)
4) Host-based intrusion prevention system (HIPS)
It uses three different types of detection methods in Intrution Prevention System
namely, Signature-based detection, Statistical anomaly-based detection, Stateful protocol
analysis detection.
Secure Medical Data Computation using Virtual_ID Authentication and File Swapping
Volume 06, Issue 03, Version I, Mar’ 2019 38
The main functions of intrusion prevention systems are to identify malicious activity,
log information about the intrusion detection system.
CONCLUSION
We formulated, optimized, and implemented an NTRU-based variant of the HE
scheme of which achieves much slower growth of noise, and thus much better parameters
than previous HE schemes. Compared to the work in, our GPU Implementation (GM204
Maxwell Architecture) achieves a speedup of 6085xin Ctxt multiplication, which represents
the bottleneck for most HE schemes. Representative medical applications, namely Pearson
Goodness-of-fit test, Cochran-Armitage Test for Trend (CATT), predictive analysis, and
relational operations were implemented and scored speedups of 160.9x, 162.9x, 80000x, and
12.2x, respectively.
REFERENCES
[1] Konheim, A., (2010). "7. Hashing for Storage: Data Management". Hashing in Computer Science:
Fifty Years of Slicing and Dicing. Wile Interscience. ISBN 9780470344736
[2] Turcan, E., (2002), “Peer-to-Peer: The Third Generation Internet”. Retreived from
http://csdl.computer.org/comp/proceedings/p2p/2001/1503/00/15030095.pdf
[3] Vilela, Douglas W. F. L.; Lotufo, Anna Diva P.; Santos, Carlos R. (2018). Fuzzy ARTMAP Neural
Network IDS Evaluation applied for real IEEE 802.11w data base. 2018 International Joint
Conference on Neural Networks (IJCNN). IEEE. doi:10.1109/ijcnn.2018.8489217. ISBN
9781509060146.
[4] Robertson, Elizabeth D. (August 1, 2002). "RE: NTRU Public Key Algorithms IP Assurance
Statement for 802.15.3" (PDF). IEEE. Retrieved February 4, 2013.
[5] S. Carpov, R. Sirdey, "Another compression method for homomorphicciphertexts", Proceedings of
the 4th InternationalWorkshop on Security in Cloud Computing, 2016.
[6] https://www.securityinnovation.com/company/news-and-events/press-releases/security-innovation-
makes-ntruencrypt-patent-free
[7] https://github.com/NTRUOpenSourceProject/ntru-crypto#is-ntru-patented
[8] T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A survey oflightweight-
cryptography implementations. IEEE Design Test of Computers, 24(6):522{533, Nov 2007.
[9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B.Robshaw, Y. Seurin,
and C. Vikkelsoe. PRESENT: An Ultra-Lightweight BlockCipher, pages 450{466. Springer
Berlin Heidelberg, Berlin, Heidelberg, 2007.
[10] Julia Borgho, Anne Canteaut, Tim G•uneysu, Elif Bilge Kavun, MiroslavKnezevic, Lars R.
Knudsen, Gregor Leander, VentzislavNikov, ChristofPaar, Christian Rechberger, Peter
Rombouts, S_ren S. Thomsen, and Tolga Yal_c_n.PRINCE{ A Low-Latency Block Cipher for
Pervasive Computing Applications,pages 208{225. Springer Berlin Heidelberg, Berlin,
Heidelberg, 2012.
[11] "Copyright and Peer-To-Peer Music File Sharing: The Napster Case and the Argument Against
Legislative Reform". murdoch.edu.au. March 2004.]
[12] Jump up to:a b Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and
Prevention Systems (IDPS)" (PDF). Computer Security Resource Center (800–94). Retrieved
1 January 2010.

More Related Content

What's hot

Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
IRJET Journal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
IAESIJEECS
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
Sathya Madhesh
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET Journal
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET Journal
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
Luisa Francisco
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
IJSRED
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
Luisa Francisco
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET Journal
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
IAEME Publication
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
IJERA Editor
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
Journal For Research
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
IJERA Editor
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
IAEME Publication
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET Journal
 
J018145862
J018145862J018145862
J018145862
IOSR Journals
 

What's hot (20)

Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc3 ijece 1 ed iqbal qc
3 ijece 1 ed iqbal qc
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122Ijaiem 2014-11-30-122
Ijaiem 2014-11-30-122
 
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...IRJET-  	  Review on Privacy Preserving on Multi Keyword Search over Encrypte...
IRJET- Review on Privacy Preserving on Multi Keyword Search over Encrypte...
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
A research paper_on_lossless_data_compre
A research paper_on_lossless_data_compreA research paper_on_lossless_data_compre
A research paper_on_lossless_data_compre
 
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
A Privacy Preserving Three-Layer Cloud Storage Scheme Based On Computational ...
 
