Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/335518
Title: | Certain investigations on security and data access control limitation procedures to protect health care data |
Researcher: | Pugazhenthi, A |
Guide(s): | Chitra, D |
Keywords: | Security Health care data Cloud computing |
University: | Anna University |
Completed Date: | 2020 |
Abstract: | Cloud computing is the pay per use model that seeks to supply the required contents to the users based on their demands. The cloud storage is the most popular service inspired by individual persons and also cloud organizations. The industries outsource their data to the cloud storage space to avoid the burden of handling unnecessary data contents. This needs to be secured to avoid the stealing of personal contents and privacy needs to be enhanced as well. There are various research work have been proposed to provide the secured handling of the data contents. But this research works still need to be provided with more security. So to overcome the security issues in the cloud this technique has been proposed. The main objective of this research work is to provide the secured environment for the cloud users and also improves the profit of cloud resource providers by handling and providing the data contents in the secured way. The majority of industries including business, banking, military and health services are not using cloud to store data. So attract these types of clients, this method is used. Increasing popularity cloud computing attracts medical researchers to store their research content in the cloud computing to share and access the data in the flexible way. These medical data s were obtained from several patients that are examined for medical treatment. It is essential to store and retrieve the data in a secured manner. This approach concentrates to provide secure environment, confidential processing of data and access control of health data in cloud computing infrastructure. The first Approach presents a secured data protection technique known as Scalable and Enhanced Key Aggregate Cryptosystem that giveseffectual security in Health care. newline |
Pagination: | xix,133 p. |
URI: | http://hdl.handle.net/10603/335518 |
Appears in Departments: | Faculty of Information and Communication Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 23.73 kB | Adobe PDF | View/Open |
02_certificates.pdf | 271.68 kB | Adobe PDF | View/Open | |
03_vivaproceedings.pdf | 452.33 kB | Adobe PDF | View/Open | |
04_bonafidecertificate.pdf | 338.95 kB | Adobe PDF | View/Open | |
05_abstracts.pdf | 73.97 kB | Adobe PDF | View/Open | |
06_acknowledgements.pdf | 390.11 kB | Adobe PDF | View/Open | |
07_contents.pdf | 12.32 kB | Adobe PDF | View/Open | |
08_listoftables.pdf | 4.13 kB | Adobe PDF | View/Open | |
09_listoffigures.pdf | 26.83 kB | Adobe PDF | View/Open | |
10_listofabbreviations.pdf | 114.91 kB | Adobe PDF | View/Open | |
11_chapter1.pdf | 169.48 kB | Adobe PDF | View/Open | |
12_chapter2.pdf | 188.78 kB | Adobe PDF | View/Open | |
13_chapter3.pdf | 283.1 kB | Adobe PDF | View/Open | |
14_chapter4.pdf | 382.24 kB | Adobe PDF | View/Open | |
15_chapter5.pdf | 386.56 kB | Adobe PDF | View/Open | |
16_conclusion.pdf | 34.59 kB | Adobe PDF | View/Open | |
17_references.pdf | 225.01 kB | Adobe PDF | View/Open | |
18_listofpublications.pdf | 141.72 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 58.13 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: