Medi-Care Database Maintenance System

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The recent advances in information and communication technology are congregation; storage and information sharing are simple and faster. We propose the architecture that guarantees the personal exchange of knowledge between patients and doctors through the SAS (storage aggregation server) by using asymmetric cryptography, the encoding technique. The random key enhances the security for the biomedical data of each patient. We introduce the concept of double-phase micro aggregation to restrict the intruder entities without the loss of information. We have derived that double phase multivariate micro aggregation properly and also the reduction of memory storage.

     

     


  • Keywords


    Memory storage, sharing, retrieval, confidentiality

  • References


      [1] Nishita Ramakrishnan and Sreerekha “Enhancing Security of Personal Health Records in Cloud Computing by Encryption”. International Journal of Science and Research.

      [2] M. Naehrig, K. Lauter, and V. Vaikuntanathan. “Can homomorphic encryption be practical?” In Proceedings of the 3rd ACM workshop on Cloud computing security workshop, pp. 113-124, New York, USA, 2011.

      [3] S.Sheeba Rani, R.Maheswari, V.Gomathy and P.Sharmila, “Iot driven vehicle license plate extraction approach” in International Journal of Engineering and Technology(IJET) , Volume.7, pp 457-459, April 2018

      [4] G. Coker, J. Guttmann, P. Loscocco, A. Herzog, J. Millen, B. OHanlon, J. Ramsdell, A. Segall, J. Sheehy, and B. Sniffen. “Principles of remote attestation”. International Journal of Information Security, Volume 10, Issue 2, pp. 63-81, 2011.

      [5] X. Lei, X. Liao, T. Huang, H. Li and C. Hu. “Outsourcing Large Matrix Inversion Computation to a Public Cloud”. IEEE Transactions on Cloud Computing, Volume 1, Issue 2, pp. 78-89, 2013.

      [6] Trusted-Java: Jsr321: Trusted computing api for java(tm) (2009) Available at: http://jcp.org/en/jsr/detail?id=321. Accessed on 06/09/2013.

      [7] P. Tysowski and M. Hasan. “Hybrid Attribute- and Re-Encryption- Based Key Management for Secure and Scalable Mobile Applications in Clouds”. IEEE Transactions on Cloud Computing, Volume 1, Issue 2, pp. 172-186, 2013.

      [8] S. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi and P. Samarati. “Integrity for Join Queries in the Cloud”. IEEE Transactions on Cloud Computing, Volume 1, Issue 2, pp. 187-200, 2013.

      [9] X. Leroy. “Formal certification of a compiler back-end, or: programming a compiler with a proof assistant”. In 33RD Proceedings of ACM Symposium on Principles of Programming Languages, 2006.

      [10] M. S. Simi , K. Sankara Nayaki “Data analytics in medical data : A review” , 10.1109/ICCPCT.2017.8074337, 2017.

      [11] Subhash Chandra Pandey , “Data mining techniques for medical data: A review”, 10.1109/SCOPES.2016.7955586, 2017.

      [12] S. Balakrishnan, J. Janet, K.N. Sivabalan, “Secure Data Sharing In A Cloud Environment By Using Biometric Leakage resilient Authenticated Key Exchange”, Pak. J. Biotechnol. Vol. 15 (2) 293-297 (2018).

      [13] J. Janet, S. Balakrishnan and E. Murali, "Improved data transfer scheduling and optimization as a service in cloud," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-3.
      doi: 10.1109/ICICES.2016.7518895.

      [14] Balakrishnan S., Janet J., Spandana S. ”Extensibility of File Set Over Encoded Cloud Data Through Empowered Fine Grained Multi Keyword Search”. In: Deiva Sundari P., Dash S., Das S., Panigrahi B. (eds) Proceedings of 2nd International Conference on Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 467. 2017. Springer, Singapore.

      [15] J. Janet, S. Balakrishnan and K. Somasekhara, "Fountain code based cloud storage mechanism for optimal file retrieval delay," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-4.
      doi: 10.1109/ICICES.2016.7518901.

      [16] J. Janet, S. Balakrishnan and E. R. Prasad, "Optimizing data movement within cloud environment using efficient compression techniques," 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-5. doi: 10.1109/ICICES.2016.7518896.


 

View

Download

Article ID: 22086
 
DOI: 10.14419/ijet.v7i4.19.22086




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.