Big data security_issues_research_paper
Big data security_issues_research_paperBig data security_issues_research_paper
Big data security_issues_research_paper
 
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and SteganographyIRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
IRJET- A Survey: Data Security in Cloud using Cryptography and Steganography
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
Ej24856861
Ej24856861Ej24856861
Ej24856861
 
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEMSECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
SECURITY BASED ISSUES IN VIEW OF CLOUD BASED STORAGE SYSTEM
 
Data Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud ComputingData Leakage Detection and Security Using Cloud Computing
Data Leakage Detection and Security Using Cloud Computing
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic AlgorithmsIRJET- Data Security in Cloud Computing using Cryptographic Algorithms
IRJET- Data Security in Cloud Computing using Cryptographic Algorithms
 
J018145862
J018145862J018145862
J018145862
 

Similar to Secure Medical Data Computation using Virtual_ID Authentication and File Swapping

Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
Evelyn Donaldson
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
ijtsrd
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
AM Publications,India
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
ijtsrd
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
ijmnct
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
Editor IJCATR
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
AM Publications,India
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
IRJET Journal
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
IJNSA Journal
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
IJNSA Journal
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
IJECEIAES
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET Journal
 
Dnssec Case Study
Dnssec Case StudyDnssec Case Study
Dnssec Case Study
Lindsey Rivera
 
IJET-V3I2P10
IJET-V3I2P10IJET-V3I2P10
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET Journal
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
IJERA Editor
 

Similar to Secure Medical Data Computation using Virtual_ID Authentication and File Swapping (20)

Target Unncryption Case Study
Target Unncryption Case StudyTarget Unncryption Case Study
Target Unncryption Case Study
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
Data Sharing with Sensitive Information Hiding in Data Storage using Cloud Co...
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...Literature Survey: Secure transmitting of data using RSA public key implement...
Literature Survey: Secure transmitting of data using RSA public key implement...
 
Improving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and AuthenticationImproving Cloud Security Using Multi Level Encryption and Authentication
Improving Cloud Security Using Multi Level Encryption and Authentication
 
AWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption SystemAWS Cloud Based Encryption Decryption System
AWS Cloud Based Encryption Decryption System
 
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud ComputingIRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Dnssec Case Study
Dnssec Case StudyDnssec Case Study
Dnssec Case Study
 
IJET-V3I2P10
IJET-V3I2P10IJET-V3I2P10
IJET-V3I2P10
 
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET - Data Security in Cloud Computing using Homomorphic Algoritham
IRJET - Data Security in Cloud Computing using Homomorphic Algoritham
 
Kp3419221926
Kp3419221926Kp3419221926
Kp3419221926
 

More from IJASRD Journal

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial Engineering
IJASRD Journal
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
IJASRD Journal
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
IJASRD Journal
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace Management
IJASRD Journal
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
IJASRD Journal
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
IJASRD Journal
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
IJASRD Journal
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste Management
IJASRD Journal
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two Wheelers
IJASRD Journal
 
A Survey on IoT Architecture
A Survey on IoT ArchitectureA Survey on IoT Architecture
A Survey on IoT Architecture
IJASRD Journal
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic Algorithm
IJASRD Journal
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
IJASRD Journal
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered Multicarrier
IJASRD Journal
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
IJASRD Journal
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
IJASRD Journal
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
IJASRD Journal
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll Collection
IJASRD Journal
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC Encryption
IJASRD Journal
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
IJASRD Journal
 
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
IJASRD Journal
 

More from IJASRD Journal (20)

Gainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial EngineeringGainful Human Empowerment Reform in Managerial Engineering
Gainful Human Empowerment Reform in Managerial Engineering
 
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
A Study on Quality of Life and Social Support Breast Cancer Women in Greater ...
 
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
Road Accident Analysis and Prevention in Nigeria: Experimental and Numerical ...
 
Leadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace ManagementLeadership by Humanistic Approach in Workplace Management
Leadership by Humanistic Approach in Workplace Management
 
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
Time Evolution of Density Parameters for Matter and Dark Energy and their Int...
 
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
An Experimental Investigation on Normal Concrete using Rice Husk Ash, Dolomit...
 
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
A Novel Implementation for Radio Resource Allocation on Mobile Access Based o...
 
IoT Based Solid Waste Management
IoT Based Solid Waste ManagementIoT Based Solid Waste Management
IoT Based Solid Waste Management
 
IoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two WheelersIoT Based Accident Avoidance and Detection System for Two Wheelers
IoT Based Accident Avoidance and Detection System for Two Wheelers
 
A Survey on IoT Architecture
A Survey on IoT ArchitectureA Survey on IoT Architecture
A Survey on IoT Architecture
 
Realization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic AlgorithmRealization of Direct Digital Synthesis in Cordic Algorithm
Realization of Direct Digital Synthesis in Cordic Algorithm
 
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected PeoplesVirtual Reality Based Requirement Distributions for Disaster Affected Peoples
Virtual Reality Based Requirement Distributions for Disaster Affected Peoples
 
Implementation of Low Complex Universal Filtered Multicarrier
Implementation of Low Complex Universal  Filtered MulticarrierImplementation of Low Complex Universal  Filtered Multicarrier
Implementation of Low Complex Universal Filtered Multicarrier
 
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
Uncompressed Video Streaming in Wireless Channel without Interpolation using ...
 
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
Massive MIMO-Based 5G Networks: Energy Harvesting Base Stations with Minimum ...
 
Voice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment PeoplesVoice Based Search Engine for Visually Impairment Peoples
Voice Based Search Engine for Visually Impairment Peoples
 
Enhanced Automated Toll Collection
Enhanced Automated Toll CollectionEnhanced Automated Toll Collection
Enhanced Automated Toll Collection
 
Secure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC EncryptionSecure Video Processing using ROI Extraction and ECC Encryption
Secure Video Processing using ROI Extraction and ECC Encryption
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
Effect of HHO Gas as Fuel Additive on the Exhaust Emissions of Internal Combu...
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 

Secure Medical Data Computation using Virtual_ID Authentication and File Swapping

