Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/310246
Title: Secure and Efficient Access to Outsourced Data of EHR in Cloud Storage
Researcher: DEEPAK KUMAR VERMA
Guide(s): RAJESH KUMAR TYAGI
Keywords: Computer Science
Computer Science Information Systems
Engineering and Technology
University: Dr. A.P.J. Abdul Kalam Technical University
Completed Date: 2020
Abstract: Cloud computing, technology in trend, offers internet-based resources at the quick release with minimal organizational efforts. The technology implementation is by the data center hardware situated at a distant location from users. Security of the cloud data is one of the major issues, which has been improved continuously in the past decade. There are various focused research areas in data security. Our focus area in the research is data monitoring and security enhancement of sensitive data. First, we focused on data monitoring. It is required to check the data regularly whether it has tampered. Our second focus is security enhancement of sensitive data. For this, first, we identified the sensitive data by giving a classification of data depending upon sensitivity. EHR has been taken as an example to model the classification. Next, it is required to encrypt the high sensitive and moderate sensitive data to secure it. Also, the encryption technique needs to be fast to support the bulk of data. The conventional cryptographic schemes are much secured but not fast. The chaos- newlinebased cryptographic algorithms are useful for fast encryption to support the bulk of data. Cloud users verify the data integrity by delegating third-party auditor task, which audits the data according to data owners. In Chapter 2, we have used homomorphic linear authentication and Boneh Lynn Shacham signature in our proposed system to support privacy-preserving for public integrity auditing. For obtaining better results, the proposed scheme has been implemented on the multi-core CPU using multithreading architecture. Chapter 3 explains a secure and efficient public integrity auditing method for data stored in the cloud with dynamic data operations. In this scheme, the file-sharing and dynamic operations like append, insert, delete, and update uses algebraic signature properties. An index table with less difficult operations in contrast to bilinear pairing has been used to minimize the auditing cost.
Pagination: 
URI: http://hdl.handle.net/10603/310246
Appears in Departments:dean PG Studies and Research

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File178.29 kBAdobe PDFView/Open
02_declaration and certificate.pdf242.45 kBAdobe PDFView/Open
09_chapter1.pdf3.49 MBAdobe PDFView/Open
10_chapter2.pdf3.34 MBAdobe PDFView/Open
11_chapter3.pdf4.36 MBAdobe PDFView/Open
12_chapter4.pdf5.11 MBAdobe PDFView/Open
13_chapter5.pdf2.45 MBAdobe PDFView/Open
14_chapter6.pdf1.23 MBAdobe PDFView/Open
15_chapter7.pdf979.3 kBAdobe PDFView/Open
16_references.pdf5.45 MBAdobe PDFView/Open
17_publications.pdf200.65 kBAdobe PDFView/Open
80_recommendation.pdf502.82 kBAdobe PDFView/Open
combinepdf (1).pdf2.22 MBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: