Soumettre la recherche
Mettre en ligne
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Cryptosystem Method
•
0 j'aime
•
14 vues
IRJET Journal
Suivre
https://www.irjet.net/archives/V6/i6/IRJET-V6I6770.pdf
Lire moins
Lire la suite
Ingénierie
Signaler
Partager
Signaler
Partager
1 sur 4
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Cloudcomputingthesis
Cloudcomputingthesis
Deepak Chiripal
Recommandé
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Publishing House
Enhancing security features in cloud computing for healthcare using cipher an...
Enhancing security features in cloud computing for healthcare using cipher an...
eSAT Journals
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
Cloudlet based Healthcare and Medical Knowledge Extraction System for Medical...
IJCSIS Research Publications
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
A Proposed Security Architecture for Establishing Privacy Domains in Systems ...
IJERA Editor
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET- A Core Medical Treatment System forEmergency Management using Cloud
IRJET Journal
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET-Implementation of Threshold based Cryptographic Technique over Cloud Co...
IRJET Journal
Cloudcomputingthesis
Cloudcomputingthesis
Deepak Chiripal
Cloud Computing Stats - Cloud for Healthcare
Cloud Computing Stats - Cloud for Healthcare
RapidScale
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
eSAT Journals
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technology
IJECEIAES
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
csandit
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
IJECEIAES
Security and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
hiij
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
neirew J
Healthcare in the Clouds
Healthcare in the Clouds
Gail Wilcox
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
ijtsrd
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management System
ijtsrd
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
IJMER
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
cscpconf
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
YogeshIJTSRD
Cloud computing in healthcare
Cloud computing in healthcare
Mohammad Al-Ubaydli
50120140503020
50120140503020
IAEME Publication
I42024349
I42024349
IJERA Editor
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
Contenu connexe
Tendances
Cloud Computing Stats - Cloud for Healthcare
Cloud Computing Stats - Cloud for Healthcare
RapidScale
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
eSAT Journals
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET Journal
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technology
IJECEIAES
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
csandit
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
IJECEIAES
Security and privacy approach of cloud computing
Security and privacy approach of cloud computing
Jahangeer Qadiree
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET Journal
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
hiij
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
neirew J
Healthcare in the Clouds
Healthcare in the Clouds
Gail Wilcox
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET Journal
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
ijtsrd
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management System
ijtsrd
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
IJMER
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
cscpconf
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
YogeshIJTSRD
Cloud computing in healthcare
Cloud computing in healthcare
Mohammad Al-Ubaydli
50120140503020
50120140503020
IAEME Publication
I42024349
I42024349
IJERA Editor
Tendances
(20)
Cloud Computing Stats - Cloud for Healthcare
Cloud Computing Stats - Cloud for Healthcare
Cloud assisted privacy preserving and data integrity for mobile health monito...
Cloud assisted privacy preserving and data integrity for mobile health monito...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
IRJET- Providing Privacy in Healthcare Cloud for Medical Data using Fog Compu...
Healthcare information exchange using blockchain technology
Healthcare information exchange using blockchain technology
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
FAST ALGORITHMS FOR UNSUPERVISED LEARNING IN LARGE DATA SETS
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
Security and privacy approach of cloud computing
Security and privacy approach of cloud computing
IRJET - Coarse Grain Load Balance Algorithm for Detecting
IRJET - Coarse Grain Load Balance Algorithm for Detecting
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
ATTRIBUTE-BASED ACCESS CONTROL (ABAC) FOR HER IN FOG COMPUTING ENVIRONMENT
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Attribute Based Access Control (ABAC) for EHR in Fog Computing Environment
Healthcare in the Clouds
Healthcare in the Clouds
IRJET- Redsc: Reliablity of Data Sharing in Cloud
IRJET- Redsc: Reliablity of Data Sharing in Cloud
Cloud Compliance with Encrypted Data – Health Records
Cloud Compliance with Encrypted Data – Health Records
Security and Challenges using Clouds Computing in Healthcare Management System
Security and Challenges using Clouds Computing in Healthcare Management System
A Novel Framework for Securing Medical Records in Cloud Computing
A Novel Framework for Securing Medical Records in Cloud Computing
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
AN EFFICIENT SOLUTION FOR PRIVACYPRESERVING, SECURE REMOTE ACCESS TO SENSITIV...