  • 1. Available online at https://www.ijasrd.org/ International Journal of Advanced Scientific Research & Development Vol. 06, Iss. 03, Ver. I, Mar’ 2019, pp. 34 – 38 Cite this article as: Kumar, S. K., Anusiya, N., Mahalakshmi, P., & Manimegalai, P., “Secure Medical Data Computation using Virtual_ID Authentication and File Swapping”. International Journal of Advanced Scientific Research & Development (IJASRD), 06 (03/I), 2019, pp. 34 – 38. https://doi.org/10.26836/ijasrd/2019/v6/i3/60305. * Corresponding Author: K. Satheesh Kumar, satheesh@aucetk.edu.in e-ISSN: 2395-6089 p-ISSN: 2394-8906 SECURE MEDICAL DATA COMPUTATION USING VIRTUAL_ID AUTHENTICATION AND FILE SWAPPING K. Satheesh Kumar1*, N. Anusiya2, P. Mahalakshmi2, and P. Manimegalai2 1 Asst. Prof., Department of Computer Science and Engineering, University College of Engineering, Thirukkuvalai, Nagapattinam, India. 2 Student, Department of Computer Science and Engineering, University College of Engineering, Thirukkuvalai, Nagapattinam, India. ARTICLE INFO Article History: Received: 19 Mar 2019; Received in revised form: 30 Mar 2019; Accepted: 30 Mar 2019; Published online: 10 Apr 2019. Key words: Hashing, Homomorphic Encryption, NTRU, Medical Application, File Swapping, IDS. ABSTRACT PHR provides users with a great deal in leakage of sensitive information. However, securing the sensitive medical data also brings very serious security problems, especially for the data security which is stored in the medical cloud data. Once the data is leaked to a third party, then the data privacy has become a major problem, mainly such as authentication, availability of data, confidentiality etc., and which is to be taken into consideration very effectively. An authentication scheme based on virtual smartcard using hashing function for medical data is proposed to solve the problem of in which the illegal users access the resources of servers. Here, we also maintain PHR sensitive data in the cloud by using file swapping concept. Once the user access the data. The user data will be swapped into different places by file swapping concept, so the file will be more secured and no one can hack or theft our data. Copyright © 2019 IJASRD. This is an open access article distributed under the Creative Common Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. INTRODUCTION Healthcare data security is very much essential in the Health Insurance and Accountability Act Rules. The HIPAA belongs to Security Rule that requires fully covered entities to assess data security manage by conducting a risk assessment, and implement a risk management program to address any vulnerabilities that are identified. In 2015 there were 750 breaches found and the 193 million personal records opened to make fraud. In June 2016 alone, more than 11 million health care records were exposed because of cyber- attacks and over millions of data where hacked in 2018. Looking at these numbers, it is obvious that cyber and data security is a major concern to health care.
  • 2. Kumar et al., (2019) 35 Volume 06, Issue 03, Version I, Mar’ 2019 In the existing system the medical data in cloud is secured by using GPU_Accelerated homomorphic encryption scheme which is used for securing only the medical Cloud data, the major problem is Authentication( in every aspects such as big data, cloud computing, and etc.),and identification of file location after decryption may allow hacker to access data . In this paper we proposed an idea in order to avoid such problem we have used using hashing technique[1] with SHA-2 for authentication and file swapping[2] for changing the location of the decrypted file. We have used IDS[3] for monitoring unauthorized access and NTRU[4] based homomorphic encryption[5] for cloud data. HASHING TECHNIQUE A hash value is unique which helps to identify secret information. The hash function is the collision-resistant is needed to find data which will generate the same hash value. There are two types of functions in hashing which are listed as follows 1) Cryptographic hash function 2) Provably secure hash function The provably secure hash function is very slow but it is very secured. For generating the very large hash value the collision resistance is accomplished. But cryptographic is too fast as well as secure, hence we have used it for our implementation. Example: SHA-2 is most popular cryptographic function which is designed by National Security Agency (NSA). It contain six different types of hashing algorithm, they are  SHA-256  SHA-512  SHA-224  SHA-384  SHA-512/224  SHA-512/256 It has undergone 64-rounds of hashing and also it calculate hash code (i.e.,) 64-digit hexadecimal number.
  • 3. Secure Medical Data Computation using Virtual_ID Authentication and File Swapping Volume 06, Issue 03, Version I, Mar’ 2019 36 2.1 Input Format A single alphanumeric string is denoted by s. 2.2 Constraints 6 ≤ |s| ≥ 20 and String s consists of alphabetic letters (i.e., [a-z A-Z]), and decimal digits (i.e., 0 through 9) only. 2.3 Output Format Print the SHA-256 encryption value of s on a new line. NTRU SCHEME The NTRU operation will increases quadratically and it is a open source public key cryptosystem which uses lattice based cryptography for encryption and decryption of data, whereas RSA operation increases as cubically, hence NTRU is chosen which consist of two algorithm 1) NTRUEncrypt 2) NTRUSign NTRUEncrypt, which is used for encryption, and NTRUSign, which is used for digital signatures and the attacks are resisted by using Shor’s algorithm and its performance is much better than others. It was placed in public domain in 2017 and it can be used by software under the GPL[6][7]. Here the NTRUEncrypt is preferred to make safe of cloud storage data in an Encrypted form. NTRU BASED HOMOMORPHIC EVOLUTION In this section, we describe our implementation in detail. We know that prince cipher is most relevant for Homomorphic evolution. Then later we implemented the shallow circuit and for implementation we need to select the optimal parameter based on DHS FHE scheme While permitting a shallow circuit implementation picking up a lightweight block cipher will provide the efficient encryption which means the level of multiplication should be minimized. Therefore we turn around ourself to use the lightweight block ciphers[8]. There are two linear factors which increase the number of multiplication is: size and the complexity of s-boxes and if higher linearity occur then it results in higher degree terms. PRESENT[9] it has simple s-boxes for individual s-box resulting in shallow circuit. Where PRESENT is less optimal because of higher rounds. Prince is a recent model of block cipher[10] which has same complexity for s-boxes but it has 12 round for the efficient process, the more complex layer does not make a problem because it does not introduce any new binary multiplication. The complexity of different lightweight cipher can be overviewed and note that the cipher depth is determined by consecutive levels of binary AND-statement. There are two types of software-oriented ciphers they are, SEA and HEIGHT. Feistel-structure and high number of rounds results in high depth circuit which make bad choice. The addition of mod 2 n gives significant output due to high nonlinearity. In FHE supports for evaluating integer operation and not to the mixed integer hence bit-oriented operation is required by
  • 4. Kumar et al., (2019) 37 Volume 06, Issue 03, Version I, Mar’ 2019 most block cipher. Hence, the hardware oriented cipher such as Present and Prince is mostly preferred. Example, the evolution of few rounds in parallel, since the bits are processed in consecutive rounds. AES offers a low depth due to the low number of rounds. In resent 30 implementation of AES gives rise to several multiplications, instead depth 40 implementation is used in current practice. The ANF (Algebraic Normal Form) is used to represent the optimal representation of the S-boxes in the form of XOR or AND statements. FILE SWAPPING The file swapping for exchanging access database in single IP is as same as the swapping of two numbers concept. We all know that our data is hacked by the unauthorized user if they find the location of our file, where it is found in a user’s single IP and hence in order to avoid this hacking we introduced the concept called FILE SWAPPING[11]. Here the file swapping concept implements after a decryption of a file, when the file is accessed by user it is swapped into other place within singleIP and make secure arrangements. INTRUSION DETECTION SYSTEM (IDS) An Intrusion Detection System (IDS) is a device or software application which is used for monitoring a network of a systems or for malicious activity. It sends the activity of unauthorized user information to an administrator or otherwise it collects centrally using security information. Any malicious activity or violation is typically reported either to an administrator or collected centrally using a security information and event management (SIEM) system. A SIEM system is used to combines outputs from multiple sources, and the alarm filtering techniques is used to distinguish malicious activity from false alarms. Intrusion Prevention Systems (IPS), also known as intrusion detection and prevention systems (IDPS) are network security appliances which is used for monitoring the network activities are network security appliances that monitor network or system activities for malicious activity. The IPS is classified into 4 different types which are listed as follows 1) Network-based intrusion prevention system (NIPS) 2) Wireless intrusion prevention system (WIPS) 3) Network behavior analysis (NBA) 4) Host-based intrusion prevention system (HIPS) It uses three different types of detection methods in Intrution Prevention System namely, Signature-based detection, Statistical anomaly-based detection, Stateful protocol analysis detection.
  • 5. Secure Medical Data Computation using Virtual_ID Authentication and File Swapping Volume 06, Issue 03, Version I, Mar’ 2019 38 The main functions of intrusion prevention systems are to identify malicious activity, log information about the intrusion detection system. CONCLUSION We formulated, optimized, and implemented an NTRU-based variant of the HE scheme of which achieves much slower growth of noise, and thus much better parameters than previous HE schemes. Compared to the work in, our GPU Implementation (GM204 Maxwell Architecture) achieves a speedup of 6085xin Ctxt multiplication, which represents the bottleneck for most HE schemes. Representative medical applications, namely Pearson Goodness-of-fit test, Cochran-Armitage Test for Trend (CATT), predictive analysis, and relational operations were implemented and scored speedups of 160.9x, 162.9x, 80000x, and 12.2x, respectively. REFERENCES [1] Konheim, A., (2010). "7. Hashing for Storage: Data Management". Hashing in Computer Science: Fifty Years of Slicing and Dicing. Wile Interscience. ISBN 9780470344736 [2] Turcan, E., (2002), “Peer-to-Peer: The Third Generation Internet”. Retreived from http://csdl.computer.org/comp/proceedings/p2p/2001/1503/00/15030095.pdf [3] Vilela, Douglas W. F. L.; Lotufo, Anna Diva P.; Santos, Carlos R. (2018). Fuzzy ARTMAP Neural Network IDS Evaluation applied for real IEEE 802.11w data base. 2018 International Joint Conference on Neural Networks (IJCNN). IEEE. doi:10.1109/ijcnn.2018.8489217. ISBN 9781509060146. [4] Robertson, Elizabeth D. (August 1, 2002). "RE: NTRU Public Key Algorithms IP Assurance Statement for 802.15.3" (PDF). IEEE. Retrieved February 4, 2013. [5] S. Carpov, R. Sirdey, "Another compression method for homomorphicciphertexts", Proceedings of the 4th InternationalWorkshop on Security in Cloud Computing, 2016. [6] https://www.securityinnovation.com/company/news-and-events/press-releases/security-innovation- makes-ntruencrypt-patent-free [7] https://github.com/NTRUOpenSourceProject/ntru-crypto#is-ntru-patented [8] T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann, and L. Uhsadel. A survey oflightweight- cryptography implementations. IEEE Design Test of Computers, 24(6):522{533, Nov 2007. [9] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B.Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An Ultra-Lightweight BlockCipher, pages 450{466. Springer Berlin Heidelberg, Berlin, Heidelberg, 2007. [10] Julia Borgho, Anne Canteaut, Tim G•uneysu, Elif Bilge Kavun, MiroslavKnezevic, Lars R. Knudsen, Gregor Leander, VentzislavNikov, ChristofPaar, Christian Rechberger, Peter Rombouts, S_ren S. Thomsen, and Tolga Yal_c_n.PRINCE{ A Low-Latency Block Cipher for Pervasive Computing Applications,pages 208{225. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012. [11] "Copyright and Peer-To-Peer Music File Sharing: The Napster Case and the Argument Against Legislative Reform". murdoch.edu.au. March 2004.] [12] Jump up to:a b Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention Systems (IDPS)" (PDF). Computer Security Resource Center (800–94). Retrieved 1 January 2010.