Personal Health Record over Encrypted Data Using Cloud Service
Personal Health Record over Encrypted Data Using Cloud Service
Cloud computing in healthcare
Cloud computing in healthcare
50120140503020
50120140503020
I42024349
I42024349
Similaire à IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Cryptosystem Method
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET Journal
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
IRJET Journal
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET Journal
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET Journal
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET Journal
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET Journal
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET Journal
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Associate Professor in VSB Coimbatore
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
ijfcstjournal
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
IRJET Journal
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
Conference Papers
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
IRJET Journal
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6
IAEME Publication
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET Journal
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
ijccsa
E-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET Journal
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET Journal
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
Akshay Mittal
Similaire à IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Cryptosystem Method
(20)
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
IRJET- Secrecy Preserving and Intrusion Avoidance in Medical Data Sharing...
Cloud Based Privacy Preserving Data Encryption
Cloud Based Privacy Preserving Data Encryption
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
DIFFERENCES OF CLOUD-BASED SERVICES AND THEIR SAFETY RENEWAL IN THE HEALTH CA...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
IRJET- Privacy, Access and Control of Health Care Data on Cloud using Recomme...
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
Smart and Secure Healthcare Administration over Cloud Environment
Smart and Secure Healthcare Administration over Cloud Environment
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
IRJET- Secure Re-Encrypted PHR Shared to Users Efficiently in Cloud Computing
Secure Data Access Using ABE Process Model
Secure Data Access Using ABE Process Model
Evaluation Of The Data Security Methods In Cloud Computing Environments
Evaluation Of The Data Security Methods In Cloud Computing Environments
Anonymous Key Based Secure File Encryption in Cloud
Anonymous Key Based Secure File Encryption in Cloud
Mi health care - multi-tenant health care system
Mi health care - multi-tenant health care system
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
A Novel Healthcare-based Block chain (HBC) System for Security Healthcare Dat...
Reliable security in cloud computing environment 2-3-4-5-6
Reliable security in cloud computing environment 2-3-4-5-6
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
IRJET- Enhancement of Security in Cloud Storage of Electronic Health Reco...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
E-Health Care Cloud Solution
E-Health Care Cloud Solution
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
IRJET- Attribute Based Access Control in Personal Health Records using Cloud ...
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
DIGITAL HEALTH: DATA PRIVACY AND SECURITY WITH CLOUD COMPUTING
Plus de IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
Plus de IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Dernier
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
humanexperienceaaa
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls in Nagpur High Profile
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
upamatechverse
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
Dernier
(20)
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
IRJET- Implementation of Cloudlet-based Medical Data Sharing using ECC Cryptosystem Method
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3839 IMPLEMENTATION OF CLOUDLET-BASED MEDICAL DATA SHARING USING ECC CRYPTOSYSTEM METHOD Sonali Ekatpure1, Prof. Subhash Pingale2 1Student, Dept. of CSE, SKN Sinhgad College of Engineering, Pandharpur, Solapur University, Solapur, India 2Prof. Dept. of CSE, SKN Sinhgad College of Engineering, Pandharpur, Solapur University, Solapur, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - The usual framework of medical services regularly requiresthesendingofrestitutioninformationtothecloud, which includes sensitive customer data and causes the use of the vitality of correspondence. For all purposes,theexchange of repair information is a basic and test problem. Consequently, in this document, we develop a new structure for human services through the use of cloudlet adaptability. Cloudlet elements include security insurance, information exchange, and breakpoint location. In the information accumulation phase, we initially used the Numerical Theory Research Unit(NTRU) technique to encode client body information collected from a portable device. This information will be transmitted to adjacent cloudlets in a competent form of vitality. In addition, we show another model of trusttoallowcustomersto choose trusted partners who need to share information stored in the cloudlet. The demonstration of trust also makes comparable patients who talk to each other about their illnesses. Third, we isolate the patient’s medical informationstoredata distance in three sections and provide them with adequate insurance. Key Words: Privacy Protection, Data Sharing, Collaborative Intrusion Detection System (IDS), Healthcare. 1. INTRODUCTION Distributed computing portrays a new way, in some cases a more cost effective way, of conveying venture IT. It speaks to a genuine democratization of Web processing, as with all major problematic changes ininnovationandInternettransformation, and it is not just changing the business models and the way IT foundation is being conveyed and consume, additionally the basic design of how framework create, deploy, run and deliver applications. Healthcare covers complex processes of the diagnosis, treatment, and prevention of disease, injury, and other physical and mental impairments in humans. The patients’ consumption of products and services provided by hospitals and other institutions forms the healthcare industry, which is one of the largest and fastest-growing part of a country’s economy[3]. Computing resources are shared by many users. The benefits of cloud can be extended from end users to organizations. The data storage in cloud is among one of them. The virtualization of hardware and software resources in cloud eliminates the financial investment for owning the data warehouse and its maintenance. Many cloud platforms like Google Drive, cloud; SkyDrive, Amazon S3, Dropbox and Microsoft Azure provide storage services. Security and privacy arethemajorchallengesin cloud computing. The hardware and software security mechanisms like firewalls etc. have been adapted by cloud provider. These solutions are not provides guarantee to protect data in cloud from unauthorized users. So, before storing the precious data in cloud, the data should to be encrypted. Data encryption guarantees the data confidentiality and integrity. To preserve the data secrecy we need to design a searchable algorithm that works on encrypted data.The search techniques may be single keyword search or multi keyword search. In large database the search may result in many documents to be matched with keywords. This causes difficulty for a cloud user to go through all documents and have most relevant documents. Economical searchable encryption techniques help the cloud users especially in pay-as-youusemodel.The researcherscombinedthe rank of documents with multiple keyword search with efficient economically viable searchable encryption techniques[2]. In advance distributed computing, a lot of information can be put away in different clouds, consisting cloudlets and remote clouds, encouraging information sharingandintensivecomputations.Inanycase,cloud-basedinformationsharing involvesthe crucial issues like, how to safeguard the security of user's body informationduringitsconveyancetoa cloudlet?,Howtoensure the information appropriating in cloudlet won't cause protection issue?. As can be anticipated, with the multiplication of electronic medical records (EMR) and cloud-helped applications, aneverincreasingnumberofconsiderationsoughttobe paid to the security issue identified with a remote cloudcontaininghealthcarebigdata.Howtosecurethehumanservicesenormous information put away in a remote cloud?, How to successfullyshieldtheentireframework from maliciousattacks?Asfarasthis issue, this paper proposes a cloudlet based medicinal services framework[1].
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3840 2. LITERATURE REVIEW The functions of cloudlet consist of privacy protection, data sharing and intrusion detection. In the stage of data collection, firstly utilize Number Theory Research Unit (NTRU) method to encrypt user’s body data collected by wearable devices.Those data will be send to nearby cloudlet in an energy efficient fashion. Secondly, present a new trust model to help users to select trustable partners who want to share stored data in the cloudlet. The trust model also helps identical patientstocommunicate with each other about their diseases. Thirdly, divide users medical data stored in remote cloud ofhospital intothree parts,and give them proper protection. Finally, in order to protect the healthcare system from malicious attacks, design a novel collaborative intrusion detection system (IDS) method depend on cloudlet mesh, which can effectively prevent the remote healthcare big data cloud from attacks[1]. We have to define and solve the challenging issue of privacy preserving multi-keyword ranked search over encrypted cloud data (MRSE). They establish a set of strict privacy requirements for such a secure cloud data utilizationsystem.Amongvarious multikeyword semantics, they choose the efficient similarity measure of “coordinate matching”, i.e., as many matches as possible, to capture the relevance of data documents to the search query. They further use “inner product similarity” to quantitatively evaluate such similarity measure. First propose a basic idea for the MRSE based on secure inner product computation, and then give twosignificantlyimprovedMRSEschemestoachievevariousstringentprivacyrequirementsintwo different threat models. Thorough study of inspecting privacy and efficiency guarantees of proposed schemes is given[2]. A practical solution for privacy preserving medical record sharing for cloud computing developed on the basis of the classification of the attributes of medical records, they use vertical partition of medical dataset to achieve the considerationof distinct parts of medical information with different privacy concerns. It mainly consisting four components, i.e., (1) vertical data partition for medical information publishing, (2) data combiningformedical datasetaccessing,(3)integritychecking,and (4) hybrid search across plaintext and ciphertext, where the statistical analysis and cryptography are innovatively combined together to provide multiple paradigms of balance among medical data utilization and privacy protection.Aprototypesystem for the huge scale medical data access and distributing is implemented[3]. 3. PROPOSED WORK The implementation for a given input of different medical dataset, apply efficient medical data sharing with KDC method for secure data sharing in cloudlet. Figure demonstrates how the proposed system works. The description of the system is as follows: Fig-1-Block diagram of system In this system data owner take medical dataset as an input to the system. Then data owner encrypt the data using ECC key encryption algorithm. This used to protect the user’s medical data from being leaked or abused. This scheme is to protect the user’s privacy when transmitting the data to the cloudlet. The key distribution center(KDC)providesthekeytodataownerfor encryption. The data owner store encrypted data in a cloudlet system. The cloudlet system likely for them to share common
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3841 aspects, for example, patients suffer from similar kind of diseaseexchangeinformationoftreatmentandsharerelateddata.For this purpose, system use users’ similarity and reputation as input data. This encrypted data stored in a cloud server. While storing data in a cloud server the attacker may attack on it and try to leak the data. In order to protect the healthcare system from malicious attacks, we develop a novel collaborative intrusion detection system (IDS) method based on cloudlet mesh, which can effectively prevent the remote healthcare big data cloud from attacks. If in any hospital doctors need to use user’s data from cloud, then doctor send key request to the data owner. If authenticated doctor is found then data owner provide a key to decrypt the data. Using this key doctor access the data from cloud server, decrypt and read it. 3.1 Module Descriptions 1. Input Dataset This system used medical dataset as an input for securely sharing in cloudlet-based system. 2.Data Owner The work of data owner is taking a medical dataset, encrypt it using ECC encryptionalgorithmandstoreitcloudlet. Forencrypt the data, data owner get key from KDC and for decryption data owner provide the key to authenticated user/doctor. 3. Key Distribution Center (KDC) The key distribution center is used to reduce the risk of key exchanging. It distributed the key among data owner and authenticated user. Using this approach proposed system save both time and memory. 4. Cloudlet System The Cloudlet system store the encrypted data provided by the data owner and also share it to thecloudserver. Whilesharingif any attack found then it prevent it using collaborative intrusion detection system (IDS) method. 5. Cloud Server The cloud server is used to store the user’s encrypted data. If any authenticated doctor wants to access the data then it can be access from the cloud. For decrypt the data he/she must send a key request to the data owner 4. CONCLUSION This system proposed a protected cloudlet-based information sharing framework. This framework share information in encoded design. For encryption, KDC give the way to the customers/information proprietor and they encode the information utilizing encryption calculation. While sharing information, if attack is happened then it prevents by the cloudlet utilizing collaborative intrusion detection system (IDS) technique. The execution of framework is demonstrates that thisframework is more secure and trustable. It likewise spares the time and memory. REFERENCES [1]. Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu, “Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing”, IEEE Transactions on Cloud Computing, 2016. [2]. Cao, C. Wang, M. Li, K. Ren, and W. Lou, “Privacy-preserving multi-keyword ranked search over encrypted cloud data,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 1, pp. 222–233, 2014. [3]. J.-J. Yang, J.-Q. Li, and Y. Niu, “A hybrid solution for privacy preserving medical data sharing in the cloud environment,” Future Generation Computer Systems, vol. 43, pp. 74–86, 2015. [4]. K. Hung, Y. Zhang, and B. Tai, “Wearable medical devices fortelehomehealthcare,”in EngineeringinMedicineandBiology Society, 2004.IEMBS’04. 26th Annual International Conference of the IEEE, vol. 2. IEEE, 2004, pp. 5384–5387. [5]. M. S. Hossain, “Cloud-supported cyber–physical localization framework for patients monitoring,” 2015. [6]. J. Zhao, L. Wang, J. Tao, J. Chen, W. Sun, R. Ranjan, J. Kołodziej,A. Streit, andD.Georgakopoulos,“Asecurityframework in g- hadoopfor big data computing across distributed cloud data centres,” Journal of Computer and System Sciences, vol. 80, no. 5, pp. 994–1007, 2014.M. S. Hossain and G. Muhammad, “Cloud-assisted industrial internet of things (iiot)–enabled framework for health monitoring,” Computer Networks, vol. 101, pp. 192–202, 2016. [7]. R. Zhang and L. Liu, “Security models and requirements for healthcare applicationclouds,”in CloudComputing(CLOUD), 2010 IEEE 3rd International Conference on. IEEE, 2010, pp. 268–275. [8]. K. He, J. Chen, R. Du, Q. Wu, G. Xue, and X. Zhang, “Deypos:Deduplicatable dynamic proof of storage for multi-user environments,”2016. [9]. N. Cao,"Privacy-preserving multi-keyword ranked search over encrypted cloud data",INFOCOM, 2011 Proceedings IEEE,IEEE, (2011).
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 06 | June 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 3842 [10]. M. Quwaider and Y. Jararweh, “Cloudlet-based efficient data collection in wireless body area networks,” Simulation Modelling Practice andTheory, vol. 50, pp. 57–71, 2015./ BIOGRAPHIES Ms. Sonali A. Ekatpure is currently pursuing M.E(Computer)from Dept of Computer Science &Engineering, SKN Sinhgad College Of Engineering, Korti, Pandharpur Maharashtra, India -413304.She received her B.E(Computer) Degree from Shivnagar Vidya Prasarak Mandal’s College of Engineering, Malegaon(Bk),Maharashtra, India -413115. Her area of interest is Cloud Computing Network Security. Prof. Subhash V. Pingale is currently working as Asst. Professor with Dept of Computer Science &Engineering, SKN Sinhgad College Of Engineering, Korti, Pandharpur Maharashtra, India -413304. His research interests include Image Processing and Networking.
Télécharger maintenant